'
- File: Flask1/1.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(url_for('view'))
- File: Flask1/1.py
- > Line 51: ret_MAYBE_FUNCTION_NAME = Response('Invalid query, click here to retry', 401, 'WWW-Authenticate''Basic realm="1"')
- File: Flask1/1.py
- > Line 74: morelink = ''
-File: Flask1/1.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('view.html',rows=rows, more=more, morelink=morelink, auth=auth)
-
-Vulnerability 18:
-File: Flask1/1.py
- > User input at line 106, trigger word "Markup(":
- publish = Markup(publish'Currently published.''Private entry.' + '')
-Reassigned in:
- File: Flask1/1.py
- > Line 100: publish = ''
- File: Flask1/1.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('view'))
-File: Flask1/1.py
- > reaches line 120, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('addent.html',date=date, title=title, content=content, publish=publish, savenote=Markup(savenote))
-
-
-
-scgodbold/flaskFramework
-https://github.com/scgodbold/flaskFramework
-Entry file: flaskFramework/app/__init__.py
-Scanned: 2016-10-19 13:19:39.918047
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ramsys/FlaskDo
-https://github.com/ramsys/FlaskDo
-Entry file: FlaskDo/wsgi/myflaskapp.py
-Scanned: 2016-10-19 13:19:41.262830
-No vulnerabilities found.
-
-
-farconada/FlaskWSSE
-https://github.com/farconada/FlaskWSSE
-Entry file: FlaskWSSE/application/__init__.py
-Scanned: 2016-10-19 13:19:42.503202
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yi719/flask_demo
-https://github.com/yi719/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-19 13:19:43.001395
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elvinyung/flask-scaffold
-https://github.com/elvinyung/flask-scaffold
-Entry file: flask-scaffold/[appname].py
-Scanned: 2016-10-19 13:19:43.510281
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rkk09c/Flask_Boilerplate
-https://github.com/rkk09c/Flask_Boilerplate
-Entry file: Flask_Boilerplate/app/__init__.py
-Scanned: 2016-10-19 13:19:45.164127
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-avwie/Flask-Flat
-https://github.com/avwie/Flask-Flat
-Entry file: Flask-Flat/example/app.py
-Scanned: 2016-10-19 13:19:51.517971
-No vulnerabilities found.
-
-
-bertonha/base_flask
-https://github.com/bertonha/base_flask
-Entry file: base_flask/app/__init__.py
-Scanned: 2016-10-19 13:19:53.846754
-No vulnerabilities found.
-
-
-wangwangwar/flask-docker
-https://github.com/wangwangwar/flask-docker
-Entry file: flask-docker/app/__init__.py
-Scanned: 2016-10-19 13:19:59.122592
-No vulnerabilities found.
-
-
-jbradach/flask-markov
-https://github.com/jbradach/flask-markov
-Entry file: flask-markov/app.py
-Scanned: 2016-10-19 13:20:00.502838
-No vulnerabilities found.
-
-
-antoniotari/flask_api
-https://github.com/antoniotari/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-19 13:20:00.997265
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-trudikampfschaf/flask-microblog
-https://github.com/trudikampfschaf/flask-microblog
-Entry file: None
-Scanned: 2016-10-19 13:20:02.506118
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Wojtek-89/Flask-stronka
-https://github.com/Wojtek-89/Flask-stronka
-Entry file: Flask-stronka/routes.py
-Scanned: 2016-10-19 13:20:03.893630
-No vulnerabilities found.
-
-
-BobbyJoeSmith3/FlaskAppLaunch
-https://github.com/BobbyJoeSmith3/FlaskAppLaunch
-Entry file: FlaskAppLaunch/app/__init__.py
-Scanned: 2016-10-19 13:20:10.852650
-No vulnerabilities found.
-
-
-masakichi/pocket
-https://github.com/masakichi/pocket
-Entry file: pocket/app/__init__.py
-Scanned: 2016-10-19 13:20:11.386184
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jwatson/simple-flask-stacktrace
-https://github.com/jwatson/simple-flask-stacktrace
-Entry file: simple-flask-stacktrace/server.py
-Scanned: 2016-10-19 13:20:12.609255
-No vulnerabilities found.
-
-
-NickWoodhams/Flask-Admin-Mongo-Example
-https://github.com/NickWoodhams/Flask-Admin-Mongo-Example
-Entry file: Flask-Admin-Mongo-Example/app.py
-Scanned: 2016-10-19 13:20:13.838275
-No vulnerabilities found.
-
-
-stanleygu/flask-ipython-redirect
-https://github.com/stanleygu/flask-ipython-redirect
-Entry file: flask-ipython-redirect/app.py
-Scanned: 2016-10-19 13:20:24.334763
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jef5ez/nlToSparqlFlask
-https://github.com/jef5ez/nlToSparqlFlask
-Entry file: nlToSparqlFlask/quepy_flask.py
-Scanned: 2016-10-19 13:20:25.683871
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andrewkreid/swagger-flask-test
-https://github.com/andrewkreid/swagger-flask-test
-Entry file: swagger-flask-test/app_api.py
-Scanned: 2016-10-19 13:20:27.017513
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Sysnove/flask-hello-world
-https://github.com/Sysnove/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-19 13:20:27.545349
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-sakserv/hadoop-flask-apps
-https://github.com/sakserv/hadoop-flask-apps
-Entry file: hadoop-flask-apps/main.py
-Scanned: 2016-10-19 13:20:28.885956
-No vulnerabilities found.
-
-
-gene9/Flask-LaunchSoon
-https://github.com/gene9/Flask-LaunchSoon
-Entry file: Flask-LaunchSoon/launchsoon.py
-Scanned: 2016-10-19 13:20:30.874509
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sandys/flask-sms-ses
-https://github.com/sandys/flask-sms-ses
-Entry file: flask-sms-ses/routes.py
-Scanned: 2016-10-19 13:20:31.368779
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PatrickEGorman/Website
-https://github.com/PatrickEGorman/Website
-Entry file: Website/__init__.py
-Scanned: 2016-10-19 13:20:32.812804
-No vulnerabilities found.
-
-
-zlkca/fezlin
-https://github.com/zlkca/fezlin
-Entry file: fezlin/__init__.py
-Scanned: 2016-10-19 13:20:36.248440
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-daboross/qxlc
-https://github.com/daboross/qxlc
-Entry file: qxlc/qxlc/__init__.py
-Scanned: 2016-10-19 13:20:37.859886
-Vulnerability 1:
-File: qxlc/qxlc/database.py
- > User input at line 91, trigger word ".data":
- select_result = db.execute(select([data_table.c.id]).where(data_table.c.type == data_type).where(data_table.c.data == data))
-Reassigned in:
- File: qxlc/qxlc/database.py
- > Line 89: select_result = None
-File: qxlc/qxlc/database.py
- > reaches line 91, trigger word "execute(":
- select_result = db.execute(select([data_table.c.id]).where(data_table.c.type == data_type).where(data_table.c.data == data))
-
-Vulnerability 2:
-File: qxlc/qxlc/database.py
- > User input at line 120, trigger word ".data":
- select_result = db.execute(select([data_table.c.type, data_table.c.data]).where(data_table.c.id == data_id))
-Reassigned in:
- File: qxlc/qxlc/database.py
- > Line 118: select_result = None
-File: qxlc/qxlc/database.py
- > reaches line 120, trigger word "execute(":
- select_result = db.execute(select([data_table.c.type, data_table.c.data]).where(data_table.c.id == data_id))
-
-
-
-frederick-masterton/python27-flask-RESTful-api-how-to
-https://github.com/frederick-masterton/python27-flask-RESTful-api-how-to
-Entry file: python27-flask-RESTful-api-how-to/restfulapi.py
-Scanned: 2016-10-19 13:20:38.351350
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xsteadfastx/praeger
-https://github.com/xsteadfastx/praeger
-Entry file: praeger/app/app.py
-Scanned: 2016-10-19 13:20:39.916299
-Vulnerability 1:
-File: praeger/app/app.py
- > User input at line 401, trigger word ".data":
- bet = Bet(username=current_user.get_id(), score1=form.score1.data, score2=form.score2.data)
-Reassigned in:
- File: praeger/app/app.py
- > Line 379: form = MatchForm(score1=bet.score1, score2=bet.score2)
- File: praeger/app/app.py
- > Line 385: form = MatchForm()
- File: praeger/app/app.py
- > Line 398: bet.score1 = form.score1.data
- File: praeger/app/app.py
- > Line 399: bet.score2 = form.score2.data
- File: praeger/app/app.py
- > Line 368: ret_MAYBE_FUNCTION_NAME = redirect('/round/' + str(round))
- File: praeger/app/app.py
- > Line 406: ret_MAYBE_FUNCTION_NAME = redirect('/round/' + str(round_number))
-File: praeger/app/app.py
- > reaches line 407, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('bet.html',form=form, rounds=rounds, round=round, team1=team_key_to_title(team1), team2=team_key_to_title(team2))
-
-
-
-shashisp/express
-https://github.com/shashisp/express
-Entry file: express/app/__init__.py
-Scanned: 2016-10-19 13:20:41.121106
-No vulnerabilities found.
-
-
-Smashman/mods.tf
-https://github.com/Smashman/mods.tf
-Entry file: None
-Scanned: 2016-10-19 13:20:43.938402
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Smashman/mods.tf.
-
-belda/metaextractor
-https://github.com/belda/metaextractor
-Entry file: None
-Scanned: 2016-10-19 13:20:45.276379
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/belda/metaextractor.
-
-hrkfdn/pyle
-https://github.com/hrkfdn/pyle
-Entry file: pyle/pyle.py
-Scanned: 2016-10-19 13:20:47.547734
-No vulnerabilities found.
-
-
-Ragora/CNS-Web
-https://github.com/Ragora/CNS-Web
-Entry file: None
-Scanned: 2016-10-19 13:20:49.086850
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Ragora/CNS-Web.
-
-sambodanis/Receipt-Tracker
-https://github.com/sambodanis/Receipt-Tracker
-Entry file: Receipt-Tracker/server/__init__.py
-Scanned: 2016-10-19 13:20:53.356213
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zeckalpha/wx
-https://github.com/zeckalpha/wx
-Entry file: wx/wx/app.py
-Scanned: 2016-10-19 13:20:55.960077
-No vulnerabilities found.
-
-
-Kentoseth/SimpleBlog
-https://github.com/Kentoseth/SimpleBlog
-Entry file: SimpleBlog/__init__.py
-Scanned: 2016-10-19 13:21:00.335054
-No vulnerabilities found.
-
-
-dastagg/fsblog
-https://github.com/dastagg/fsblog
-Entry file: fsblog/app/__init__.py
-Scanned: 2016-10-19 13:21:01.681595
-No vulnerabilities found.
-
-
-nrpeterson/homepage
-https://github.com/nrpeterson/homepage
-Entry file: None
-Scanned: 2016-10-19 13:21:02.275438
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sourya/codoo
-https://github.com/sourya/codoo
-Entry file: codoo/codoo/codoo.py
-Scanned: 2016-10-19 13:21:04.615968
-No vulnerabilities found.
-
-
-realpython/discover-flask
-https://github.com/realpython/discover-flask
-Entry file: discover-flask/project/__init__.py
-Scanned: 2016-10-19 13:21:09.890364
-No vulnerabilities found.
-
-
-Depado/flask-skeleton
-https://github.com/Depado/flask-skeleton
-Entry file: None
-Scanned: 2016-10-19 13:21:13.393793
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Depado/flask-skeleton.
-
-Robpol86/Flask-Celery-Helper
-https://github.com/Robpol86/Flask-Celery-Helper
-Entry file: Flask-Celery-Helper/tests/instances.py
-Scanned: 2016-10-19 13:21:14.857418
-Vulnerability 1:
-File: Flask-Celery-Helper/tests/instances.py
- > User input at line 67, trigger word "SQLAlchemy":
- db = SQLAlchemy(flask_app)
-File: Flask-Celery-Helper/tests/instances.py
- > reaches line 68, trigger word "execute(":
- db.engine.execute('DROP TABLE IF EXISTS celery_tasksetmeta;')
-
-
-
-mmautner/simple_api
-https://github.com/mmautner/simple_api
-Entry file: simple_api/app.py
-Scanned: 2016-10-19 13:21:16.181532
-No vulnerabilities found.
-
-
-itsnauman/shrt
-https://github.com/itsnauman/shrt
-Entry file: shrt/app/__init__.py
-Scanned: 2016-10-19 13:21:26.693693
-Vulnerability 1:
-File: shrt/app/views.py
- > User input at line 51, trigger word "form[":
- url = request.form['url']
-Reassigned in:
- File: shrt/app/views.py
- > Line 52: short_url = shorten_link(url)
- File: shrt/app/views.py
- > Line 55: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: shrt/app/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('shortened.html',url=short_url)
-
-
-
-miguelgrinberg/flask-examples
-https://github.com/miguelgrinberg/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-19 13:21:27.215930
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aliyarahman/flask_evolution
-https://github.com/aliyarahman/flask_evolution
-Entry file: flask_evolution/app/__init__.py
-Scanned: 2016-10-19 13:21:34.078000
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Robpol86/Flask-Redis-Helper
-https://github.com/Robpol86/Flask-Redis-Helper
-Entry file: Flask-Redis-Helper/tests/conftest.py
-Scanned: 2016-10-19 13:21:35.978536
-No vulnerabilities found.
-
-
-desertpy/flask-demo
-https://github.com/desertpy/flask-demo
-Entry file: None
-Scanned: 2016-10-19 13:21:36.481291
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/desertpy/flask-demo.
-
-jamonation/flask-hmac
-https://github.com/jamonation/flask-hmac
-Entry file: flask-hmac/flask_hmac.py
-Scanned: 2016-10-19 13:21:37.741965
-No vulnerabilities found.
-
-
-Drexden/flaskapp
-https://github.com/Drexden/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:21:38.267322
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Drexden/flaskapp.
-
-shreyasrk/flaskr
-https://github.com/shreyasrk/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:21:39.755863
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jvalentini/flaskr
-https://github.com/jvalentini/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:21:40.251586
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cdorman1/flaskapp
-https://github.com/cdorman1/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:21:43.234935
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cdorman1/flaskapp.
-
-mattiashem/python-oauth2
-https://github.com/mattiashem/python-oauth2
-Entry file: python-oauth2/client2.py
-Scanned: 2016-10-19 13:21:46.479426
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-code-haven/FlaskBlog
-https://github.com/code-haven/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-19 13:21:47.081494
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-HellerCommaA/flask-angular
-https://github.com/HellerCommaA/flask-angular
-Entry file: None
-Scanned: 2016-10-19 13:21:49.790576
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-elainekamlley/flask_skeleton
-https://github.com/elainekamlley/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-19 13:21:50.304432
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-SelinaMusuta/flask_skeleton
-https://github.com/SelinaMusuta/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-19 13:21:50.809520
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-jhona22baz/blog-flask
-https://github.com/jhona22baz/blog-flask
-Entry file: blog-flask/project/views.py
-Scanned: 2016-10-19 13:21:54.578891
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-the-adrian/demoFlask
-https://github.com/the-adrian/demoFlask
-Entry file: demoFlask/venv/lib/python2.7/site-packages/flask/sessions.py
-Scanned: 2016-10-19 13:21:58.847950
-No vulnerabilities found.
-
-
-portyaninoleh/flask_admin
-https://github.com/portyaninoleh/flask_admin
-Entry file: flask_admin/flask_test.py
-Scanned: 2016-10-19 13:22:02.143783
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pmaddi/flask-graph
-https://github.com/pmaddi/flask-graph
-Entry file: None
-Scanned: 2016-10-19 13:22:11.611330
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-BobbyJoeSmith3/flask_skeleton
-https://github.com/BobbyJoeSmith3/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-19 13:22:12.146925
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-mitkaua/flask-page
-https://github.com/mitkaua/flask-page
-Entry file: flask-page/app/__init__.py
-Scanned: 2016-10-19 13:22:13.789585
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-abekim/flask-seed
-https://github.com/abekim/flask-seed
-Entry file: None
-Scanned: 2016-10-19 13:22:14.300002
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/abekim/flask-seed.
-
-dagobailon/flask_skeleton
-https://github.com/dagobailon/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-19 13:22:15.280816
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-jbradach/flask-markov
-https://github.com/jbradach/flask-markov
-Entry file: flask-markov/app.py
-Scanned: 2016-10-19 13:22:17.680129
-No vulnerabilities found.
-
-
-jefftriplett/flask-whois
-https://github.com/jefftriplett/flask-whois
-Entry file: flask-whois/app.py
-Scanned: 2016-10-19 13:22:27.944552
-Vulnerability 1:
-File: flask-whois/app.py
- > User input at line 11, trigger word "get(":
- domain = request.args.get('domain', None)
-Reassigned in:
- File: flask-whois/app.py
- > Line 14: data = pythonwhois.net.get_whois_raw(domain)
- File: flask-whois/app.py
- > Line 16: parsed = pythonwhois.parse.parse_raw_whois(data,normalized=True)
- File: flask-whois/app.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = '
{0}
'.format(data[0])
- File: flask-whois/app.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = data[0]
- File: flask-whois/app.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = 'No ?domain= specified!'
-File: flask-whois/app.py
- > reaches line 17, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(parsed)
-
-
-
-Sylnai/flask_zmq
-https://github.com/Sylnai/flask_zmq
-Entry file: flask_zmq/test.py
-Scanned: 2016-10-19 13:22:29.168977
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cristian69/Pagina_Flask
-https://github.com/cristian69/Pagina_Flask
-Entry file: Pagina_Flask/__init__.py
-Scanned: 2016-10-19 13:22:32.932858
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Pagina_Flask/venv/lib/python2.7/genericpath.py
-
-KittyLee/flask_skeleton
-https://github.com/KittyLee/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-19 13:22:33.445540
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-areis23/Flask-SQLAlchemy
-https://github.com/areis23/Flask-SQLAlchemy
-Entry file: Flask-SQLAlchemy/app.py
-Scanned: 2016-10-19 13:22:35.040722
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alon21034/flask-server
-https://github.com/alon21034/flask-server
-Entry file: None
-Scanned: 2016-10-19 13:22:36.550780
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/alon21034/flask-server.
-
-msoltysik/FlaskMegaTutorial
-https://github.com/msoltysik/FlaskMegaTutorial
-Entry file: FlaskMegaTutorial/flask/Lib/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-19 13:22:37.190716
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-flect/ht-python-flask
-https://github.com/flect/ht-python-flask
-Entry file: ht-python-flask/hello.py
-Scanned: 2016-10-19 13:22:38.882834
-No vulnerabilities found.
-
-
-pebreo/flask-heroku-helloworld
-https://github.com/pebreo/flask-heroku-helloworld
-Entry file: flask-heroku-helloworld/app.py
-Scanned: 2016-10-19 13:22:40.139636
-No vulnerabilities found.
-
-
-nfazzio/flask-mega-tutorial
-https://github.com/nfazzio/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-19 13:22:41.628885
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wbeyda/flask-rest-api
-https://github.com/wbeyda/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-19 13:22:42.120363
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-danwiesenthal/simple_flask_api
-https://github.com/danwiesenthal/simple_flask_api
-Entry file: simple_flask_api/projectname/__init__.py
-Scanned: 2016-10-19 13:22:44.469972
-No vulnerabilities found.
-
-
-maethu/flask-pdf2img
-https://github.com/maethu/flask-pdf2img
-Entry file: flask-pdf2img/webapp/__init__.py
-Scanned: 2016-10-19 13:22:47.648228
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-timzdevz/fm-flask-app
-https://github.com/timzdevz/fm-flask-app
-Entry file: fm-flask-app/app/__init__.py
-Scanned: 2016-10-19 13:22:48.993676
-No vulnerabilities found.
-
-
-twstddev/flask-admin-panel
-https://github.com/twstddev/flask-admin-panel
-Entry file: None
-Scanned: 2016-10-19 13:22:50.563566
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/twstddev/flask-admin-panel.
-
-RockyRoad29/Flask-know_users
-https://github.com/RockyRoad29/Flask-know_users
-Entry file: Flask-know_users/know_users/__init__.py
-Scanned: 2016-10-19 13:22:51.883369
-No vulnerabilities found.
-
-
-SelinaMusuta/three_views
-https://github.com/SelinaMusuta/three_views
-Entry file: three_views/app/__init__.py
-Scanned: 2016-10-19 13:22:55.483042
-No vulnerabilities found.
-
-
-hortonew/Pyruse
-https://github.com/hortonew/Pyruse
-Entry file: Pyruse/server.py
-Scanned: 2016-10-19 13:22:56.856454
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GandalfTheGandalf/twitter
-https://github.com/GandalfTheGandalf/twitter
-Entry file: twitter/hello.py
-Scanned: 2016-10-19 13:22:58.086129
-Vulnerability 1:
-File: twitter/hello.py
- > User input at line 94, trigger word "get(":
- resp = twitter.get('statuses/user_timeline.json?screen_name=twitter')
-Reassigned in:
- File: twitter/hello.py
- > Line 96: tweets = resp.data
- File: twitter/hello.py
- > Line 92: tweets = None
-File: twitter/hello.py
- > reaches line 100, trigger word "flash(":
- flash(resp.status)
-
-Vulnerability 2:
-File: twitter/hello.py
- > User input at line 94, trigger word "get(":
- resp = twitter.get('statuses/user_timeline.json?screen_name=twitter')
-Reassigned in:
- File: twitter/hello.py
- > Line 96: tweets = resp.data
- File: twitter/hello.py
- > Line 92: tweets = None
-File: twitter/hello.py
- > reaches line 101, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',tweets=tweets)
-
-Vulnerability 3:
-File: twitter/hello.py
- > User input at line 96, trigger word ".data":
- tweets = resp.data
-Reassigned in:
- File: twitter/hello.py
- > Line 92: tweets = None
-File: twitter/hello.py
- > reaches line 101, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',tweets=tweets)
-
-Vulnerability 4:
-File: twitter/hello.py
- > User input at line 109, trigger word "form[":
- status = request.form['tweet']
-Reassigned in:
- File: twitter/hello.py
- > Line 112: resp = twitter.post('statuses/update.json',data='status'status)
-File: twitter/hello.py
- > reaches line 120, trigger word "flash(":
- flash('Successfully tweeted your tweet (ID: #%s)' % resp.data['id'])
-
-Vulnerability 5:
-File: twitter/hello.py
- > User input at line 157, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: twitter/hello.py
- > reaches line 157, trigger word "url_for(":
- next_url = request.args.get('next') or url_for('index')
-
-Vulnerability 6:
-File: twitter/hello.py
- > User input at line 157, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: twitter/hello.py
- > reaches line 160, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 7:
-File: twitter/hello.py
- > User input at line 157, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: twitter/hello.py
- > reaches line 178, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-
-
-lnhubbell/learning_journal
-https://github.com/lnhubbell/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:00.702582
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fernandojunior/rest_flaskr
-https://github.com/fernandojunior/rest_flaskr
-Entry file: rest_flaskr/app/__init__.py
-Scanned: 2016-10-19 13:23:04.459082
-Vulnerability 1:
-File: rest_flaskr/app/views/entry.py
- > User input at line 32, trigger word "get(":
- entry = Entry.query.get(id)
-File: rest_flaskr/app/views/entry.py
- > reaches line 37, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(entry=entry.serialize)
-
-
-
-somyamohanty/tweet_stream
-https://github.com/somyamohanty/tweet_stream
-Entry file: tweet_stream/twt_server.py
-Scanned: 2016-10-19 13:23:05.672771
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jacktian86/learning_journal
-https://github.com/jacktian86/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:06.175474
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rivese/learning_journal
-https://github.com/rivese/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:13.663575
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EyuelAbebe/learning_journal
-https://github.com/EyuelAbebe/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:14.182366
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-corinnelhh/learning_journal
-https://github.com/corinnelhh/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:15.696790
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jonathansiebert/learning_journal
-https://github.com/jonathansiebert/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:16.192166
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sazlin/learning_journal
-https://github.com/sazlin/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:16.683746
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lfritts/learning_journal
-https://github.com/lfritts/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:18.182586
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-caderache2014/learning_journal
-https://github.com/caderache2014/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:23:28.679792
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AngieBrilliance/Swampr
-https://github.com/AngieBrilliance/Swampr
-Entry file: Swampr/app/__init__.py
-Scanned: 2016-10-19 13:23:35.122122
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshsvoss/minitwit
-https://github.com/joshsvoss/minitwit
-Entry file: minitwit/minitwit.py
-Scanned: 2016-10-19 13:23:36.508824
-No vulnerabilities found.
-
-
-CasidyHenderson24/swamper
-https://github.com/CasidyHenderson24/swamper
-Entry file: swamper/app/__init__.py
-Scanned: 2016-10-19 13:23:40.191358
-No vulnerabilities found.
-
-
-burdell/GoWithMe
-https://github.com/burdell/GoWithMe
-Entry file: GoWithMe/app/__init__.py
-Scanned: 2016-10-19 13:23:41.469028
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-belda/metaextractor
-https://github.com/belda/metaextractor
-Entry file: None
-Scanned: 2016-10-19 13:23:41.957577
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/belda/metaextractor.
-
-danimajo/pineapple
-https://github.com/danimajo/pineapple
-Entry file: pineapple/pineapple.py
-Scanned: 2016-10-19 13:23:45.251476
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-finnurtorfa/aflafrettir.is
-https://github.com/finnurtorfa/aflafrettir.is
-Entry file: None
-Scanned: 2016-10-19 13:23:46.988896
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/finnurtorfa/aflafrettir.is.
-
-BobbyJoeSmith3/swampr
-https://github.com/BobbyJoeSmith3/swampr
-Entry file: swampr/app/__init__.py
-Scanned: 2016-10-19 13:23:53.977544
-No vulnerabilities found.
-
-
-jhtdc/swampr
-https://github.com/jhtdc/swampr
-Entry file: swampr/app/__init__.py
-Scanned: 2016-10-19 13:23:59.090595
-No vulnerabilities found.
-
-
-etse/HackMe
-https://github.com/etse/HackMe
-Entry file: HackMe/HackMe.py
-Scanned: 2016-10-19 13:24:02.119640
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elainekamlley/swamper
-https://github.com/elainekamlley/swamper
-Entry file: swamper/app/__init__.py
-Scanned: 2016-10-19 13:24:07.264167
-No vulnerabilities found.
-
-
-birhanuh/MonkeyFace
-https://github.com/birhanuh/MonkeyFace
-Entry file: MonkeyFace/app/__init__.py
-Scanned: 2016-10-19 13:24:13.582003
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AureaMartinez/swamp
-https://github.com/AureaMartinez/swamp
-Entry file: swamp/app/__init__.py
-Scanned: 2016-10-19 13:24:18.364521
-No vulnerabilities found.
-
-
-MariellaPaulino/swampr
-https://github.com/MariellaPaulino/swampr
-Entry file: swampr/app/__init__.py
-Scanned: 2016-10-19 13:24:23.353796
-No vulnerabilities found.
-
-
-michaelgugino/web_keyer
-https://github.com/michaelgugino/web_keyer
-Entry file: web_keyer/main.py
-Scanned: 2016-10-19 13:24:28.361792
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-elainekamlley/three_views
-https://github.com/elainekamlley/three_views
-Entry file: three_views/app/__init__.py
-Scanned: 2016-10-19 13:24:31.672595
-No vulnerabilities found.
-
-
-sourya/codoo
-https://github.com/sourya/codoo
-Entry file: codoo/codoo/codoo.py
-Scanned: 2016-10-19 13:24:33.586601
-No vulnerabilities found.
-
-
-betoesquivel/CIE
-https://github.com/betoesquivel/CIE
-Entry file: None
-Scanned: 2016-10-19 13:24:39.413521
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-grrrrreg/ASNator
-https://github.com/grrrrreg/ASNator
-Entry file: ASNator/asntool.py
-Scanned: 2016-10-19 13:24:40.771528
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ks111777/BookScanner
-https://github.com/ks111777/BookScanner
-Entry file: BookScanner/run.py
-Scanned: 2016-10-19 13:24:46.515116
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hufman/flask_rdf
-https://github.com/hufman/flask_rdf
-Entry file: flask_rdf/examples/simple.py
-Scanned: 2016-10-19 13:24:50.011905
-No vulnerabilities found.
-
-
-aliyarahman/flask_evolution
-https://github.com/aliyarahman/flask_evolution
-Entry file: flask_evolution/app/__init__.py
-Scanned: 2016-10-19 13:24:50.514907
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JeffOwOSun/flaskr
-https://github.com/JeffOwOSun/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:24:50.998162
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shreyasrk/flaskr
-https://github.com/shreyasrk/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:24:51.486262
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-craig3050/flasktest
-https://github.com/craig3050/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-19 13:24:51.995605
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cdorman1/flaskapp
-https://github.com/cdorman1/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:24:52.492180
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cdorman1/flaskapp.
-
-naoiwata/simple-flask-api
-https://github.com/naoiwata/simple-flask-api
-Entry file: simple-flask-api/api.py
-Scanned: 2016-10-19 13:24:53.828843
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-devunt/g
-https://github.com/devunt/g
-Entry file: g/g.py
-Scanned: 2016-10-19 13:24:55.143291
-No vulnerabilities found.
-
-
-nrkefauver/FlaskMegatutorial
-https://github.com/nrkefauver/FlaskMegatutorial
-Entry file: None
-Scanned: 2016-10-19 13:25:03.221547
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jhtdc/flask-skeleton
-https://github.com/jhtdc/flask-skeleton
-Entry file: None
-Scanned: 2016-10-19 13:25:04.234197
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jhtdc/flask-skeleton.
-
-the-adrian/demoFlask
-https://github.com/the-adrian/demoFlask
-Entry file: demoFlask/venv/lib/python2.7/site-packages/flask/sessions.py
-Scanned: 2016-10-19 13:25:08.446673
-No vulnerabilities found.
-
-
-LemunkoCORP/flask_lions
-https://github.com/LemunkoCORP/flask_lions
-Entry file: flask_lions/lemunko_app.py
-Scanned: 2016-10-19 13:25:09.715015
-No vulnerabilities found.
-
-
-davidabelman/wordcount_flask
-https://github.com/davidabelman/wordcount_flask
-Entry file: wordcount_flask/app.py
-Scanned: 2016-10-19 13:25:10.930335
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tawastory/JuboFlask
-https://github.com/tawastory/JuboFlask
-Entry file: JuboFlask/minijubo.py
-Scanned: 2016-10-19 13:25:16.861842
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-cristian69/Pagina_Flask
-https://github.com/cristian69/Pagina_Flask
-Entry file: Pagina_Flask/__init__.py
-Scanned: 2016-10-19 13:25:17.401357
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Pagina_Flask/venv/lib/python2.7/genericpath.py
-
-Syntaf/flask-liblogger
-https://github.com/Syntaf/flask-liblogger
-Entry file: flask-liblogger/app/__init__.py
-Scanned: 2016-10-19 13:25:21.127558
-No vulnerabilities found.
-
-
-Benknis/LXC_Flask
-https://github.com/Benknis/LXC_Flask
-Entry file: LXC_Flask/flask/main.py
-Scanned: 2016-10-19 13:25:22.350798
-No vulnerabilities found.
-
-
-miabbott/reserve-flask
-https://github.com/miabbott/reserve-flask
-Entry file: reserve-flask/app/__init__.py
-Scanned: 2016-10-19 13:25:23.717945
-Vulnerability 1:
-File: reserve-flask/app/views.py
- > User input at line 44, trigger word "get(":
- res_id = request.args.get('res_id')
-Reassigned in:
- File: reserve-flask/app/views.py
- > Line 45: reservation = Reservation.query.get(res_id)
- File: reserve-flask/app/views.py
- > Line 46: user_id = reservation.reserved_by
- File: reserve-flask/app/views.py
- > Line 47: sys = reservation.device
- File: reserve-flask/app/views.py
- > Line 48: res_date = reservation.res_datetime
- File: reserve-flask/app/views.py
- > Line 56: res_date = res_date + timedelta(hours=1)
-File: reserve-flask/app/views.py
- > reaches line 57, trigger word "filter(":
- next_res = Reservation.query.filter(Reservation.res_datetime == res_date, Reservation.reserved_by == user_id, Reservation.device == sys).all()
-
-Vulnerability 2:
-File: reserve-flask/app/views.py
- > User input at line 45, trigger word "get(":
- reservation = Reservation.query.get(res_id)
-Reassigned in:
- File: reserve-flask/app/views.py
- > Line 46: user_id = reservation.reserved_by
- File: reserve-flask/app/views.py
- > Line 47: sys = reservation.device
- File: reserve-flask/app/views.py
- > Line 48: res_date = reservation.res_datetime
- File: reserve-flask/app/views.py
- > Line 56: res_date = res_date + timedelta(hours=1)
-File: reserve-flask/app/views.py
- > reaches line 57, trigger word "filter(":
- next_res = Reservation.query.filter(Reservation.res_datetime == res_date, Reservation.reserved_by == user_id, Reservation.device == sys).all()
-
-Vulnerability 3:
-File: reserve-flask/app/views.py
- > User input at line 79, trigger word "get(":
- date_list = request.args.get('res_date').split('-')
-Reassigned in:
- File: reserve-flask/app/views.py
- > Line 80: year = int(date_list[0])
- File: reserve-flask/app/views.py
- > Line 81: month = int(date_list[1])
- File: reserve-flask/app/views.py
- > Line 82: day = int(date_list[2])
- File: reserve-flask/app/views.py
- > Line 83: new_date = date(year, month, day)
- File: reserve-flask/app/views.py
- > Line 88: new_datetime = datetime.combine(new_date, new_time)
- File: reserve-flask/app/views.py
- > Line 95: r = Reservation(res_datetime=new_datetime + timedelta(hours=hr), reserved_by=reserved_by, device=system)
-File: reserve-flask/app/views.py
- > reaches line 104, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('hours',date_str=new_date.isoformat()))
-
-Vulnerability 4:
-File: reserve-flask/app/views.py
- > User input at line 79, trigger word "get(":
- date_list = request.args.get('res_date').split('-')
-Reassigned in:
- File: reserve-flask/app/views.py
- > Line 80: year = int(date_list[0])
- File: reserve-flask/app/views.py
- > Line 81: month = int(date_list[1])
- File: reserve-flask/app/views.py
- > Line 82: day = int(date_list[2])
- File: reserve-flask/app/views.py
- > Line 83: new_date = date(year, month, day)
- File: reserve-flask/app/views.py
- > Line 88: new_datetime = datetime.combine(new_date, new_time)
- File: reserve-flask/app/views.py
- > Line 95: r = Reservation(res_datetime=new_datetime + timedelta(hours=hr), reserved_by=reserved_by, device=system)
-File: reserve-flask/app/views.py
- > reaches line 104, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('hours',date_str=new_date.isoformat()))
-
-
-
-practo/gource-flask
-https://github.com/practo/gource-flask
-Entry file: gource-flask/gource.py
-Scanned: 2016-10-19 13:25:26.055550
-No vulnerabilities found.
-
-
-Robpol86/Flask-JIRA-Helper
-https://github.com/Robpol86/Flask-JIRA-Helper
-Entry file: Flask-JIRA-Helper/tests/conftest.py
-Scanned: 2016-10-19 13:25:32.105939
-No vulnerabilities found.
-
-
-dmonopoly/flask-simple-setup
-https://github.com/dmonopoly/flask-simple-setup
-Entry file: flask-simple-setup/hello.py
-Scanned: 2016-10-19 13:25:34.883715
-No vulnerabilities found.
-
-
-nimate/flask-ink-test
-https://github.com/nimate/flask-ink-test
-Entry file: flask-ink-test/web.py
-Scanned: 2016-10-19 13:25:42.699480
-No vulnerabilities found.
-
-
-tototoshi/flask-app-template
-https://github.com/tototoshi/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-19 13:25:43.205395
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zappala/listomatic-flask-server
-https://github.com/zappala/listomatic-flask-server
-Entry file: listomatic-flask-server/doc/config.py
-Scanned: 2016-10-19 13:25:49.501969
-No vulnerabilities found.
-
-
-frimmy/flask-uploads-demo
-https://github.com/frimmy/flask-uploads-demo
-Entry file: flask-uploads-demo/app.py
-Scanned: 2016-10-19 13:25:51.333173
-Vulnerability 1:
-File: flask-uploads-demo/app.py
- > User input at line 24, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flask-uploads-demo/app.py
- > Line 26: filename = secure_filename(file.filename)
- File: flask-uploads-demo/app.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flask-uploads-demo/app.py
- > reaches line 28, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: flask-uploads-demo/app.py
- > User input at line 24, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flask-uploads-demo/app.py
- > Line 26: filename = secure_filename(file.filename)
- File: flask-uploads-demo/app.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flask-uploads-demo/app.py
- > reaches line 28, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-natereed/flask-sample-app
-https://github.com/natereed/flask-sample-app
-Entry file: flask-sample-app/app/__init__.py
-Scanned: 2016-10-19 13:25:52.668772
-No vulnerabilities found.
-
-
-ishanagr/ttml
-https://github.com/ishanagr/ttml
-Entry file: ttml/ttml.py
-Scanned: 2016-10-19 13:25:56.770896
-No vulnerabilities found.
-
-
-binishbaig/Binish-s-Shoe-Boutique
-https://github.com/binishbaig/Binish-s-Shoe-Boutique
-Entry file: Binish-s-Shoe-Boutique/app.py
-Scanned: 2016-10-19 13:25:58.470801
-No vulnerabilities found.
-
-
-EyuelAbebe/learning_journal
-https://github.com/EyuelAbebe/learning_journal
-Entry file: learning_journal/journal.py
-Scanned: 2016-10-19 13:25:58.971757
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DhashS/Greyhole_Frontend
-https://github.com/DhashS/Greyhole_Frontend
-Entry file: Greyhole_Frontend/Greyhole Webapp.py
-Scanned: 2016-10-19 13:26:00.315776
-No vulnerabilities found.
-
-
-saskyong/CoTwitter
-https://github.com/saskyong/CoTwitter
-Entry file: None
-Scanned: 2016-10-19 13:26:04.930213
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AngieBrilliance/Swampr
-https://github.com/AngieBrilliance/Swampr
-Entry file: Swampr/app/__init__.py
-Scanned: 2016-10-19 13:26:05.468227
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-eamonjohnson/fierce-rambo-78
-https://github.com/eamonjohnson/fierce-rambo-78
-Entry file: fierce-rambo-78/main.py
-Scanned: 2016-10-19 13:26:08.479329
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-d1ff/malinka-web-ui
-https://github.com/d1ff/malinka-web-ui
-Entry file: malinka-web-ui/webapp.py
-Scanned: 2016-10-19 13:26:09.903374
-No vulnerabilities found.
-
-
-OpenLinkedSocialData/aa01
-https://github.com/OpenLinkedSocialData/aa01
-Entry file: aa01/aaServer.py
-Scanned: 2016-10-19 13:26:23.936126
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Nebelhom/WordPuzzleCreator
-https://github.com/Nebelhom/WordPuzzleCreator
-Entry file: WordPuzzleCreator/main.py
-Scanned: 2016-10-19 13:26:26.260117
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-calpe20/websimple
-https://github.com/calpe20/websimple
-Entry file: websimple/app.py
-Scanned: 2016-10-19 13:26:27.493721
-No vulnerabilities found.
-
-
-ZCT/social_login
-https://github.com/ZCT/social_login
-Entry file: social_login/github.py
-Scanned: 2016-10-19 13:26:28.743634
-Vulnerability 1:
-File: social_login/github.py
- > User input at line 97, trigger word "get(":
- me = auth.get('user').json()
-Reassigned in:
- File: social_login/github.py
- > Line 99: user = User.get_or_create(me['login'], me['name'])
- File: social_login/github.py
- > Line 102: session['user_id'] = user.id
- File: social_login/github.py
- > Line 101: session['token'] = auth.access_token
-File: social_login/github.py
- > reaches line 104, trigger word "flash(":
- flash('Logged in as ' + me['name'])
-
-
-
-bembu/tidy
-https://github.com/bembu/tidy
-Entry file: tidy/app/__init__.py
-Scanned: 2016-10-19 13:26:30.931226
-Vulnerability 1:
-File: tidy/app/views.py
- > User input at line 155, trigger word ".data":
- user = models.User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: tidy/app/views.py
- > Line 157: rv = login_user(user)
-File: tidy/app/views.py
- > reaches line 158, trigger word "flash(":
- flash('Logged in as ' + user.username + '.', 'alert-success')
-
-
-
-brcontainer/html2canvas-python-proxy
-https://github.com/brcontainer/html2canvas-python-proxy
-Entry file: None
-Scanned: 2016-10-19 13:26:32.644455
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/brcontainer/html2canvas-python-proxy.
-
-psychopenguin/wikiwarrior
-https://github.com/psychopenguin/wikiwarrior
-Entry file: wikiwarrior/wikiwarrior.py
-Scanned: 2016-10-19 13:26:34.718838
-Vulnerability 1:
-File: wikiwarrior/wikiwarrior.py
- > User input at line 73, trigger word "get(":
- wikipage = requests.get(wikipedia + '/wiki/' + article).text
-Reassigned in:
- File: wikiwarrior/wikiwarrior.py
- > Line 74: content = wikicontent(wikipage)
- File: wikiwarrior/wikiwarrior.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = response
-File: wikiwarrior/wikiwarrior.py
- > reaches line 79, trigger word "replace(":
- response = make_response(render_template('wiki.html',app_name=app_name, current_game=gamename(), content=content['text'], infobox=content['infobox'], title=unquote(article).decode('utf-8').replace('_', ' '), gameover=gameover))
-
-Vulnerability 2:
-File: wikiwarrior/wikiwarrior.py
- > User input at line 73, trigger word "get(":
- wikipage = requests.get(wikipedia + '/wiki/' + article).text
-Reassigned in:
- File: wikiwarrior/wikiwarrior.py
- > Line 74: content = wikicontent(wikipage)
- File: wikiwarrior/wikiwarrior.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = response
-File: wikiwarrior/wikiwarrior.py
- > reaches line 79, trigger word "render_template(":
- response = make_response(render_template('wiki.html',app_name=app_name, current_game=gamename(), content=content['text'], infobox=content['infobox'], title=unquote(article).decode('utf-8').replace('_', ' '), gameover=gameover))
-
-
-
-MwzkQmuUZkFLbXm/tumblelog
-https://github.com/MwzkQmuUZkFLbXm/tumblelog
-Entry file: tumblelog/__init__.py
-Scanned: 2016-10-19 13:26:36.129420
-No vulnerabilities found.
-
-
-birhanuh/MonkeyFace
-https://github.com/birhanuh/MonkeyFace
-Entry file: MonkeyFace/app/__init__.py
-Scanned: 2016-10-19 13:26:36.620609
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yoniLavi/guess_me
-https://github.com/yoniLavi/guess_me
-Entry file: guess_me/guess_me.py
-Scanned: 2016-10-19 13:26:38.423365
-Vulnerability 1:
-File: guess_me/guess_me.py
- > User input at line 22, trigger word "form[":
- new_username = request.form['username']
-Reassigned in:
- File: guess_me/guess_me.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
- File: guess_me/guess_me.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html')
-File: guess_me/guess_me.py
- > reaches line 24, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = (render_template('invalid_username.html',username=new_username), 401)
-
-Vulnerability 2:
-File: guess_me/guess_me.py
- > User input at line 46, trigger word "get(":
- guess_input = request.args.get('guessed_number')
-Reassigned in:
- File: guess_me/guess_me.py
- > Line 52: guess = int(guess_input)
- File: guess_me/guess_me.py
- > Line 62: ret_MAYBE_FUNCTION_NAME = render_template('victory.html',username=username, guesses=current_guesses)
- File: guess_me/guess_me.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: guess_me/guess_me.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('guess.html',MAX_NUMBER=MAX_NUMBER)
-File: guess_me/guess_me.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('guess.html',MAX_NUMBER=MAX_NUMBER, current_guesses=current_guesses, last_guess=guess)
-
-
-
-andrewkreid/oauth2-test-client
-https://github.com/andrewkreid/oauth2-test-client
-Entry file: oauth2-test-client/openam_client.py
-Scanned: 2016-10-19 13:26:39.643068
-No vulnerabilities found.
-
-
-mcgoddard/chatta
-https://github.com/mcgoddard/chatta
-Entry file: chatta/chatta.py
-Scanned: 2016-10-19 13:26:49.646305
-Vulnerability 1:
-File: chatta/chatta.py
- > User input at line 30, trigger word "get(":
- last_update = request.args.get('last_update', '')
-Reassigned in:
- File: chatta/chatta.py
- > Line 33: last_datetime = datetime.datetime.strptime(last_update, '%Y-%m-%d %H:%M:%S')
-File: chatta/chatta.py
- > reaches line 38, trigger word "filter(":
- new_messages = Message.query.filter(Message.created_at > last_datetime)
-
-
-
-hrkfdn/mcpanel
-https://github.com/hrkfdn/mcpanel
-Entry file: mcpanel/mcpanel.py
-Scanned: 2016-10-19 13:26:50.918902
-No vulnerabilities found.
-
-
-danimajo/pineapple_pdf
-https://github.com/danimajo/pineapple_pdf
-Entry file: pineapple_pdf/pineapple.py
-Scanned: 2016-10-19 13:26:55.200883
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mcgoddard/HALON
-https://github.com/mcgoddard/HALON
-Entry file: HALON/halon.py
-Scanned: 2016-10-19 13:26:59.083119
-Vulnerability 1:
-File: HALON/halon.py
- > User input at line 118, trigger word "form[":
- character_id = request.form['character_id']
-File: HALON/halon.py
- > reaches line 119, trigger word "filter(":
- character = Character.query.filter(Character.id == character_id).first()
-
-
-
-andrewparrish/SkypeConferenceAutomator
-https://github.com/andrewparrish/SkypeConferenceAutomator
-Entry file: SkypeConferenceAutomator/gui.py
-Scanned: 2016-10-19 13:27:00.434131
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ks111777/BookScannerScraper
-https://github.com/ks111777/BookScannerScraper
-Entry file: BookScannerScraper/run.py
-Scanned: 2016-10-19 13:27:03.844531
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hussaintamboli/doMonit
-https://github.com/hussaintamboli/doMonit
-Entry file: doMonit/monit.py
-Scanned: 2016-10-19 13:27:05.288343
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-betoesquivel/CIE
-https://github.com/betoesquivel/CIE
-Entry file: None
-Scanned: 2016-10-19 13:27:05.828653
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-miguelgrinberg/Flask-SocketIO-Chat
-https://github.com/miguelgrinberg/Flask-SocketIO-Chat
-Entry file: Flask-SocketIO-Chat/app/__init__.py
-Scanned: 2016-10-19 13:27:08.090900
-Vulnerability 1:
-File: Flask-SocketIO-Chat/app/main/routes.py
- > User input at line 24, trigger word "get(":
- name = session.get('name', '')
-Reassigned in:
- File: Flask-SocketIO-Chat/app/main/routes.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-SocketIO-Chat/app/main/routes.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-Vulnerability 2:
-File: Flask-SocketIO-Chat/app/main/routes.py
- > User input at line 25, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: Flask-SocketIO-Chat/app/main/routes.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-SocketIO-Chat/app/main/routes.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-
-
-lpolepeddi/intro-to-flask
-https://github.com/lpolepeddi/intro-to-flask
-Entry file: intro-to-flask/intro_to_flask/__init__.py
-Scanned: 2016-10-19 13:38:04.524200
-No vulnerabilities found.
-
-
-saltycrane/flask-jquery-ajax-example
-https://github.com/saltycrane/flask-jquery-ajax-example
-Entry file: None
-Scanned: 2016-10-19 13:38:05.028961
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example.
-
-jdiez17/flask-paypal
-https://github.com/jdiez17/flask-paypal
-Entry file: flask-paypal/app.py
-Scanned: 2016-10-19 13:38:05.555177
-Vulnerability 1:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 33, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Everything looks good!
- Click here to complete the payment.
- ' % url_for('paypal_do',token=getexp_response['TOKEN'])
-
-Vulnerability 2:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Oh noes! PayPal returned an error code.
-
- %s
-
- Click here to try again.
- ' % (getexp_response['ACK'], url_for('index'))
-
-
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-19 13:38:06.990137
-No vulnerabilities found.
-
-
-tarbell-project/tarbell
-https://github.com/tarbell-project/tarbell
-Entry file: tarbell/tarbell/app.py
-Scanned: 2016-10-19 13:38:08.158039
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-19 13:38:08.686030
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-becdot/adventures-in-text
-https://github.com/becdot/adventures-in-text
-Entry file: adventures-in-text/db_methods.py
-Scanned: 2016-10-19 13:38:09.206098
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dirn/Flask-Simon
-https://github.com/dirn/Flask-Simon
-Entry file: Flask-Simon/examples/flaskr/flaskr.py
-Scanned: 2016-10-19 13:38:10.725933
-No vulnerabilities found.
-
-
-caub/flask-geo
-https://github.com/caub/flask-geo
-Entry file: flask-geo/myMap.py
-Scanned: 2016-10-19 13:38:11.283257
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-masayang/flask_dev
-https://github.com/masayang/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-19 13:38:11.812743
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-19 13:38:13.188797
-No vulnerabilities found.
-
-
-ffiiccuuss/torouterui
-https://github.com/ffiiccuuss/torouterui
-Entry file: torouterui/torouterui/__init__.py
-Scanned: 2016-10-19 13:38:13.712126
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marsella/andrea
-https://github.com/marsella/andrea
-Entry file: andrea/init.py
-Scanned: 2016-10-19 13:38:14.785477
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py
-
-embr/multithon
-https://github.com/embr/multithon
-Entry file: multithon/multithon.py
-Scanned: 2016-10-19 13:38:16.454462
-No vulnerabilities found.
-
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-19 13:38:16.978530
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-19 13:38:17.509184
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-19 13:38:19.401289
-No vulnerabilities found.
-
-
-MaxPresman/tempymail
-https://github.com/MaxPresman/tempymail
-Entry file: tempymail/flask_frontend.py
-Scanned: 2016-10-19 13:38:19.932333
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-19 13:38:22.041902
-No vulnerabilities found.
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-19 13:38:23.640743
-No vulnerabilities found.
-
-
-Blender3D/Flask-LESS
-https://github.com/Blender3D/Flask-LESS
-Entry file: Flask-LESS/flask_less.py
-Scanned: 2016-10-19 13:38:26.047454
-No vulnerabilities found.
-
-
-hex/flaskr
-https://github.com/hex/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:38:26.573529
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-19 13:38:27.568851
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-19 13:38:28.071295
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-parryjacob/flask-boilerplate
-https://github.com/parryjacob/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-19 13:39:04.622406
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/parryjacob/flask-boilerplate.
-
-jpercent/flask-control
-https://github.com/jpercent/flask-control
-Entry file: flask-control/example.py
-Scanned: 2016-10-19 13:39:05.144688
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Ceasar/pocket_flask
-https://github.com/Ceasar/pocket_flask
-Entry file: pocket_flask/app/__init__.py
-Scanned: 2016-10-19 13:39:07.788825
-No vulnerabilities found.
-
-
-CMGS/poll
-https://github.com/CMGS/poll
-Entry file: poll/app.py
-Scanned: 2016-10-19 13:39:11.292419
-Vulnerability 1:
-File: poll/app.py
- > User input at line 31, trigger word "get(":
- q = request.args.get('q', '')
-File: poll/app.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=g.user, subjects=get_subjects(q), groups=get_groups(), group=get_group(q))
-
-Vulnerability 2:
-File: poll/app.py
- > User input at line 59, trigger word "get(":
- group = request.form.get('group')
-Reassigned in:
- File: poll/app.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups())
-File: poll/app.py
- > reaches line 64, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group))
-
-Vulnerability 3:
-File: poll/app.py
- > User input at line 59, trigger word "get(":
- group = request.form.get('group')
-Reassigned in:
- File: poll/app.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups())
-File: poll/app.py
- > reaches line 64, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group))
-
-
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-19 13:39:12.545071
-No vulnerabilities found.
-
-
-dogrdon/txtr
-https://github.com/dogrdon/txtr
-Entry file: txtr/txtr.py
-Scanned: 2016-10-19 13:39:13.065166
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-19 13:39:13.574920
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-perjo927/Portfolio
-https://github.com/perjo927/Portfolio
-Entry file: Portfolio/server.py
-Scanned: 2016-10-19 13:39:15.679975
-Vulnerability 1:
-File: Portfolio/server.py
- > User input at line 96, trigger word "form[":
- search_string = request.form['key']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 2:
-File: Portfolio/server.py
- > User input at line 99, trigger word "form[":
- sort_order = request.form['sort_order']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 3:
-File: Portfolio/server.py
- > User input at line 100, trigger word "form[":
- sort_by = request.form['sort_by']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-19 13:39:16.208993
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sburns/switchboard
-https://github.com/sburns/switchboard
-Entry file: switchboard/sample_app.py
-Scanned: 2016-10-19 13:39:16.742229
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ahawker/jpool
-https://github.com/ahawker/jpool
-Entry file: None
-Scanned: 2016-10-19 13:39:17.268513
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-19 13:39:19.172400
-No vulnerabilities found.
-
-
-bogdan-kulynych/cloudlectures
-https://github.com/bogdan-kulynych/cloudlectures
-Entry file: cloudlectures/flask/sessions.py
-Scanned: 2016-10-19 13:39:19.754213
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DanielleSucher/BookQueue
-https://github.com/DanielleSucher/BookQueue
-Entry file: BookQueue/app.py
-Scanned: 2016-10-19 13:39:21.156614
-Vulnerability 1:
-File: BookQueue/app.py
- > User input at line 145, trigger word "form[":
- from_email = request.form['sender'].lower()
-File: BookQueue/app.py
- > reaches line 146, trigger word "filter(":
- query = User.query.filter(User.email == from_email)
-
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-19 13:39:24.118873
-No vulnerabilities found.
-
-
-maxcnunes/flaskgaedemo
-https://github.com/maxcnunes/flaskgaedemo
-Entry file: flaskgaedemo/main.py
-Scanned: 2016-10-19 13:39:25.190868
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-domenicosolazzo/flask_examples
-https://github.com/domenicosolazzo/flask_examples
-Entry file: flask_examples/logger_example.py
-Scanned: 2016-10-19 13:39:26.525738
-No vulnerabilities found.
-
-
-akostyuk/flask-dbmigrate
-https://github.com/akostyuk/flask-dbmigrate
-Entry file: flask-dbmigrate/tests.py
-Scanned: 2016-10-19 13:39:27.063264
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-50onRed/phillypug-flask
-https://github.com/50onRed/phillypug-flask
-Entry file: phillypug-flask/phillypug/app.py
-Scanned: 2016-10-19 13:39:28.359703
-Vulnerability 1:
-File: phillypug-flask/phillypug/views.py
- > User input at line 19, trigger word "get(":
- repos = redis_client.get(repos_key)
-Reassigned in:
- File: phillypug-flask/phillypug/views.py
- > Line 21: repos = json.loads(repos)
-File: phillypug-flask/phillypug/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',repos=repos)
-
-
-
-booo/flask-gtfs
-https://github.com/booo/flask-gtfs
-Entry file: None
-Scanned: 2016-10-19 13:39:28.882710
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-19 13:39:29.396594
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nerevu/prometheus
-https://github.com/nerevu/prometheus
-Entry file: prometheus/app/__init__.py
-Scanned: 2016-10-19 13:39:29.970101
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottdnz/flask_skeleton
-https://github.com/scottdnz/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-19 13:39:30.491136
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-pavlenko-volodymyr/flask-study
-https://github.com/pavlenko-volodymyr/flask-study
-Entry file: flask-study/hello.py
-Scanned: 2016-10-19 13:39:31.054239
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-slizadel/flask-gitrcv
-https://github.com/slizadel/flask-gitrcv
-Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py
-Scanned: 2016-10-19 13:39:32.740265
-No vulnerabilities found.
-
-
-apjd/flask-heroku
-https://github.com/apjd/flask-heroku
-Entry file: flask-heroku/flasky.py
-Scanned: 2016-10-19 13:39:34.034443
-No vulnerabilities found.
-
-
-scardine/flask-locale
-https://github.com/scardine/flask-locale
-Entry file: flask-locale/tests/__init__.py
-Scanned: 2016-10-19 13:39:35.506709
-No vulnerabilities found.
-
-
-JunilJacob/Paint-app-using-Flask
-https://github.com/JunilJacob/Paint-app-using-Flask
-Entry file: Paint-app-using-Flask/hello.py
-Scanned: 2016-10-19 13:40:07.330554
-Vulnerability 1:
-File: Paint-app-using-Flask/hello.py
- > User input at line 12, trigger word "form[":
- name = request.form['pname']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 16: iname = (name)
-File: Paint-app-using-Flask/hello.py
- > reaches line 18, trigger word "execute(":
- c.execute('DELETE FROM Image WHERE file=?', iname)
-
-Vulnerability 2:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 19, trigger word "execute(":
- c.execute('INSERT INTO Image VALUES (?,?)', image)
-
-Vulnerability 3:
-File: Paint-app-using-Flask/hello.py
- > User input at line 12, trigger word "form[":
- name = request.form['pname']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 16: iname = (name)
-File: Paint-app-using-Flask/hello.py
- > reaches line 19, trigger word "execute(":
- c.execute('INSERT INTO Image VALUES (?,?)', image)
-
-Vulnerability 4:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 34, trigger word "execute(":
- for row in c.execute('SELECT * FROM Image WHERE file=?', filename):
-
-Vulnerability 5:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 36, trigger word "render_template(":
- resp = Response('' + render_template('paint.html'),status=200, mimetype='html')
-
-
-
-dimfox/flask-mega-tutorial
-https://github.com/dimfox/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-19 13:40:07.839555
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-callahad/temp-flask-persona-demo
-https://github.com/callahad/temp-flask-persona-demo
-Entry file: temp-flask-persona-demo/example.py
-Scanned: 2016-10-19 13:40:12.842540
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshsee/GAE-flask-cms
-https://github.com/joshsee/GAE-flask-cms
-Entry file: GAE-flask-cms/flask/sessions.py
-Scanned: 2016-10-19 13:40:14.388613
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshkurz/exi
-https://github.com/joshkurz/exi
-Entry file: exi/exi/tests/security/test_app/__init__.py
-Scanned: 2016-10-19 13:40:16.148298
-No vulnerabilities found.
-
-
-booo/baedproject
-https://github.com/booo/baedproject
-Entry file: baedproject/app.py
-Scanned: 2016-10-19 13:40:17.441498
-No vulnerabilities found.
-
-
-kalimatas/herokuflask
-https://github.com/kalimatas/herokuflask
-Entry file: herokuflask/app.py
-Scanned: 2016-10-19 13:40:18.744554
-No vulnerabilities found.
-
-
-norbert/helloflask
-https://github.com/norbert/helloflask
-Entry file: helloflask/hello.py
-Scanned: 2016-10-19 13:40:19.288672
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py
-
-perjo927/Portfolio
-https://github.com/perjo927/Portfolio
-Entry file: Portfolio/server.py
-Scanned: 2016-10-19 13:40:21.402448
-Vulnerability 1:
-File: Portfolio/server.py
- > User input at line 96, trigger word "form[":
- search_string = request.form['key']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 2:
-File: Portfolio/server.py
- > User input at line 99, trigger word "form[":
- sort_order = request.form['sort_order']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 3:
-File: Portfolio/server.py
- > User input at line 100, trigger word "form[":
- sort_by = request.form['sort_by']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-
-
-Pusungwi/lobotomizer
-https://github.com/Pusungwi/lobotomizer
-Entry file: None
-Scanned: 2016-10-19 13:40:21.929599
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer.
-
-ahawker/jpool
-https://github.com/ahawker/jpool
-Entry file: None
-Scanned: 2016-10-19 13:40:22.432823
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool.
-
-takosuke/pizzasuicideclub
-https://github.com/takosuke/pizzasuicideclub
-Entry file: pizzasuicideclub/psc_app/__init__.py
-Scanned: 2016-10-19 13:40:23.032365
-Vulnerability 1:
-File: pizzasuicideclub/psc_app/filters.py
- > User input at line 15, trigger word "Markup(":
- result = Markup(result)
-Reassigned in:
- File: pizzasuicideclub/psc_app/filters.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = result
-File: pizzasuicideclub/psc_app/filters.py
- > reaches line 12, trigger word "replace(":
- result = '
-
-'.join(('
%s
' % p.replace('
-', '
-') for p in _paragraph_re.split(escape(value))))
-This vulnerability is potentially sanitised by: ['escape']
-
-Vulnerability 2:
-File: pizzasuicideclub/psc_app/pages/views.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(postId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/pages/views.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('404.html',user=user)
-File: pizzasuicideclub/psc_app/pages/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pages/permalink.html',title=post.title, post=post, user=user)
-
-Vulnerability 3:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 31, trigger word "get(":
- profile = User.query.get(userId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('pages.userlist'))
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users/profile.html',profile=profile, user=user, form=form)
-
-Vulnerability 4:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 54, trigger word "flash(":
- flash('You are logged in %s' % user.username)
-
-Vulnerability 5:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 55, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 6:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 55, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 7:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 79, trigger word ".data":
- file = form.image.data
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 80: profile_pic = utilities.file_save(file, 'profilepics')
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 8:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 81, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 9:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 79, trigger word ".data":
- file = form.image.data
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 80: profile_pic = utilities.file_save(file, 'profilepics')
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 10:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 81, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 11:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 140, trigger word "get(":
- user = User.query.get(userId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 134: user = g.user
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=userId))
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 145, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users/modify_password.html',form=form, user=user)
-
-
-
-neilduncan/FlickrPlaceholders
-https://github.com/neilduncan/FlickrPlaceholders
-Entry file: FlickrPlaceholders/main.py
-Scanned: 2016-10-19 13:40:24.331840
-No vulnerabilities found.
-
-
-amaterasu-/placeholder
-https://github.com/amaterasu-/placeholder
-Entry file: placeholder/image.py
-Scanned: 2016-10-19 13:40:25.622493
-No vulnerabilities found.
-
-
-koon-kai/kiblog
-https://github.com/koon-kai/kiblog
-Entry file: kiblog/app.py
-Scanned: 2016-10-19 13:40:26.810039
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joelrojo/flask
-https://github.com/joelrojo/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-19 13:40:27.409321
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-asgoel/Merge-flask
-https://github.com/asgoel/Merge-flask
-Entry file: Merge-flask/app.py
-Scanned: 2016-10-19 13:40:28.413767
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregimba/Vodka
-https://github.com/gregimba/Vodka
-Entry file: Vodka/app.py
-Scanned: 2016-10-19 13:40:30.180609
-No vulnerabilities found.
-
-
-corydolphin/flask-olinauth
-https://github.com/corydolphin/flask-olinauth
-Entry file: flask-olinauth/example.py
-Scanned: 2016-10-19 13:40:32.375131
-No vulnerabilities found.
-
-
-danielestevez/flasktutorial
-https://github.com/danielestevez/flasktutorial
-Entry file: None
-Scanned: 2016-10-19 13:40:33.887393
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pityonline/flaskr
-https://github.com/pityonline/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:40:34.402792
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Studentapp-Flask
-https://github.com/prabeesh/Studentapp-Flask
-Entry file: Studentapp-Flask/test.py
-Scanned: 2016-10-19 13:40:35.417199
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dproni/flask_test
-https://github.com/dproni/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-19 13:41:07.583563
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scardine/flask-locale
-https://github.com/scardine/flask-locale
-Entry file: flask-locale/tests/__init__.py
-Scanned: 2016-10-19 13:41:09.009935
-No vulnerabilities found.
-
-
-callahad/temp-flask-persona-demo
-https://github.com/callahad/temp-flask-persona-demo
-Entry file: temp-flask-persona-demo/example.py
-Scanned: 2016-10-19 13:41:09.571792
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kishorekdty/paint_using_flask
-https://github.com/kishorekdty/paint_using_flask
-Entry file: None
-Scanned: 2016-10-19 13:41:11.083863
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask.
-
-joshsee/GAE-flask-cms
-https://github.com/joshsee/GAE-flask-cms
-Entry file: GAE-flask-cms/flask/sessions.py
-Scanned: 2016-10-19 13:41:14.619994
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rasheedh/Heroku-Paint-Using-Flask
-https://github.com/rasheedh/Heroku-Paint-Using-Flask
-Entry file: None
-Scanned: 2016-10-19 13:41:16.136504
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask.
-
-sreekanthkaralmanna/heroku-paint-app-using-flask
-https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask
-Entry file: None
-Scanned: 2016-10-19 13:41:16.662161
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask.
-
-mikewallace1979/milk
-https://github.com/mikewallace1979/milk
-Entry file: milk/milk.py
-Scanned: 2016-10-19 13:41:18.994033
-No vulnerabilities found.
-
-
-goonpug/goonpug-stats
-https://github.com/goonpug/goonpug-stats
-Entry file: goonpug-stats/goonpug/__init__.py
-Scanned: 2016-10-19 13:41:20.796108
-No vulnerabilities found.
-
-
-clly/blog.md
-https://github.com/clly/blog.md
-Entry file: blog/flaskr.py
-Scanned: 2016-10-19 13:41:21.312854
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-simplyluke/dothis
-https://github.com/simplyluke/dothis
-Entry file: dothis/dothis.py
-Scanned: 2016-10-19 13:41:22.606795
-No vulnerabilities found.
-
-
-oberkowitz/improv
-https://github.com/oberkowitz/improv
-Entry file: improv/mytest/app.py
-Scanned: 2016-10-19 13:41:25.954182
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: improv/mytest/venv/lib/python2.7/genericpath.py
-
-mikeboers/Flask-Images
-https://github.com/mikeboers/Flask-Images
-Entry file: Flask-Images/tests/__init__.py
-Scanned: 2016-10-19 13:41:28.474603
-No vulnerabilities found.
-
-
-berlotto/flask-app-template
-https://github.com/berlotto/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-19 13:41:29.458863
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-corydolphin/flask-jsonpify
-https://github.com/corydolphin/flask-jsonpify
-Entry file: flask-jsonpify/test.py
-Scanned: 2016-10-19 13:41:31.628687
-No vulnerabilities found.
-
-
-eadmundo/flask-static-blog
-https://github.com/eadmundo/flask-static-blog
-Entry file: flask-static-blog/app/__init__.py
-Scanned: 2016-10-19 13:41:33.563474
-Vulnerability 1:
-File: flask-static-blog/app/blueprints/blog/views.py
- > User input at line 17, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 30: pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10))
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0])
-File: flask-static-blog/app/blueprints/blog/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args)
-
-Vulnerability 2:
-File: flask-static-blog/app/blueprints/blog/views.py
- > User input at line 30, trigger word "get(":
- pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10))
-Reassigned in:
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0])
-File: flask-static-blog/app/blueprints/blog/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args)
-
-
-
-0atman/flask-basic
-https://github.com/0atman/flask-basic
-Entry file: flask-basic/flask-basic.py
-Scanned: 2016-10-19 13:41:35.356511
-No vulnerabilities found.
-
-
-clmns/flasktest
-https://github.com/clmns/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-19 13:41:36.398358
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zfdang/memcached-in-openshift
-https://github.com/zfdang/memcached-in-openshift
-Entry file: memcached-in-openshift/wsgi/main.py
-Scanned: 2016-10-19 13:41:36.923431
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-garethpaul/flask-sample
-https://github.com/garethpaul/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-19 13:41:37.934024
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-naveenpremchand02/flask_url
-https://github.com/naveenpremchand02/flask_url
-Entry file: flask_url/url.py
-Scanned: 2016-10-19 13:41:38.453126
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiechao06/Flask-NavBar
-https://github.com/xiechao06/Flask-NavBar
-Entry file: Flask-NavBar/flask_nav_bar.py
-Scanned: 2016-10-19 13:41:39.482550
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cpdean/flask-oauth-tutorial
-https://github.com/cpdean/flask-oauth-tutorial
-Entry file: flask-oauth-tutorial/flaskr.py
-Scanned: 2016-10-19 13:41:40.783765
-No vulnerabilities found.
-
-
-nsfyn55/flask-mega-tutorial
-https://github.com/nsfyn55/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-19 13:42:09.431953
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kshitizrimal/flaskr-modified
-https://github.com/kshitizrimal/flaskr-modified
-Entry file: flaskr-modified/flaskr.py
-Scanned: 2016-10-19 13:42:10.047560
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prasanthkumara/Heroku-Paint-App-Using--Flask
-https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask
-Entry file: None
-Scanned: 2016-10-19 13:42:13.069764
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask.
-
-pyxze/PyxzeCorpus
-https://github.com/pyxze/PyxzeCorpus
-Entry file: PyxzeCorpus/corpus.py
-Scanned: 2016-10-19 13:42:17.356769
-No vulnerabilities found.
-
-
-crcsmnky/thehotspot
-https://github.com/crcsmnky/thehotspot
-Entry file: thehotspot/v2/app.py
-Scanned: 2016-10-19 13:42:19.006316
-Vulnerability 1:
-File: thehotspot/v2/app.py
- > User input at line 54, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('places.html',places=places, count=count, skip=checkins_skip)
-
-Vulnerability 2:
-File: thehotspot/v2/app.py
- > User input at line 64, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users.html',users=users, count=count, skip=checkins_skip)
-
-Vulnerability 3:
-File: thehotspot/v2/app.py
- > User input at line 73, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 82, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('checkins.html',checkins=checkins, users=users, places=places, skip=checkins_skip, count=count)
-
-Vulnerability 4:
-File: thehotspot/v2/app.py
- > User input at line 103, trigger word "get(":
- cats_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('categories.html',categories=categories, count=count, skip=cats_skip)
-
-Vulnerability 5:
-File: thehotspot/v2/app.py
- > User input at line 114, trigger word "get(":
- places_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 118, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=cat, places=places, mapped=places.clone(), count=cat['count'], skip=places_skip)
-
-
-
-etscrivner/sovereign-states
-https://github.com/etscrivner/sovereign-states
-Entry file: sovereign-states/sovereign_states/api.py
-Scanned: 2016-10-19 13:42:20.485120
-No vulnerabilities found.
-
-
-croach/cheap-and-scalable-webistes-with-flask-code
-https://github.com/croach/cheap-and-scalable-webistes-with-flask-code
-Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py
-Scanned: 2016-10-19 13:42:21.898919
-No vulnerabilities found.
-
-
-sreedathns/paint-app-using-heroku-and-flask
-https://github.com/sreedathns/paint-app-using-heroku-and-flask
-Entry file: None
-Scanned: 2016-10-19 13:42:22.418314
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask.
-
-nesv/cask
-https://github.com/nesv/cask
-Entry file: None
-Scanned: 2016-10-19 13:42:22.938693
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask.
-
-chadgh/chessy
-https://github.com/chadgh/chessy
-Entry file: None
-Scanned: 2016-10-19 13:42:23.459624
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wowo/pithermo
-https://github.com/wowo/pithermo
-Entry file: pithermo/pithermo.py
-Scanned: 2016-10-19 13:42:29.484233
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aranasaurus/android-demo-server
-https://github.com/aranasaurus/android-demo-server
-Entry file: android-demo-server/app.py
-Scanned: 2016-10-19 13:42:31.495709
-Vulnerability 1:
-File: android-demo-server/app.py
- > User input at line 21, trigger word "get(":
- r = requests.get(url.format(query))
-Reassigned in:
- File: android-demo-server/app.py
- > Line 22: images = [(i, json.dumps(i)) for i in json.loads(r.text)['responseData']['results']]
-File: android-demo-server/app.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',images=images)
-
-
-
-mjhea0/flask-intro
-https://github.com/mjhea0/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-19 13:42:32.933805
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-deepgully/me
-https://github.com/deepgully/me
-Entry file: me/settings.py
-Scanned: 2016-10-19 13:42:33.575633
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mickey06/Flask-principal-example
-https://github.com/mickey06/Flask-principal-example
-Entry file: Flask-principal-example/FPrincipals.py
-Scanned: 2016-10-19 13:42:35.046839
-No vulnerabilities found.
-
-
-crazygit/flask
-https://github.com/crazygit/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-19 13:42:35.658145
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wingu/flask_filters
-https://github.com/wingu/flask_filters
-Entry file: flask_filters/test_flask_filters.py
-Scanned: 2016-10-19 13:42:37.051365
-No vulnerabilities found.
-
-
-BuongiornoMIP/Reding
-https://github.com/BuongiornoMIP/Reding
-Entry file: Reding/reding/app.py
-Scanned: 2016-10-19 13:42:39.441537
-No vulnerabilities found.
-
-
-mphuie/flask_base
-https://github.com/mphuie/flask_base
-Entry file: flask_base/myapp/__init__.py
-Scanned: 2016-10-19 13:42:41.358343
-No vulnerabilities found.
-
-
-colwilson/flask-lazyapi
-https://github.com/colwilson/flask-lazyapi
-Entry file: flask-lazyapi/demo_server.py
-Scanned: 2016-10-19 13:42:41.905909
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiechao06/Flask-DataBrowser
-https://github.com/xiechao06/Flask-DataBrowser
-Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py
-Scanned: 2016-10-19 13:42:42.449200
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knowshan/flaskey
-https://github.com/knowshan/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-19 13:42:43.929122
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Masagin/FlaskCelery
-https://github.com/Masagin/FlaskCelery
-Entry file: FlaskCelery/flask.py
-Scanned: 2016-10-19 13:42:44.445143
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-denz/flask_introspect
-https://github.com/denz/flask_introspect
-Entry file: flask_introspect/test/test_blueprint.py
-Scanned: 2016-10-19 13:43:11.438578
-No vulnerabilities found.
-
-
-EvilDmitri/flask-mikroblog
-https://github.com/EvilDmitri/flask-mikroblog
-Entry file: flask-mikroblog/app/__init__.py
-Scanned: 2016-10-19 13:43:12.872673
-No vulnerabilities found.
-
-
-maxcnunes/flask_bravi
-https://github.com/maxcnunes/flask_bravi
-Entry file: flask_bravi/braviapp/__init__.py
-Scanned: 2016-10-19 13:43:14.385471
-No vulnerabilities found.
-
-
-zhemao/flask_demo
-https://github.com/zhemao/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-19 13:43:18.412051
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SalemHarrache-Archive/flask_chat_eventsource
-https://github.com/SalemHarrache-Archive/flask_chat_eventsource
-Entry file: flask_chat_eventsource/server.py
-Scanned: 2016-10-19 13:43:18.945526
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ryanolson/flask-couchdb-schematics
-https://github.com/ryanolson/flask-couchdb-schematics
-Entry file: flask-couchdb-schematics/example/guestbook.py
-Scanned: 2016-10-19 13:43:22.513938
-Vulnerability 1:
-File: flask-couchdb-schematics/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-schematics/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-pouyan-ghasemi/flask-sql-cms
-https://github.com/pouyan-ghasemi/flask-sql-cms
-Entry file: flask-sql-cms/app.py
-Scanned: 2016-10-19 13:43:23.056501
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-texuf/myflaskproject
-https://github.com/texuf/myflaskproject
-Entry file: myflaskproject/hello.py
-Scanned: 2016-10-19 13:43:24.341238
-No vulnerabilities found.
-
-
-csesoc/bark-core
-https://github.com/csesoc/bark-core
-Entry file: bark-core/bark/__init__.py
-Scanned: 2016-10-19 13:43:25.354615
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-croach/cheap-and-scalable-webistes-with-flask-code
-https://github.com/croach/cheap-and-scalable-webistes-with-flask-code
-Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py
-Scanned: 2016-10-19 13:43:27.768890
-No vulnerabilities found.
-
-
-nesv/cask
-https://github.com/nesv/cask
-Entry file: None
-Scanned: 2016-10-19 13:43:30.290565
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask.
-
-lee212/fg-ws
-https://github.com/lee212/fg-ws
-Entry file: fg-ws/fgws/ws/FGWSApps.py
-Scanned: 2016-10-19 13:43:31.840161
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brunsgaard/qwablog
-https://github.com/brunsgaard/qwablog
-Entry file: qwablog/qwablog.py
-Scanned: 2016-10-19 13:43:34.273183
-No vulnerabilities found.
-
-
-nutrislice/mandrill-webhook-redirector
-https://github.com/nutrislice/mandrill-webhook-redirector
-Entry file: mandrill-webhook-redirector/webhook-router.py
-Scanned: 2016-10-19 13:43:35.598481
-Vulnerability 1:
-File: mandrill-webhook-redirector/webhook-router.py
- > User input at line 13, trigger word "form[":
- mandrill_event = json.loads(request.form['mandrill_events'])
-Reassigned in:
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 14: metadata = mandrill_event[0]['msg']['metadata']
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 15: domain = metadata['domain']
-File: mandrill-webhook-redirector/webhook-router.py
- > reaches line 16, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/')
-
-
-
-rubinovitz/fourequality
-https://github.com/rubinovitz/fourequality
-Entry file: fourequality/app.py
-Scanned: 2016-10-19 13:43:38.336062
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-darylchang/Hacker-Viz
-https://github.com/darylchang/Hacker-Viz
-Entry file: Hacker-Viz/flaskDir.py
-Scanned: 2016-10-19 13:43:39.714517
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexlod/movielist
-https://github.com/alexlod/movielist
-Entry file: movielist/movielist.py
-Scanned: 2016-10-19 13:43:41.239092
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dhumbert/literable
-https://github.com/dhumbert/literable
-Entry file: None
-Scanned: 2016-10-19 13:43:46.817740
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhumbert/literable.
-
-ArcTanSusan/Task_List
-https://github.com/ArcTanSusan/Task_List
-Entry file: Task_List/tipsy/tipsy.py
-Scanned: 2016-10-19 13:43:48.467266
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rbuysse/url_shortener
-https://github.com/rbuysse/url_shortener
-Entry file: url_shortener/url.py
-Scanned: 2016-10-19 13:43:49.751466
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mjhea0/flask-intro
-https://github.com/mjhea0/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-19 13:43:50.979633
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-seanrose/box-arcade
-https://github.com/seanrose/box-arcade
-Entry file: box-arcade/app/__init__.py
-Scanned: 2016-10-19 13:43:51.974163
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-techniq/flask-wdb
-https://github.com/techniq/flask-wdb
-Entry file: flask-wdb/example.py
-Scanned: 2016-10-19 13:43:53.266988
-No vulnerabilities found.
-
-
-mphuie/flask_base
-https://github.com/mphuie/flask_base
-Entry file: flask_base/myapp/__init__.py
-Scanned: 2016-10-19 13:43:55.728412
-No vulnerabilities found.
-
-
-theho/flask-wsgi
-https://github.com/theho/flask-wsgi
-Entry file: flask-wsgi/wsgi.py
-Scanned: 2016-10-19 13:44:14.824987
-No vulnerabilities found.
-
-
-adityaathalye/flaskr
-https://github.com/adityaathalye/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:44:15.330914
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knowshan/flaskey
-https://github.com/knowshan/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-19 13:44:16.835554
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyr/flaskapp
-https://github.com/andyr/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:44:20.355829
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp.
-
-denz/flask_introspect
-https://github.com/denz/flask_introspect
-Entry file: flask_introspect/test/test_blueprint.py
-Scanned: 2016-10-19 13:44:21.780496
-No vulnerabilities found.
-
-
-ekfriis/flask-mbtiles
-https://github.com/ekfriis/flask-mbtiles
-Entry file: flask-mbtiles/mbtileserver.py
-Scanned: 2016-10-19 13:44:24.082855
-No vulnerabilities found.
-
-
-hyaticua/flask-blog
-https://github.com/hyaticua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-19 13:44:24.677194
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-thearchduke/flask-boiler
-https://github.com/thearchduke/flask-boiler
-Entry file: None
-Scanned: 2016-10-19 13:44:25.202160
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-StefanKjartansson/bower-flask
-https://github.com/StefanKjartansson/bower-flask
-Entry file: bower-flask/server.py
-Scanned: 2016-10-19 13:44:27.525798
-No vulnerabilities found.
-
-
-tanayseven/Voix
-https://github.com/tanayseven/Voix
-Entry file: None
-Scanned: 2016-10-19 13:44:28.111487
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gatesphere/flaskr-flask-tutorial
-https://github.com/gatesphere/flaskr-flask-tutorial
-Entry file: flaskr-flask-tutorial/flaskr/flaskr.py
-Scanned: 2016-10-19 13:44:29.431785
-No vulnerabilities found.
-
-
-bazerk/baz-flask-base
-https://github.com/bazerk/baz-flask-base
-Entry file: baz-flask-base/app/app.py
-Scanned: 2016-10-19 13:44:33.342125
-Vulnerability 1:
-File: baz-flask-base/app/frontend/views.py
- > User input at line 26, trigger word "get(":
- form = RegisterForm(username=request.args.get('username', twitter_name), password=request.args.get('password', None))
-Reassigned in:
- File: baz-flask-base/app/frontend/views.py
- > Line 30: err = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets)
- File: baz-flask-base/app/frontend/views.py
- > Line 30: user = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets)
- File: baz-flask-base/app/frontend/views.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('frontend.login'))
-File: baz-flask-base/app/frontend/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('frontend/register.html',form=form, twitter_name=twitter_name)
-
-Vulnerability 2:
-File: baz-flask-base/app/frontend/views.py
- > User input at line 48, trigger word "get(":
- form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None))
-Reassigned in:
- File: baz-flask-base/app/frontend/views.py
- > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash)
- File: baz-flask-base/app/frontend/views.py
- > Line 57: session['user_id'] = user.id
- File: baz-flask-base/app/frontend/views.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = redirect('')
-File: baz-flask-base/app/frontend/views.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form)
-
-
-
-ryanolson/flask-couchdb-schematics
-https://github.com/ryanolson/flask-couchdb-schematics
-Entry file: flask-couchdb-schematics/example/guestbook.py
-Scanned: 2016-10-19 13:44:34.884042
-Vulnerability 1:
-File: flask-couchdb-schematics/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-schematics/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-pouyan-ghasemi/flask-sql-cms
-https://github.com/pouyan-ghasemi/flask-sql-cms
-Entry file: flask-sql-cms/app.py
-Scanned: 2016-10-19 13:44:35.421788
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Andrey-Khobnya/flask-sessions-mongo
-https://github.com/Andrey-Khobnya/flask-sessions-mongo
-Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py
-Scanned: 2016-10-19 13:44:36.749102
-No vulnerabilities found.
-
-
-igrishaev/youtube-python-api-sample
-https://github.com/igrishaev/youtube-python-api-sample
-Entry file: youtube-python-api-sample/app.py
-Scanned: 2016-10-19 13:44:37.878135
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nutrislice/mandrill-webhook-redirector
-https://github.com/nutrislice/mandrill-webhook-redirector
-Entry file: mandrill-webhook-redirector/webhook-router.py
-Scanned: 2016-10-19 13:44:39.302194
-Vulnerability 1:
-File: mandrill-webhook-redirector/webhook-router.py
- > User input at line 13, trigger word "form[":
- mandrill_event = json.loads(request.form['mandrill_events'])
-Reassigned in:
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 14: metadata = mandrill_event[0]['msg']['metadata']
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 15: domain = metadata['domain']
-File: mandrill-webhook-redirector/webhook-router.py
- > reaches line 16, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/')
-
-
-
-kfr2/pynances
-https://github.com/kfr2/pynances
-Entry file: pynances/pynances/pynances.py
-Scanned: 2016-10-19 13:44:41.662646
-No vulnerabilities found.
-
-
-WilliamMayor/geoffrey
-https://github.com/WilliamMayor/geoffrey
-Entry file: geoffrey/geoffrey.py
-Scanned: 2016-10-19 13:44:42.965642
-No vulnerabilities found.
-
-
-Timothee/Passerelle
-https://github.com/Timothee/Passerelle
-Entry file: Passerelle/passerelle.py
-Scanned: 2016-10-19 13:44:44.256621
-No vulnerabilities found.
-
-
-fusic-com/flask-todo
-https://github.com/fusic-com/flask-todo
-Entry file: flask-todo/backend/app.py
-Scanned: 2016-10-19 13:44:50.628244
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bkabrda/flask-whooshee
-https://github.com/bkabrda/flask-whooshee
-Entry file: flask-whooshee/test.py
-Scanned: 2016-10-19 13:44:53.249500
-No vulnerabilities found.
-
-
-DavidWittman/csrgenerator.com
-https://github.com/DavidWittman/csrgenerator.com
-Entry file: None
-Scanned: 2016-10-19 13:44:54.260385
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-techniq/flask-wdb
-https://github.com/techniq/flask-wdb
-Entry file: flask-wdb/example.py
-Scanned: 2016-10-19 13:44:55.556738
-No vulnerabilities found.
-
-
-1000ch/flask-handson
-https://github.com/1000ch/flask-handson
-Entry file: flask-handson/flaskr/__init__.py
-Scanned: 2016-10-19 13:44:56.109146
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ajuna/car-registration
-https://github.com/ajuna/car-registration
-Entry file: None
-Scanned: 2016-10-19 13:44:56.619963
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration.
-
-jishnujagajeeve/Flaskr
-https://github.com/jishnujagajeeve/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-19 13:45:14.183509
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Basher51/Flaskr
-https://github.com/Basher51/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-19 13:45:15.686184
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyr/flaskapp
-https://github.com/andyr/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:45:17.191472
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp.
-
-sagnew/Prank-Roulette
-https://github.com/sagnew/Prank-Roulette
-Entry file: Prank-Roulette/app.py
-Scanned: 2016-10-19 13:45:18.706616
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kaste/FlaskDeferredHandler
-https://github.com/kaste/FlaskDeferredHandler
-Entry file: FlaskDeferredHandler/flask_handler_test.py
-Scanned: 2016-10-19 13:45:23.035199
-No vulnerabilities found.
-
-
-adityaathalye/flaskr2
-https://github.com/adityaathalye/flaskr2
-Entry file: flaskr2/app.py
-Scanned: 2016-10-19 13:45:24.324687
-No vulnerabilities found.
-
-
-ConceptPending/flaskTemplate
-https://github.com/ConceptPending/flaskTemplate
-Entry file: flaskTemplate/server.py
-Scanned: 2016-10-19 13:45:26.531627
-No vulnerabilities found.
-
-
-AlexMost/Flask-starter
-https://github.com/AlexMost/Flask-starter
-Entry file: Flask-starter/app.py
-Scanned: 2016-10-19 13:45:27.920716
-No vulnerabilities found.
-
-
-samgclarke/flask-microblog
-https://github.com/samgclarke/flask-microblog
-Entry file: None
-Scanned: 2016-10-19 13:45:28.441725
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jonomillin/learning-flask
-https://github.com/jonomillin/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-19 13:45:29.048258
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nthfloor/Flask_learn
-https://github.com/nthfloor/Flask_learn
-Entry file: Flask_learn/login_system/flskr.py
-Scanned: 2016-10-19 13:45:33.524906
-Vulnerability 1:
-File: Flask_learn/login_system/flskr.py
- > User input at line 116, trigger word "get(":
- username = request.form.get('username')
-File: Flask_learn/login_system/flskr.py
- > reaches line 119, trigger word "filter(":
- user = User.query.filter(User.name == username and User.password == password).first()
-
-Vulnerability 2:
-File: Flask_learn/login_system/flskr.py
- > User input at line 117, trigger word "get(":
- password = request.form.get('password')
-File: Flask_learn/login_system/flskr.py
- > reaches line 119, trigger word "filter(":
- user = User.query.filter(User.name == username and User.password == password).first()
-
-
-
-berlotto/hero-flask
-https://github.com/berlotto/hero-flask
-Entry file: hero-flask/hero/__init__.py
-Scanned: 2016-10-19 13:45:34.973683
-No vulnerabilities found.
-
-
-mmcgahan/flask-labs-bb
-https://github.com/mmcgahan/flask-labs-bb
-Entry file: flask-labs-bb/flask_labs/__init__.py
-Scanned: 2016-10-19 13:45:35.572201
-Vulnerability 1:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 29, trigger word "filter(":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-
-Vulnerability 2:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 29, trigger word ".data":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 29, trigger word "filter(":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-
-Vulnerability 3:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index'))
-
-Vulnerability 4:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 36, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index'))
-
-Vulnerability 5:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',login_form=login_form)
-
-
-
-daisuzu/flask-app-sample
-https://github.com/daisuzu/flask-app-sample
-Entry file: flask-app-sample/db.py
-Scanned: 2016-10-19 13:45:36.882015
-No vulnerabilities found.
-
-
-penpyt/flask-couchdb-auth
-https://github.com/penpyt/flask-couchdb-auth
-Entry file: flask-couchdb-auth/example/guestbook.py
-Scanned: 2016-10-19 13:45:38.385531
-Vulnerability 1:
-File: flask-couchdb-auth/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-auth/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-rodreegez/flask-twitter-auth
-https://github.com/rodreegez/flask-twitter-auth
-Entry file: None
-Scanned: 2016-10-19 13:45:38.913765
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth.
-
-DamnedFacts/flask-hello-world
-https://github.com/DamnedFacts/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-19 13:45:39.483685
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ariamoraine/kitten-generator
-https://github.com/ariamoraine/kitten-generator
-Entry file: kitten-generator/flaskhello.py
-Scanned: 2016-10-19 13:45:41.298961
-No vulnerabilities found.
-
-
-honestappalachia/honest_site
-https://github.com/honestappalachia/honest_site
-Entry file: honest_site/run.py
-Scanned: 2016-10-19 13:45:43.609346
-Vulnerability 1:
-File: honest_site/run.py
- > User input at line 36, trigger word "get(":
- template = page.meta.get('template', 'default.html')
-File: honest_site/run.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,page=page)
-
-
-
-daikeshi/one-dollar-metasearch-engine
-https://github.com/daikeshi/one-dollar-metasearch-engine
-Entry file: one-dollar-metasearch-engine/app/__init__.py
-Scanned: 2016-10-19 13:45:44.154934
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-honestappalachia/honest_hiddenservice
-https://github.com/honestappalachia/honest_hiddenservice
-Entry file: honest_hiddenservice/run.py
-Scanned: 2016-10-19 13:45:50.167407
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-msalahi/art-party
-https://github.com/msalahi/art-party
-Entry file: art-party/app.py
-Scanned: 2016-10-19 13:45:54.331658
-No vulnerabilities found.
-
-
-saltire/artpubpy
-https://github.com/saltire/artpubpy
-Entry file: artpubpy/artpubpy.py
-Scanned: 2016-10-19 13:45:55.842265
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mcniac/simple-blog
-https://github.com/mcniac/simple-blog
-Entry file: simple-blog/tumblelog/__init__.py
-Scanned: 2016-10-19 13:45:58.851477
-No vulnerabilities found.
-
-
-ryanrdetzel/blimp-commit
-https://github.com/ryanrdetzel/blimp-commit
-Entry file: blimp-commit/blimp_commit.py
-Scanned: 2016-10-19 13:46:00.122458
-No vulnerabilities found.
-
-
-fusic-com/flask-webcache
-https://github.com/fusic-com/flask-webcache
-Entry file: flask-webcache/contrib/sleepycalc/app.py
-Scanned: 2016-10-19 13:46:02.313205
-No vulnerabilities found.
-
-
-rehandalal/flask-mobility
-https://github.com/rehandalal/flask-mobility
-Entry file: flask-mobility/flask_mobility/tests/test_decorators.py
-Scanned: 2016-10-19 13:46:16.874195
-Vulnerability 1:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 46, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 48, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 2:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 46, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 51, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-Vulnerability 3:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 67, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 69, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 4:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 67, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 72, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-Vulnerability 5:
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > User input at line 33, trigger word "get(":
- MOBILE_COOKIE = self.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > reaches line 36, trigger word "set_cookie(":
- self.app.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 6:
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > User input at line 33, trigger word "get(":
- MOBILE_COOKIE = self.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > reaches line 40, trigger word "set_cookie(":
- self.app.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-
-
-kelp404/Flask-GAE
-https://github.com/kelp404/Flask-GAE
-Entry file: None
-Scanned: 2016-10-19 13:46:17.384044
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jaysonsantos/jinja-assets-compressor
-https://github.com/jaysonsantos/jinja-assets-compressor
-Entry file: jinja-assets-compressor/jac/contrib/flask.py
-Scanned: 2016-10-19 13:46:20.002140
-No vulnerabilities found.
-
-
-nabetama/flaskr
-https://github.com/nabetama/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:46:24.013097
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sagnew/Prank-Roulette
-https://github.com/sagnew/Prank-Roulette
-Entry file: Prank-Roulette/app.py
-Scanned: 2016-10-19 13:46:25.523032
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jpscaletti/authcode
-https://github.com/jpscaletti/authcode
-Entry file: authcode/examples/default/app.py
-Scanned: 2016-10-19 13:46:28.113012
-No vulnerabilities found.
-
-
-samgclarke/flask-microblog
-https://github.com/samgclarke/flask-microblog
-Entry file: None
-Scanned: 2016-10-19 13:46:30.097385
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shunyata/flask-helloworld
-https://github.com/shunyata/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-19 13:46:31.919394
-No vulnerabilities found.
-
-
-stephen-allison/basic-flask
-https://github.com/stephen-allison/basic-flask
-Entry file: None
-Scanned: 2016-10-19 13:46:32.454791
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask.
-
-bollwyvl/flask-reloaded
-https://github.com/bollwyvl/flask-reloaded
-Entry file: None
-Scanned: 2016-10-19 13:46:35.983333
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded.
-
-kitanata/flask-demo
-https://github.com/kitanata/flask-demo
-Entry file: None
-Scanned: 2016-10-19 13:46:37.515280
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo.
-
-berlotto/hero-flask
-https://github.com/berlotto/hero-flask
-Entry file: hero-flask/hero/__init__.py
-Scanned: 2016-10-19 13:46:38.918590
-No vulnerabilities found.
-
-
-flyingsparx/MongoFlask
-https://github.com/flyingsparx/MongoFlask
-Entry file: MongoFlask/application.py
-Scanned: 2016-10-19 13:46:40.227721
-Vulnerability 1:
-File: MongoFlask/application.py
- > User input at line 39, trigger word "form[":
- person = User.query.filter(User.name == request.form['username']).first()
-File: MongoFlask/application.py
- > reaches line 39, trigger word "filter(":
- person = User.query.filter(User.name == request.form['username']).first()
-
-Vulnerability 2:
-File: MongoFlask/application.py
- > User input at line 64, trigger word "form[":
- person = User.query.filter(User.name == request.form['username']).first()
-Reassigned in:
- File: MongoFlask/application.py
- > Line 67: session['id'] = person.id
-File: MongoFlask/application.py
- > reaches line 64, trigger word "filter(":
- person = User.query.filter(User.name == request.form['username']).first()
-
-
-
-DanAlbert/flask-guestbook
-https://github.com/DanAlbert/flask-guestbook
-Entry file: flask-guestbook/guestbook.py
-Scanned: 2016-10-19 13:46:41.533754
-No vulnerabilities found.
-
-
-kirkeby/empty-flask
-https://github.com/kirkeby/empty-flask
-Entry file: empty-flask/app/app.py
-Scanned: 2016-10-19 13:46:42.544778
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rehandalal/buchner
-https://github.com/rehandalal/buchner
-Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py
-Scanned: 2016-10-19 13:46:44.548815
-No vulnerabilities found.
-
-
-vitalk/flask-staticutils
-https://github.com/vitalk/flask-staticutils
-Entry file: flask-staticutils/tests/test_app/__init__.py
-Scanned: 2016-10-19 13:46:45.982647
-No vulnerabilities found.
-
-
-chiwong/flask_quickstart
-https://github.com/chiwong/flask_quickstart
-Entry file: flask_quickstart/hello.py
-Scanned: 2016-10-19 13:46:46.649732
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py
-
-archieyang/flask_app
-https://github.com/archieyang/flask_app
-Entry file: None
-Scanned: 2016-10-19 13:46:47.165483
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app.
-
-ipfans/openshift-flask-template
-https://github.com/ipfans/openshift-flask-template
-Entry file: openshift-flask-template/wsgi/mainapp.py
-Scanned: 2016-10-19 13:46:52.470867
-No vulnerabilities found.
-
-
-minhtuev/flask-google-map-example
-https://github.com/minhtuev/flask-google-map-example
-Entry file: flask-google-map-example/server.py
-Scanned: 2016-10-19 13:46:53.760515
-No vulnerabilities found.
-
-
-DamnedFacts/flask-hello-world
-https://github.com/DamnedFacts/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-19 13:46:56.307424
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-philangist/url-shorten
-https://github.com/philangist/url-shorten
-Entry file: url-shorten/shorten.py
-Scanned: 2016-10-19 13:46:57.844037
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fabionatali/DigiWebStats
-https://github.com/fabionatali/DigiWebStats
-Entry file: DigiWebStats/app.py
-Scanned: 2016-10-19 13:46:59.389584
-Vulnerability 1:
-File: DigiWebStats/app.py
- > User input at line 31, trigger word "get(":
- start_date = request.args.get('start_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 47, trigger word "execute(":
- data = engine.execute(query).fetchall()
-
-Vulnerability 2:
-File: DigiWebStats/app.py
- > User input at line 32, trigger word "get(":
- end_date = request.args.get('end_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 47, trigger word "execute(":
- data = engine.execute(query).fetchall()
-
-Vulnerability 3:
-File: DigiWebStats/app.py
- > User input at line 31, trigger word "get(":
- start_date = request.args.get('start_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data)
-
-Vulnerability 4:
-File: DigiWebStats/app.py
- > User input at line 32, trigger word "get(":
- end_date = request.args.get('end_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data)
-
-
-
-confessin/addressbook
-https://github.com/confessin/addressbook
-Entry file: addressbook/addressbook.py
-Scanned: 2016-10-19 13:47:02.026312
-No vulnerabilities found.
-
-
-nafur/flmpc
-https://github.com/nafur/flmpc
-Entry file: flmpc/main.py
-Scanned: 2016-10-19 13:47:03.447359
-No vulnerabilities found.
-
-
-honestappalachia/honest_hiddenservice
-https://github.com/honestappalachia/honest_hiddenservice
-Entry file: honest_hiddenservice/run.py
-Scanned: 2016-10-19 13:47:03.966636
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kvalle/greetr
-https://github.com/kvalle/greetr
-Entry file: greetr/greetr/__init__.py
-Scanned: 2016-10-19 13:47:18.405753
-No vulnerabilities found.
-
-
-mjhea0/brew
-https://github.com/mjhea0/brew
-Entry file: brew/app.py
-Scanned: 2016-10-19 13:47:20.803085
-No vulnerabilities found.
-
-
-dan-v/crossfitboxreview
-https://github.com/dan-v/crossfitboxreview
-Entry file: crossfitboxreview/seed_affiliates.py
-Scanned: 2016-10-19 13:47:24.285512
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DoctorMalboro/leandropoblet.com
-https://github.com/DoctorMalboro/leandropoblet.com
-Entry file: None
-Scanned: 2016-10-19 13:47:26.276503
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/DoctorMalboro/leandropoblet.com.
-
-ryanrdetzel/blimp-commit
-https://github.com/ryanrdetzel/blimp-commit
-Entry file: blimp-commit/blimp_commit.py
-Scanned: 2016-10-19 13:47:27.573437
-No vulnerabilities found.
-
-
-danielholmstrom/flask-alchemyview
-https://github.com/danielholmstrom/flask-alchemyview
-Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
-Scanned: 2016-10-19 13:47:32.041189
-Vulnerability 1:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 150, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:get',id=model_id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 150, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:get',id=model_id))
-
-Vulnerability 2:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 154, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:get',id='a string'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 154, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:get',id='a string'))
-
-Vulnerability 3:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 181, trigger word "get(":
- m = self.session.query(SimpleModel).get(model_id)
-Reassigned in:
- File: flask-alchemyview/tests/test_view.py
- > Line 174: m = SimpleModel('name')
- File: flask-alchemyview/tests/test_view.py
- > Line 177: model_id = m.id
-File: flask-alchemyview/tests/test_view.py
- > reaches line 178, trigger word "url_for(":
- response = self.json_put(url_for('SimpleModelView:put',id=model_id), 'name''new name')
-
-Vulnerability 4:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 197, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:delete',id=model_id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 197, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:delete',id=model_id))
-
-Vulnerability 5:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 209, trigger word "get(":
- m = self.session.query(SimpleModel).get(model_id)
-Reassigned in:
- File: flask-alchemyview/tests/test_view.py
- > Line 202: m = SimpleModel('name')
- File: flask-alchemyview/tests/test_view.py
- > Line 205: model_id = m.id
-File: flask-alchemyview/tests/test_view.py
- > reaches line 206, trigger word "url_for(":
- response = self.json_delete(url_for('SimpleModelView:put',id=model_id))
-
-Vulnerability 6:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 236, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 236, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10))
-
-Vulnerability 7:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 246, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 246, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-
-Vulnerability 8:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 251, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id='a string'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 251, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id='a string'))
-
-Vulnerability 9:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 258, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 258, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid'))
-
-Vulnerability 10:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 266, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:index'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 266, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:index'))
-
-Vulnerability 11:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 279, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 279, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-
-Vulnerability 12:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > reaches line 56, trigger word "url_for(":
- response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False)
-
-Vulnerability 13:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > reaches line 67, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-
-Vulnerability 14:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > reaches line 56, trigger word "url_for(":
- response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False)
-
-Vulnerability 15:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > reaches line 67, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-
-
-
-vovantics/flask-bluebone
-https://github.com/vovantics/flask-bluebone
-Entry file: flask-bluebone/app/app.py
-Scanned: 2016-10-19 13:47:32.618471
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-jpscaletti/authcode
-https://github.com/jpscaletti/authcode
-Entry file: authcode/examples/default/app.py
-Scanned: 2016-10-19 13:47:35.698731
-No vulnerabilities found.
-
-
-abulte/flask-arduino-websocket-sqlite
-https://github.com/abulte/flask-arduino-websocket-sqlite
-Entry file: flask-arduino-websocket-sqlite/app.py
-Scanned: 2016-10-19 13:47:38.150209
-No vulnerabilities found.
-
-
-futuregrid/flask_cm
-https://github.com/futuregrid/flask_cm
-Entry file: flask_cm/examples/forms/app.py
-Scanned: 2016-10-19 13:47:40.746779
-Vulnerability 1:
-File: flask_cm/examples/forms/app.py
- > User input at line 24, trigger word "get(":
- comments = session.get('comments', [])
-File: flask_cm/examples/forms/app.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form)
-
-
-
-mies/flask-heroku
-https://github.com/mies/flask-heroku
-Entry file: flask-heroku/main.py
-Scanned: 2016-10-19 13:47:44.057062
-No vulnerabilities found.
-
-
-mozillazg/flask-demo
-https://github.com/mozillazg/flask-demo
-Entry file: None
-Scanned: 2016-10-19 13:47:44.583448
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo.
-
-toastercup/flask-social
-https://github.com/toastercup/flask-social
-Entry file: flask-social/app.py
-Scanned: 2016-10-19 13:47:45.096448
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoest/flask-bardienst
-https://github.com/hoest/flask-bardienst
-Entry file: flask-bardienst/bardienst/__init__.py
-Scanned: 2016-10-19 13:47:47.435441
-No vulnerabilities found.
-
-
-danillosouza/flask-boilerplate
-https://github.com/danillosouza/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-19 13:47:47.948661
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danillosouza/flask-boilerplate.
-
-dogrdon/flask-map
-https://github.com/dogrdon/flask-map
-Entry file: None
-Scanned: 2016-10-19 13:47:48.480978
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sapid/Flask-Community
-https://github.com/sapid/Flask-Community
-Entry file: None
-Scanned: 2016-10-19 13:47:53.010772
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community.
-
-jaseemkp/flask-students-app
-https://github.com/jaseemkp/flask-students-app
-Entry file: flask-students-app/students.py
-Scanned: 2016-10-19 13:47:58.037908
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-minhtuev/flask-google-map-example
-https://github.com/minhtuev/flask-google-map-example
-Entry file: flask-google-map-example/server.py
-Scanned: 2016-10-19 13:48:00.333343
-No vulnerabilities found.
-
-
-garbados/flask-the-gauntlet
-https://github.com/garbados/flask-the-gauntlet
-Entry file: flask-the-gauntlet/app.py
-Scanned: 2016-10-19 13:48:03.116859
-No vulnerabilities found.
-
-
-NoxDineen/microblog
-https://github.com/NoxDineen/microblog
-Entry file: None
-Scanned: 2016-10-19 13:48:03.646481
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kaibin/Condom_Data_Server
-https://github.com/Kaibin/Condom_Data_Server
-Entry file: Condom_Data_Server/app.py
-Scanned: 2016-10-19 13:48:05.184220
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nathanrosspowell/frozenboots
-https://github.com/nathanrosspowell/frozenboots
-Entry file: None
-Scanned: 2016-10-19 13:48:21.466572
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nathanrosspowell/frozenboots.
-
-craneon/debutante
-https://github.com/craneon/debutante
-Entry file: debutante/app.py
-Scanned: 2016-10-19 13:48:23.893786
-Vulnerability 1:
-File: debutante/app.py
- > User input at line 14, trigger word "form[":
- name1 = request.form['name1']
-File: debutante/app.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age))
-
-Vulnerability 2:
-File: debutante/app.py
- > User input at line 15, trigger word "form[":
- name2 = request.form['name2']
-File: debutante/app.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age))
-
-Vulnerability 3:
-File: debutante/app.py
- > User input at line 16, trigger word "form[":
- age = request.form['age']
-File: debutante/app.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age))
-
-
-
-kljensen/async-flask-sqlalchemy-example
-https://github.com/kljensen/async-flask-sqlalchemy-example
-Entry file: async-flask-sqlalchemy-example/server.py
-Scanned: 2016-10-19 13:48:28.120683
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kommmy/Flask
-https://github.com/kommmy/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-19 13:48:29.701972
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rbika/flaskm
-https://github.com/rbika/flaskm
-Entry file: flaskm/flaskm.py
-Scanned: 2016-10-19 13:48:35.210493
-No vulnerabilities found.
-
-
-catfive/flaskr
-https://github.com/catfive/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:48:35.736939
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mikedll/flasksqlitedemo
-https://github.com/mikedll/flasksqlitedemo
-Entry file: flasksqlitedemo/app.py
-Scanned: 2016-10-19 13:48:36.288660
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GerardoGR/flask-boilerplate
-https://github.com/GerardoGR/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-19 13:48:38.808715
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/GerardoGR/flask-boilerplate.
-
-edouardswiac/linkstash-flask
-https://github.com/edouardswiac/linkstash-flask
-Entry file: linkstash-flask/app.py
-Scanned: 2016-10-19 13:48:40.323815
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mies/flask-heroku
-https://github.com/mies/flask-heroku
-Entry file: flask-heroku/main.py
-Scanned: 2016-10-19 13:48:41.616514
-No vulnerabilities found.
-
-
-mattolsen1/flask_tumblelog
-https://github.com/mattolsen1/flask_tumblelog
-Entry file: flask_tumblelog/tumblelog/__init__.py
-Scanned: 2016-10-19 13:48:44.049108
-No vulnerabilities found.
-
-
-hoest/flask-bardienst
-https://github.com/hoest/flask-bardienst
-Entry file: flask-bardienst/bardienst/__init__.py
-Scanned: 2016-10-19 13:48:45.847165
-No vulnerabilities found.
-
-
-eudaimonious/HangmanWebsite
-https://github.com/eudaimonious/HangmanWebsite
-Entry file: HangmanWebsite/application_hangman.py
-Scanned: 2016-10-19 13:48:46.514309
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bracken1983/flaskBlogDemo
-https://github.com/bracken1983/flaskBlogDemo
-Entry file: flaskBlogDemo/flask-sqlalchemy-test.py
-Scanned: 2016-10-19 13:48:47.161870
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jaseemkp/flask-students-app
-https://github.com/jaseemkp/flask-students-app
-Entry file: flask-students-app/students.py
-Scanned: 2016-10-19 13:48:47.685775
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pinchsoft/flask-newrelic-dotcloud
-https://github.com/pinchsoft/flask-newrelic-dotcloud
-Entry file: flask-newrelic-dotcloud/app.py
-Scanned: 2016-10-19 13:48:49.967110
-No vulnerabilities found.
-
-
-PurplePilot/zanzeeba
-https://github.com/PurplePilot/zanzeeba
-Entry file: zanzeeba/appstd.py
-Scanned: 2016-10-19 13:48:50.543991
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hit9/flask-sign-in-with-github.py
-https://github.com/hit9/flask-sign-in-with-github.py
-Entry file: None
-Scanned: 2016-10-19 13:48:54.060972
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bscarlett/personal-site
-https://github.com/bscarlett/personal-site
-Entry file: personal-site/PersonalSite/__init__.py
-Scanned: 2016-10-19 13:49:00.106111
-No vulnerabilities found.
-
-
-cypx/trocr
-https://github.com/cypx/trocr
-Entry file: trocr/trocr.py
-Scanned: 2016-10-19 13:49:03.430175
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ungarst/p4p_svr
-https://github.com/ungarst/p4p_svr
-Entry file: p4p_svr/server/__init__.py
-Scanned: 2016-10-19 13:49:07.013357
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-koordinates/py-pubtkt
-https://github.com/koordinates/py-pubtkt
-Entry file: py-pubtkt/app.py
-Scanned: 2016-10-19 13:49:08.418134
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jawr/flask-contact
-https://github.com/jawr/flask-contact
-Entry file: flask-contact/main.py
-Scanned: 2016-10-19 13:49:22.104780
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wbolster/flask-uuid
-https://github.com/wbolster/flask-uuid
-Entry file: flask-uuid/test_flask_uuid.py
-Scanned: 2016-10-19 13:49:25.430908
-No vulnerabilities found.
-
-
-pyr/url-shortener
-https://github.com/pyr/url-shortener
-Entry file: url-shortener/url_shortener.py
-Scanned: 2016-10-19 13:49:27.961872
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vmi356/filemanager
-https://github.com/vmi356/filemanager
-Entry file: filemanager/manager.py
-Scanned: 2016-10-19 13:49:29.512499
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stef/tlsauth
-https://github.com/stef/tlsauth
-Entry file: tlsauth/flask-demo/webapp.py
-Scanned: 2016-10-19 13:49:33.935726
-No vulnerabilities found.
-
-
-cratejoy/flask-experiment
-https://github.com/cratejoy/flask-experiment
-Entry file: flask-experiment/test/test.py
-Scanned: 2016-10-19 13:49:35.453173
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-openfree/flaskr
-https://github.com/openfree/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:49:36.971425
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulthrissur/Flask_app
-https://github.com/rahulthrissur/Flask_app
-Entry file: Flask_app/test.py
-Scanned: 2016-10-19 13:49:40.021697
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jcerise/flask-photos
-https://github.com/jcerise/flask-photos
-Entry file: flask-photos/app.py
-Scanned: 2016-10-19 13:49:42.463132
-No vulnerabilities found.
-
-
-grimkeke/miniblog
-https://github.com/grimkeke/miniblog
-Entry file: miniblog/app/__init__.py
-Scanned: 2016-10-19 13:49:45.622057
-No vulnerabilities found.
-
-
-rasheedh/Paint-Using-Flask---Mongodb-
-https://github.com/rasheedh/Paint-Using-Flask---Mongodb-
-Entry file: None
-Scanned: 2016-10-19 13:49:46.629111
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-.
-
-Pitxon/sivir
-https://github.com/Pitxon/sivir
-Entry file: sivir/app.py
-Scanned: 2016-10-19 13:49:48.920683
-No vulnerabilities found.
-
-
-sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB
-https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB
-Entry file: None
-Scanned: 2016-10-19 13:49:50.202344
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB.
-
-ssidorenko/twisker
-https://github.com/ssidorenko/twisker
-Entry file: twisker/flask/sessions.py
-Scanned: 2016-10-19 13:49:52.267090
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Gabriele91/rss-soap-server
-https://github.com/Gabriele91/rss-soap-server
-Entry file: rss-soap-server/app.py
-Scanned: 2016-10-19 13:49:55.507890
-No vulnerabilities found.
-
-
-einashaddad/follow_app
-https://github.com/einashaddad/follow_app
-Entry file: follow_app/web_button.py
-Scanned: 2016-10-19 13:49:58.020109
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cypx/trocr
-https://github.com/cypx/trocr
-Entry file: trocr/trocr.py
-Scanned: 2016-10-19 13:49:58.538633
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-haizaar/microtweet
-https://github.com/haizaar/microtweet
-Entry file: microtweet/server.py
-Scanned: 2016-10-19 13:49:59.847667
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jawr/flask-contact
-https://github.com/jawr/flask-contact
-Entry file: flask-contact/main.py
-Scanned: 2016-10-19 13:50:02.265688
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulkmr/flask-bigapp-template
-https://github.com/rahulkmr/flask-bigapp-template
-Entry file: flask-bigapp-template/main.py
-Scanned: 2016-10-19 13:50:03.797547
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stef/flask-tlsauth
-https://github.com/stef/flask-tlsauth
-Entry file: flask-tlsauth/demo/webapp.py
-Scanned: 2016-10-19 13:50:06.208210
-No vulnerabilities found.
-
-
-kennethreitz/elephant
-https://github.com/kennethreitz/elephant
-Entry file: elephant/elephant.py
-Scanned: 2016-10-19 13:50:08.741788
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stef/tlsauth
-https://github.com/stef/tlsauth
-Entry file: tlsauth/flask-demo/webapp.py
-Scanned: 2016-10-19 13:50:22.785493
-No vulnerabilities found.
-
-
-topherjaynes/flasktut
-https://github.com/topherjaynes/flasktut
-Entry file: flasktut/app/__init__.py
-Scanned: 2016-10-19 13:50:24.440734
-No vulnerabilities found.
-
-
-elboby/flask-config-override
-https://github.com/elboby/flask-config-override
-Entry file: flask-config-override/tests/basic_flask_test.py
-Scanned: 2016-10-19 13:50:25.969286
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sherzberg/flask-native-package
-https://github.com/sherzberg/flask-native-package
-Entry file: flask-native-package/application.py
-Scanned: 2016-10-19 13:50:30.661515
-No vulnerabilities found.
-
-
-xrefor/flask_tut
-https://github.com/xrefor/flask_tut
-Entry file: flask_tut/flaskr.py
-Scanned: 2016-10-19 13:50:32.443266
-No vulnerabilities found.
-
-
-McrCoderDojo/Flask-Webapps
-https://github.com/McrCoderDojo/Flask-Webapps
-Entry file: Flask-Webapps/flask1.py
-Scanned: 2016-10-19 13:50:33.029282
-No vulnerabilities found.
-
-
-xrefor/flask_stuff
-https://github.com/xrefor/flask_stuff
-Entry file: flask_stuff/main.py
-Scanned: 2016-10-19 13:50:34.323185
-No vulnerabilities found.
-
-
-akbarovs/flask-sandbox
-https://github.com/akbarovs/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-19 13:50:34.841464
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adesst/flask-blog
-https://github.com/adesst/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-19 13:50:37.399946
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-gourneau/anode
-https://github.com/gourneau/anode
-Entry file: anode/app.py
-Scanned: 2016-10-19 13:50:41.911090
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mmahnken/Flask_to_do_list
-https://github.com/mmahnken/Flask_to_do_list
-Entry file: Flask_to_do_list/tipsy.py
-Scanned: 2016-10-19 13:50:43.434432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Paintapp-Javascript-Canvas-Flask
-https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask
-Entry file: Paintapp-Javascript-Canvas-Flask/test.py
-Scanned: 2016-10-19 13:50:45.797445
-Vulnerability 1:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 34, trigger word "form[":
- imgname = request.form['imagename']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 16: imgname = (imagename)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 23: imgname = row[0]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 19, trigger word "execute(":
- cur.execute('SELECT * FROM Image WHERE imgname=?', imgname)
-
-Vulnerability 2:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 35, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 24: imgdata = row[1]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata)
-
-Vulnerability 3:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 34, trigger word "form[":
- imgname = request.form['imagename']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 16: imgname = (imagename)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 23: imgname = row[0]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 42, trigger word "execute(":
- cur.execute('INSERT INTO Image VALUES(?, ?)', data)
-
-Vulnerability 4:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 35, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 24: imgdata = row[1]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 42, trigger word "execute(":
- cur.execute('INSERT INTO Image VALUES(?, ?)', data)
-
-
-
-godber/flask-mobile-switch
-https://github.com/godber/flask-mobile-switch
-Entry file: flask-mobile-switch/missionops/missionops/__init__.py
-Scanned: 2016-10-19 13:50:47.313707
-Vulnerability 1:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 29, trigger word "form[":
- title = config_form['title']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 33: config_title.value = title
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 43: title = title.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 45: title = 'Mission Ops'
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 41, trigger word "filter(":
- title = Config.query.filter(Config.key == 'title').first()
-
-Vulnerability 2:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 30, trigger word "form[":
- image_url = config_form['url']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 37: config_url.value = image_url
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 49: image_url = image_url.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 51: image_url = '../static/Mars.jpg'
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 52: ysize = image_size(image_url)
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 24: ysize = 0
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 47, trigger word "filter(":
- image_url = Config.query.filter(Config.key == 'url').first()
-
-Vulnerability 3:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 29, trigger word "form[":
- title = config_form['title']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 33: config_title.value = title
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 43: title = title.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 45: title = 'Mission Ops'
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize)
-
-Vulnerability 4:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 30, trigger word "form[":
- image_url = config_form['url']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 37: config_url.value = image_url
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 49: image_url = image_url.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 51: image_url = '../static/Mars.jpg'
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 52: ysize = image_size(image_url)
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 24: ysize = 0
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize)
-
-
-
-naveenpremchand02/paintapp-using-Flask
-https://github.com/naveenpremchand02/paintapp-using-Flask
-Entry file: None
-Scanned: 2016-10-19 13:50:47.840129
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/naveenpremchand02/paintapp-using-Flask.
-
-orkunozbek/deploy_test
-https://github.com/orkunozbek/deploy_test
-Entry file: deploy_test/app_pack/__init__.py
-Scanned: 2016-10-19 13:50:49.164516
-No vulnerabilities found.
-
-
-y2bishop2y/microengine
-https://github.com/y2bishop2y/microengine
-Entry file: microengine/lib/flask_sqlalchemy.py
-Scanned: 2016-10-19 13:50:49.867283
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
-Scanned: 2016-10-19 13:50:52.675859
-Vulnerability 1:
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > User input at line 34, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 22: imgdata = row['imgdata']
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > reaches line 24, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata)
-
-
-
-popeliao/FlavorPlusServer
-https://github.com/popeliao/FlavorPlusServer
-Entry file: FlavorPlusServer/app.py
-Scanned: 2016-10-19 13:50:54.967548
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tatertot/tipsy
-https://github.com/tatertot/tipsy
-Entry file: tipsy/tipsy.py
-Scanned: 2016-10-19 13:50:58.505655
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ssidorenko/twisker
-https://github.com/ssidorenko/twisker
-Entry file: twisker/flask/sessions.py
-Scanned: 2016-10-19 13:51:00.025173
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-soniacs/mockup-boot
-https://github.com/soniacs/mockup-boot
-Entry file: mockup-boot/build.py
-Scanned: 2016-10-19 13:51:01.424871
-Vulnerability 1:
-File: mockup-boot/build.py
- > User input at line 33, trigger word "get(":
- template = page.meta.get('template', 'page.html')
-File: mockup-boot/build.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,page=page)
-
-
-
-Liquix/microblog
-https://github.com/Liquix/microblog
-Entry file: None
-Scanned: 2016-10-19 13:51:01.967758
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mvader/Quickflask
-https://github.com/mvader/Quickflask
-Entry file: Quickflask/quickflask/app.py
-Scanned: 2016-10-19 13:51:04.480041
-No vulnerabilities found.
-
-
-einashaddad/follow_app
-https://github.com/einashaddad/follow_app
-Entry file: follow_app/web_button.py
-Scanned: 2016-10-19 13:51:05.018900
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joepetrini/dayuntil
-https://github.com/joepetrini/dayuntil
-Entry file: dayuntil/app/__init__.py
-Scanned: 2016-10-19 13:51:08.011199
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dnet/wsfacade
-https://github.com/dnet/wsfacade
-Entry file: wsfacade/wsfacade.py
-Scanned: 2016-10-19 13:51:11.476275
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-croach/cheap-and-scalable-websites-code
-https://github.com/croach/cheap-and-scalable-websites-code
-Entry file: cheap-and-scalable-websites-code/generator.py
-Scanned: 2016-10-19 13:51:12.893190
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kylemarsh/recipelister
-https://github.com/kylemarsh/recipelister
-Entry file: recipelister/recipelister/__init__.py
-Scanned: 2016-10-19 13:51:24.447478
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jimpurbrick/hackinabox
-https://github.com/jimpurbrick/hackinabox
-Entry file: hackinabox/app.py
-Scanned: 2016-10-19 13:51:25.852806
-No vulnerabilities found.
-
-
-thegeekchick/converter
-https://github.com/thegeekchick/converter
-Entry file: None
-Scanned: 2016-10-19 13:51:30.313947
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-angstwad/linky
-https://github.com/angstwad/linky
-Entry file: linky/linky/__init__.py
-Scanned: 2016-10-19 13:51:32.757278
-No vulnerabilities found.
-
-
-pysgf/GeoPhotoPy
-https://github.com/pysgf/GeoPhotoPy
-Entry file: GeoPhotoPy/GeoPhotoPy/__init__.py
-Scanned: 2016-10-19 13:51:45.236604
-No vulnerabilities found.
-
-
-GradySimon/RoommateDishes
-https://github.com/GradySimon/RoommateDishes
-Entry file: RoommateDishes/dishes.py
-Scanned: 2016-10-19 13:51:46.600600
-No vulnerabilities found.
-
-
-the-gigi/cloud_state
-https://github.com/the-gigi/cloud_state
-Entry file: cloud_state/CloudState.py
-Scanned: 2016-10-19 13:51:48.010406
-No vulnerabilities found.
-
-
-xiyoulaoyuanjia/flaskapp
-https://github.com/xiyoulaoyuanjia/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:51:49.421844
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiyoulaoyuanjia/flaskapp.
-
-trustrachel/Flask-FeatureFlags
-https://github.com/trustrachel/Flask-FeatureFlags
-Entry file: Flask-FeatureFlags/tests/fixtures.py
-Scanned: 2016-10-19 13:51:50.072425
-Vulnerability 1:
-File: Flask-FeatureFlags/tests/test_core_function.py
- > User input at line 55, trigger word "get(":
- response = self.test_client.get(url)
-File: Flask-FeatureFlags/tests/test_core_function.py
- > reaches line 57, trigger word "url_for(":
- response.location == url_for('redirect_destination',_external=True)
-
-Vulnerability 2:
-File: Flask-FeatureFlags/tests/test_core_function.py
- > User input at line 66, trigger word "get(":
- response = self.test_client.get(url)
-File: Flask-FeatureFlags/tests/test_core_function.py
- > reaches line 68, trigger word "url_for(":
- response.location == url_for('redirect_destination',_external=True)
-
-
-
-aahluwal/flask
-https://github.com/aahluwal/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-19 13:51:50.678908
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-kennethreitz/elephant
-https://github.com/kennethreitz/elephant
-Entry file: elephant/elephant.py
-Scanned: 2016-10-19 13:51:51.183552
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-clef/sample-flask
-https://github.com/clef/sample-flask
-Entry file: sample-flask/app.py
-Scanned: 2016-10-19 13:51:52.590861
-No vulnerabilities found.
-
-
-simonvc/rover-wasd-server
-https://github.com/simonvc/rover-wasd-server
-Entry file: rover-wasd-server/wasd_server.py
-Scanned: 2016-10-19 13:51:55.038722
-No vulnerabilities found.
-
-
-jonascj/flaskr
-https://github.com/jonascj/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:51:55.557774
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thinboy92/flasktuts
-https://github.com/thinboy92/flasktuts
-Entry file: flasktuts/app/__init__.py
-Scanned: 2016-10-19 13:51:57.048363
-No vulnerabilities found.
-
-
-guilhermecomum/FlaskTutorial
-https://github.com/guilhermecomum/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-19 13:51:57.582960
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-landakram/squeak
-https://github.com/landakram/squeak
-Entry file: squeak/app.py
-Scanned: 2016-10-19 13:51:59.605561
-Vulnerability 1:
-File: squeak/app.py
- > User input at line 73, trigger word "form[":
- search_term = request.form['term']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 2:
-File: squeak/app.py
- > User input at line 74, trigger word "form[":
- location = request.form['location']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 3:
-File: squeak/app.py
- > User input at line 83, trigger word "get(":
- response = requests.get(signed_url)
-Reassigned in:
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-
-
-xjdrew/flask-demo
-https://github.com/xjdrew/flask-demo
-Entry file: None
-Scanned: 2016-10-19 13:52:00.124579
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xjdrew/flask-demo.
-
-aerialdomo/flask_microblog
-https://github.com/aerialdomo/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-19 13:52:00.661282
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-akbarovs/flask-sandbox
-https://github.com/akbarovs/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-19 13:52:01.161742
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jinzhangg/flask-helloworld
-https://github.com/jinzhangg/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-19 13:52:04.076069
-No vulnerabilities found.
-
-
-hardez/Flask-Skeleton
-https://github.com/hardez/Flask-Skeleton
-Entry file: None
-Scanned: 2016-10-19 13:52:06.093759
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hardez/Flask-Skeleton.
-
-stfy86/pruebitasFlask
-https://github.com/stfy86/pruebitasFlask
-Entry file: pruebitasFlask/practica4/src/app/__init__.py
-Scanned: 2016-10-19 13:52:08.743477
-No vulnerabilities found.
-
-
-kracekumar/test-flask
-https://github.com/kracekumar/test-flask
-Entry file: test-flask/app.py
-Scanned: 2016-10-19 13:52:13.365172
-No vulnerabilities found.
-
-
-charliecrissman/microblog
-https://github.com/charliecrissman/microblog
-Entry file: None
-Scanned: 2016-10-19 13:52:13.875991
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-abulte/Flask-Bootstrap-Fanstatic
-https://github.com/abulte/Flask-Bootstrap-Fanstatic
-Entry file: Flask-Bootstrap-Fanstatic/application/__init__.py
-Scanned: 2016-10-19 13:52:26.331519
-No vulnerabilities found.
-
-
-jennyferpinto/Flask_Part_1
-https://github.com/jennyferpinto/Flask_Part_1
-Entry file: Flask_Part_1/tipsy.py
-Scanned: 2016-10-19 13:52:26.874293
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elboby/flask-test-template
-https://github.com/elboby/flask-test-template
-Entry file: None
-Scanned: 2016-10-19 13:52:34.376547
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template.
-
-isms/flask-phonebank-dashboard
-https://github.com/isms/flask-phonebank-dashboard
-Entry file: flask-phonebank-dashboard/app.py
-Scanned: 2016-10-19 13:52:46.922071
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-jpanganiban/flask-heroku-kickstart
-https://github.com/jpanganiban/flask-heroku-kickstart
-Entry file: None
-Scanned: 2016-10-19 13:52:48.434988
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jpanganiban/flask-heroku-kickstart.
-
-justinxreese/ajax-calculator-flask
-https://github.com/justinxreese/ajax-calculator-flask
-Entry file: None
-Scanned: 2016-10-19 13:52:49.978865
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chrismeono1022/movie-ratings
-https://github.com/chrismeono1022/movie-ratings
-Entry file: movie-ratings/judgement.py
-Scanned: 2016-10-19 13:52:50.510242
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-soniacs/cabinet
-https://github.com/soniacs/cabinet
-Entry file: cabinet/app/__init__.py
-Scanned: 2016-10-19 13:52:52.118600
-Vulnerability 1:
-File: cabinet/app/views/clients.py
- > User input at line 18, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: cabinet/app/views/clients.py
- > reaches line 21, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('clients/view.html',title=client.name, client=client, projects=projects, invoices=invoices)
-
-Vulnerability 2:
-File: cabinet/app/views/clients.py
- > User input at line 33, trigger word "form[":
- client = Client(name=request.form['name'], company=request.form['company'], website=request.form['website'], twitter=request.form['twitter'], email=request.form['email'], telephone=request.form['telephone'], skype=request.form['skype'], street=request.form['street'], street_2=request.form['street_2'], city=request.form['city'], state=request.form['state'], postcode=request.form['postcode'], country=request.form['country'], notes=request.form['notes'])
-File: cabinet/app/views/clients.py
- > reaches line 50, trigger word "flash(":
- flash('Client '%s' was added.' % client.name)
-
-Vulnerability 3:
-File: cabinet/app/views/clients.py
- > User input at line 60, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 78, trigger word "flash(":
- flash('Client '%s' has been updated.' % client.name)
-
-Vulnerability 4:
-File: cabinet/app/views/clients.py
- > User input at line 60, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('clients/edit.html',title='Edit %s' % client.name, client=client)
-
-Vulnerability 5:
-File: cabinet/app/views/clients.py
- > User input at line 89, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 93, trigger word "flash(":
- flash('Client '%s' has been deleted.' % client.name)
-
-Vulnerability 6:
-File: cabinet/app/views/clients.py
- > User input at line 89, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 95, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('clients/delete.html',title='Delete %s' % client.name, client=client)
-
-Vulnerability 7:
-File: cabinet/app/views/invoices.py
- > User input at line 18, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: cabinet/app/views/invoices.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('invoices/view.html',title=invoice.name, invoice=invoice)
-
-Vulnerability 8:
-File: cabinet/app/views/invoices.py
- > User input at line 31, trigger word "get(":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 9:
-File: cabinet/app/views/invoices.py
- > User input at line 31, trigger word "form[":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 10:
-File: cabinet/app/views/invoices.py
- > User input at line 32, trigger word "get(":
- project = Project.query.get(request.form['project'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 11:
-File: cabinet/app/views/invoices.py
- > User input at line 32, trigger word "form[":
- project = Project.query.get(request.form['project'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 12:
-File: cabinet/app/views/invoices.py
- > User input at line 33, trigger word "form[":
- invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 13:
-File: cabinet/app/views/invoices.py
- > User input at line 59, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 78, trigger word "flash(":
- flash('Invoice '%s' has been updated.' % invoice.name)
-
-Vulnerability 14:
-File: cabinet/app/views/invoices.py
- > User input at line 59, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('invoices/edit.html',title='Edit Invoice %s' % invoice.name, invoice=invoice, clients=clients, projects=projects)
-
-Vulnerability 15:
-File: cabinet/app/views/invoices.py
- > User input at line 91, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 95, trigger word "flash(":
- flash('Invoice '%s' has been deleted.' % invoice.name)
-
-Vulnerability 16:
-File: cabinet/app/views/invoices.py
- > User input at line 91, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 97, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('invoices/delete.html',title='Delete Invoice %s' % invoice.name, invoice=invoice)
-
-Vulnerability 17:
-File: cabinet/app/views/projects.py
- > User input at line 18, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: cabinet/app/views/projects.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('projects/view.html',title=project.name, project=project)
-
-Vulnerability 18:
-File: cabinet/app/views/projects.py
- > User input at line 30, trigger word "get(":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client)
-File: cabinet/app/views/projects.py
- > reaches line 43, trigger word "flash(":
- flash('Project '%s' was added.' % project.name)
-
-Vulnerability 19:
-File: cabinet/app/views/projects.py
- > User input at line 30, trigger word "form[":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client)
-File: cabinet/app/views/projects.py
- > reaches line 43, trigger word "flash(":
- flash('Project '%s' was added.' % project.name)
-
-Vulnerability 20:
-File: cabinet/app/views/projects.py
- > User input at line 31, trigger word "form[":
- project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client)
-File: cabinet/app/views/projects.py
- > reaches line 43, trigger word "flash(":
- flash('Project '%s' was added.' % project.name)
-
-Vulnerability 21:
-File: cabinet/app/views/projects.py
- > User input at line 54, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 69, trigger word "flash(":
- flash('Project '%s' has been updated.' % project.name)
-
-Vulnerability 22:
-File: cabinet/app/views/projects.py
- > User input at line 54, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('projects/edit.html',title='Edit %s' % project.name, project=project, clients=clients)
-
-Vulnerability 23:
-File: cabinet/app/views/projects.py
- > User input at line 81, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 85, trigger word "flash(":
- flash('Project '%s' has been deleted.' % project.name)
-
-Vulnerability 24:
-File: cabinet/app/views/projects.py
- > User input at line 81, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 87, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('projects/delete.html',title='Delete %s' % project.name, project=project)
-
-
-
-MattStockton/manpage
-https://github.com/MattStockton/manpage
-Entry file: manpage/app.py
-Scanned: 2016-10-19 13:52:52.659943
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-qzio/tododis
-https://github.com/qzio/tododis
-Entry file: tododis/app.py
-Scanned: 2016-10-19 13:52:53.184484
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ternup/caddisfly-heroku
-https://github.com/ternup/caddisfly-heroku
-Entry file: caddisfly-heroku/app.py
-Scanned: 2016-10-19 13:52:53.699023
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
-Scanned: 2016-10-19 13:52:55.523342
-Vulnerability 1:
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > User input at line 34, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 22: imgdata = row['imgdata']
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > reaches line 24, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata)
-
-
-
-mmahnken/Flask-To-Do-List-with-updates-
-https://github.com/mmahnken/Flask-To-Do-List-with-updates-
-Entry file: Flask-To-Do-List-with-updates-/tipsy.py
-Scanned: 2016-10-19 13:52:57.940094
-No vulnerabilities found.
-
-
-samgclarke/sms_sender
-https://github.com/samgclarke/sms_sender
-Entry file: sms_sender/application.py
-Scanned: 2016-10-19 13:52:59.252961
-No vulnerabilities found.
-
-
-Liquix/microblog
-https://github.com/Liquix/microblog
-Entry file: None
-Scanned: 2016-10-19 13:52:59.763668
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-deegill/tipsytasklist
-https://github.com/deegill/tipsytasklist
-Entry file: tipsytasklist/tipsy.py
-Scanned: 2016-10-19 13:53:01.280883
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dnet/wsfacade
-https://github.com/dnet/wsfacade
-Entry file: wsfacade/wsfacade.py
-Scanned: 2016-10-19 13:53:01.785095
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mdjhny/OilPainter
-https://github.com/mdjhny/OilPainter
-Entry file: OilPainter/app/app.py
-Scanned: 2016-10-19 13:53:03.513263
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yeradis/sizing
-https://github.com/yeradis/sizing
-Entry file: sizing/sizing.py
-Scanned: 2016-10-19 13:53:04.781924
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattupstate/flask-social
-https://github.com/mattupstate/flask-social
-Entry file: flask-social/app.py
-Scanned: 2016-10-19 13:53:06.137570
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattupstate/flask-jsonschema
-https://github.com/mattupstate/flask-jsonschema
-Entry file: flask-jsonschema/tests.py
-Scanned: 2016-10-19 13:53:07.419243
-No vulnerabilities found.
-
-
-whtsky/Flask-WeRoBot
-https://github.com/whtsky/Flask-WeRoBot
-Entry file: Flask-WeRoBot/flask_werobot.py
-Scanned: 2016-10-19 13:53:08.841032
-No vulnerabilities found.
-
-
-OpenTechSchool/python-flask-code
-https://github.com/OpenTechSchool/python-flask-code
-Entry file: python-flask-code/core/files-templates/catseverywhere.py
-Scanned: 2016-10-19 13:53:10.145631
-No vulnerabilities found.
-
-
-rollbar/rollbar-flask-example
-https://github.com/rollbar/rollbar-flask-example
-Entry file: rollbar-flask-example/hello.py
-Scanned: 2016-10-19 13:53:10.674949
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lqez/flasky
-https://github.com/lqez/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-19 13:53:14.183824
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Jd007/flask-rest
-https://github.com/Jd007/flask-rest
-Entry file: flask-rest/haystack/core.py
-Scanned: 2016-10-19 13:53:15.687609
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-simonvc/rover-wasd-server
-https://github.com/simonvc/rover-wasd-server
-Entry file: rover-wasd-server/wasd_server.py
-Scanned: 2016-10-19 13:53:28.656567
-No vulnerabilities found.
-
-
-aerialdomo/flaskblog
-https://github.com/aerialdomo/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-19 13:53:29.692614
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-microamp/flaskel
-https://github.com/microamp/flaskel
-Entry file: flaskel/flaskel.py
-Scanned: 2016-10-19 13:53:33.219465
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-pinoytech/flaskapp
-https://github.com/pinoytech/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:53:35.727032
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pinoytech/flaskapp.
-
-aahluwal/flaskagain
-https://github.com/aahluwal/flaskagain
-Entry file: flaskagain/judgement.py
-Scanned: 2016-10-19 13:53:48.365473
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskagain/renv/lib/python2.7/genericpath.py
-
-landakram/squeak
-https://github.com/landakram/squeak
-Entry file: squeak/app.py
-Scanned: 2016-10-19 13:53:50.899579
-Vulnerability 1:
-File: squeak/app.py
- > User input at line 73, trigger word "form[":
- search_term = request.form['term']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 2:
-File: squeak/app.py
- > User input at line 74, trigger word "form[":
- location = request.form['location']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 3:
-File: squeak/app.py
- > User input at line 83, trigger word "get(":
- response = requests.get(signed_url)
-Reassigned in:
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-
-
-y2bishop2y/vagrant.flask
-https://github.com/y2bishop2y/vagrant.flask
-Entry file: None
-Scanned: 2016-10-19 13:53:51.905156
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-markchadwick/flask-empty
-https://github.com/markchadwick/flask-empty
-Entry file: flask-empty/main.py
-Scanned: 2016-10-19 13:53:53.209731
-No vulnerabilities found.
-
-
-Hardtack/Flask-Router
-https://github.com/Hardtack/Flask-Router
-Entry file: Flask-Router/flask_router/tests.py
-Scanned: 2016-10-19 13:53:54.521979
-No vulnerabilities found.
-
-
-mwmeyer/minimal-flask-socketserver
-https://github.com/mwmeyer/minimal-flask-socketserver
-Entry file: minimal-flask-socketserver/flash_socket.py
-Scanned: 2016-10-19 13:53:56.016308
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elboby/flask-test-template
-https://github.com/elboby/flask-test-template
-Entry file: None
-Scanned: 2016-10-19 13:53:56.545865
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template.
-
-ndrwdn/flat_flask_layout
-https://github.com/ndrwdn/flat_flask_layout
-Entry file: flat_flask_layout/sitebuilder.py
-Scanned: 2016-10-19 13:53:58.959433
-No vulnerabilities found.
-
-
-chrismeono1022/movie-ratings
-https://github.com/chrismeono1022/movie-ratings
-Entry file: movie-ratings/judgement.py
-Scanned: 2016-10-19 13:53:59.475971
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-emi1337/movie_rater
-https://github.com/emi1337/movie_rater
-Entry file: movie_rater/judgement.py
-Scanned: 2016-10-19 13:54:01.246871
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ternup/caddisfly-heroku
-https://github.com/ternup/caddisfly-heroku
-Entry file: caddisfly-heroku/app.py
-Scanned: 2016-10-19 13:54:01.755274
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thrisp/flacro
-https://github.com/thrisp/flacro
-Entry file: flacro/tests/conftest.py
-Scanned: 2016-10-19 13:54:04.282535
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-aksiksi/aflam
-https://github.com/aksiksi/aflam
-Entry file: aflam/views.py
-Scanned: 2016-10-19 13:54:05.710046
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-samgclarke/sms_sender
-https://github.com/samgclarke/sms_sender
-Entry file: sms_sender/application.py
-Scanned: 2016-10-19 13:54:06.994657
-No vulnerabilities found.
-
-
-kjudd/ratings_app
-https://github.com/kjudd/ratings_app
-Entry file: ratings_app/judgement.py
-Scanned: 2016-10-19 13:54:10.701895
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: ratings_app/env/lib/python2.7/genericpath.py
-
-Max00355/FileUpload
-https://github.com/Max00355/FileUpload
-Entry file: FileUpload/main.py
-Scanned: 2016-10-19 13:54:11.986723
-No vulnerabilities found.
-
-
-joel-briggs/microblog
-https://github.com/joel-briggs/microblog
-Entry file: None
-Scanned: 2016-10-19 13:54:12.497914
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gonewandering/TwitterLogin
-https://github.com/gonewandering/TwitterLogin
-Entry file: TwitterLogin/app.py
-Scanned: 2016-10-19 13:54:13.793710
-No vulnerabilities found.
-
-
-flebel/yt-redirector
-https://github.com/flebel/yt-redirector
-Entry file: yt-redirector/yt-redirector.py
-Scanned: 2016-10-19 13:54:15.202837
-Vulnerability 1:
-File: yt-redirector/yt-redirector.py
- > User input at line 17, trigger word "get(":
- video_id = requests.get(video_url).json()['items'][0]['id']['videoId']
-Reassigned in:
- File: yt-redirector/yt-redirector.py
- > Line 18: player_url = 'https://www.youtube.com/watch?v=%s' % (video_id)
-File: yt-redirector/yt-redirector.py
- > reaches line 19, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(player_url, 301)
-
-
-
-mattupstate/flask-jsonschema
-https://github.com/mattupstate/flask-jsonschema
-Entry file: flask-jsonschema/tests.py
-Scanned: 2016-10-19 13:54:18.697226
-No vulnerabilities found.
-
-
-mharrys/flask-blog
-https://github.com/mharrys/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-19 13:54:28.317666
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-kienpham2000/airbrake-flask
-https://github.com/kienpham2000/airbrake-flask
-Entry file: airbrake-flask/setup.py
-Scanned: 2016-10-19 13:54:30.839965
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-florapdx/My-Blog
-https://github.com/florapdx/My-Blog
-Entry file: My-Blog/sitebuilder.py
-Scanned: 2016-10-19 13:54:38.153839
-No vulnerabilities found.
-
-
-zeuxisoo/python-flask-social-oauth-facebook
-https://github.com/zeuxisoo/python-flask-social-oauth-facebook
-Entry file: None
-Scanned: 2016-10-19 13:54:38.679559
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeuxisoo/python-flask-social-oauth-facebook.
-
-lpolepeddi/sightings
-https://github.com/lpolepeddi/sightings
-Entry file: sightings/routes.py
-Scanned: 2016-10-19 13:55:00.557802
-No vulnerabilities found.
-
-
-sholsapp/flask-skeleton
-https://github.com/sholsapp/flask-skeleton
-Entry file: None
-Scanned: 2016-10-19 13:55:01.571864
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sholsapp/flask-skeleton.
-
-adatlabor/soa-demo
-https://github.com/adatlabor/soa-demo
-Entry file: soa-demo/service.py
-Scanned: 2016-10-19 13:55:02.086386
-No vulnerabilities found.
-
-
-speakingcode/pres-soa-flask-backbone
-https://github.com/speakingcode/pres-soa-flask-backbone
-Entry file: pres-soa-flask-backbone/notes.py
-Scanned: 2016-10-19 13:55:04.327948
-No vulnerabilities found.
-
-
-kirang89/flask-boiler
-https://github.com/kirang89/flask-boiler
-Entry file: None
-Scanned: 2016-10-19 13:55:04.846721
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-microamp/flaskel
-https://github.com/microamp/flaskel
-Entry file: flaskel/flaskel.py
-Scanned: 2016-10-19 13:55:05.845741
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-a2lin/flaskapp
-https://github.com/a2lin/flaskapp
-Entry file: None
-Scanned: 2016-10-19 13:55:06.363503
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/a2lin/flaskapp.
-
-MrFichter/flask1
-https://github.com/MrFichter/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-19 13:55:07.055223
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-Bob-Thomas/webshopFlask
-https://github.com/Bob-Thomas/webshopFlask
-Entry file: webshopFlask/webshop.py
-Scanned: 2016-10-19 13:55:07.691797
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-smdmustaffa/PythonFlask
-https://github.com/smdmustaffa/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-19 13:55:13.664632
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-bogavante/mitsuhiko-flask
-https://github.com/bogavante/mitsuhiko-flask
-Entry file: mitsuhiko-flask/setup.py
-Scanned: 2016-10-19 13:55:14.223238
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stephanienkram/Flask-Log-Tracker
-https://github.com/stephanienkram/Flask-Log-Tracker
-Entry file: Flask-Log-Tracker/main.py
-Scanned: 2016-10-19 13:55:15.944929
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dylanvee/flask-hello-world
-https://github.com/dylanvee/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-19 13:55:16.499423
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ndrwdn/flat_flask_layout
-https://github.com/ndrwdn/flat_flask_layout
-Entry file: flat_flask_layout/sitebuilder.py
-Scanned: 2016-10-19 13:55:17.832166
-No vulnerabilities found.
-
-
-akshar-raaj/flaks
-https://github.com/akshar-raaj/flaks
-Entry file: flaks/hello.py
-Scanned: 2016-10-19 13:55:19.145022
-No vulnerabilities found.
-
-
-ajith-herga/searchflask
-https://github.com/ajith-herga/searchflask
-Entry file: searchflask/new_world.py
-Scanned: 2016-10-19 13:55:19.692232
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-willmcmain/blag
-https://github.com/willmcmain/blag
-Entry file: blag/blag/__init__.py
-Scanned: 2016-10-19 13:55:21.006778
-No vulnerabilities found.
-
-
-mihneasim/iphy
-https://github.com/mihneasim/iphy
-Entry file: None
-Scanned: 2016-10-19 13:55:22.437933
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mihneasim/iphy.
-
-dnajd/pyrest
-https://github.com/dnajd/pyrest
-Entry file: pyrest/src/main/rest_test.py
-Scanned: 2016-10-19 13:55:23.856434
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MinnPost/jsonproxy
-https://github.com/MinnPost/jsonproxy
-Entry file: jsonproxy/app.py
-Scanned: 2016-10-19 13:55:25.163581
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BigBlueHat/recshackday
-https://github.com/BigBlueHat/recshackday
-Entry file: recshackday/app.py
-Scanned: 2016-10-19 13:55:30.826151
-No vulnerabilities found.
-
-
-capellayee/remake
-https://github.com/capellayee/remake
-Entry file: remake/Flasktest/__init__.py
-Scanned: 2016-10-19 13:55:33.186059
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-corydolphin/ifighthunger
-https://github.com/corydolphin/ifighthunger
-Entry file: ifighthunger/ifighthunger/__init__.py
-Scanned: 2016-10-19 13:55:40.937612
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lxchavez/CSULB-Confessions
-https://github.com/lxchavez/CSULB-Confessions
-Entry file: CSULB-Confessions/confessions_app/__init__.py
-Scanned: 2016-10-19 13:55:43.469342
-No vulnerabilities found.
-
-
-zoowii/VerySimpleBlog
-https://github.com/zoowii/VerySimpleBlog
-Entry file: VerySimpleBlog/main.py
-Scanned: 2016-10-19 13:55:44.791756
-No vulnerabilities found.
-
-
-ashcrow/flask-track-usage
-https://github.com/ashcrow/flask-track-usage
-Entry file: flask-track-usage/test/__init__.py
-Scanned: 2016-10-19 13:56:02.720043
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lepture/flask-shorturl
-https://github.com/lepture/flask-shorturl
-Entry file: flask-shorturl/test_shorturl.py
-Scanned: 2016-10-19 13:56:04.198924
-No vulnerabilities found.
-
-
-mharrys/flask-blog
-https://github.com/mharrys/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-19 13:56:04.773267
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-btomashvili/flasb
-https://github.com/btomashvili/flasb
-Entry file: None
-Scanned: 2016-10-19 13:56:06.782776
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb.
-
-krushton/flask-api-example
-https://github.com/krushton/flask-api-example
-Entry file: flask-api-example/app.py
-Scanned: 2016-10-19 13:56:08.213839
-No vulnerabilities found.
-
-
-roshow/flasktutorial
-https://github.com/roshow/flasktutorial
-Entry file: None
-Scanned: 2016-10-19 13:56:08.750514
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jph98/flaskdmg
-https://github.com/jph98/flaskdmg
-Entry file: flaskdmg/flaskexample.py
-Scanned: 2016-10-19 13:56:10.041368
-No vulnerabilities found.
-
-
-akshar-raaj/flaskr
-https://github.com/akshar-raaj/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:56:10.554526
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-codergirl/flaskbabar
-https://github.com/codergirl/flaskbabar
-Entry file: flaskbabar/hello.py
-Scanned: 2016-10-19 13:56:11.889462
-Vulnerability 1:
-File: flaskbabar/hello.py
- > User input at line 44, trigger word "get(":
- new_user = BabarUser(request.args.get('username'), request.args.get('email'))
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 47: json = new_user.id'username''email'new_user.namenew_user.email
-File: flaskbabar/hello.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 2:
-File: flaskbabar/hello.py
- > User input at line 61, trigger word "get(":
- the_user = db.session.query(BabarUser).filter_by(id=request.args.get('user_id')).first()
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 3:
-File: flaskbabar/hello.py
- > User input at line 62, trigger word "get(":
- task_name = request.args.get('name')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 4:
-File: flaskbabar/hello.py
- > User input at line 63, trigger word "get(":
- task_description = request.args.get('description')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 5:
-File: flaskbabar/hello.py
- > User input at line 64, trigger word "get(":
- dismissable = request.args.get('dismissable')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 66: dismissable = True
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 6:
-File: flaskbabar/hello.py
- > User input at line 67, trigger word "get(":
- due_date = request.args.get('due_date')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 69: due_date = datetime.datetime.fromtimestamp(float(due_date))
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-
-
-rajendrakrp/GAE-Flask-OpenID
-https://github.com/rajendrakrp/GAE-Flask-OpenID
-Entry file: GAE-Flask-OpenID/flask/sessions.py
-Scanned: 2016-10-19 13:56:12.496563
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Bob-Thomas/webshopFlask
-https://github.com/Bob-Thomas/webshopFlask
-Entry file: webshopFlask/webshop.py
-Scanned: 2016-10-19 13:56:16.122572
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-haburibe/flask-myapps
-https://github.com/haburibe/flask-myapps
-Entry file: flask-myapps/todos/todos.py
-Scanned: 2016-10-19 13:56:17.448365
-No vulnerabilities found.
-
-
-mykolasmith/flask-leaderboard
-https://github.com/mykolasmith/flask-leaderboard
-Entry file: flask-leaderboard/leaderboard/__init__.py
-Scanned: 2016-10-19 13:56:18.914232
-Vulnerability 1:
-File: flask-leaderboard/leaderboard/endpoints/login.py
- > User input at line 13, trigger word "form[":
- user = User.query.filter(User.name == request.form['username']).first()
-Reassigned in:
- File: flask-leaderboard/leaderboard/endpoints/login.py
- > Line 19: session['user_id'] = user.id
-File: flask-leaderboard/leaderboard/endpoints/login.py
- > reaches line 13, trigger word "filter(":
- user = User.query.filter(User.name == request.form['username']).first()
-
-
-
-betobaz/app_flask
-https://github.com/betobaz/app_flask
-Entry file: app_flask/app/routes.py
-Scanned: 2016-10-19 13:56:20.318326
-No vulnerabilities found.
-
-
-elimgoodman/Personnel-Flask
-https://github.com/elimgoodman/Personnel-Flask
-Entry file: Personnel-Flask/app/__init__.py
-Scanned: 2016-10-19 13:56:22.488197
-Vulnerability 1:
-File: Personnel-Flask/app/users/views.py
- > User input at line 68, trigger word "get(":
- salt = app.config.get('PW_SALT')
-Reassigned in:
- File: Personnel-Flask/app/users/views.py
- > Line 69: password_hash = bcrypt.hashpw(form.password.data, salt)
- File: Personnel-Flask/app/users/views.py
- > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash)
-File: Personnel-Flask/app/users/views.py
- > reaches line 74, trigger word "filter(":
- user = User.query.filter(clause).one()
-
-Vulnerability 2:
-File: Personnel-Flask/app/users/views.py
- > User input at line 69, trigger word ".data":
- password_hash = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: Personnel-Flask/app/users/views.py
- > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash)
-File: Personnel-Flask/app/users/views.py
- > reaches line 74, trigger word "filter(":
- user = User.query.filter(clause).one()
-
-Vulnerability 3:
-File: Personnel-Flask/app/users/views.py
- > User input at line 71, trigger word ".data":
- clause = and_(User.email == form.email.data, User.password_hash == password_hash)
-File: Personnel-Flask/app/users/views.py
- > reaches line 74, trigger word "filter(":
- user = User.query.filter(clause).one()
-
-
-
-erikgrueter/flask_app
-https://github.com/erikgrueter/flask_app
-Entry file: None
-Scanned: 2016-10-19 13:56:23.489814
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app.
-
-Duelist/ianb-flask
-https://github.com/Duelist/ianb-flask
-Entry file: ianb-flask/ianb/__init__.py
-Scanned: 2016-10-19 13:56:24.934721
-No vulnerabilities found.
-
-
-stephanienkram/Flask-Money-Tracker
-https://github.com/stephanienkram/Flask-Money-Tracker
-Entry file: Flask-Money-Tracker/main.py
-Scanned: 2016-10-19 13:56:26.047789
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cismet/sqlparse-flask-webservice
-https://github.com/cismet/sqlparse-flask-webservice
-Entry file: sqlparse-flask-webservice/sqlparse_webservice.py
-Scanned: 2016-10-19 13:56:26.577072
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jonascj/flask_logger_test
-https://github.com/jonascj/flask_logger_test
-Entry file: flask_logger_test/flask_logger_test.py
-Scanned: 2016-10-19 13:56:32.214509
-No vulnerabilities found.
-
-
-luckypool/flask-blueprints-template
-https://github.com/luckypool/flask-blueprints-template
-Entry file: flask-blueprints-template/hello/__init__.py
-Scanned: 2016-10-19 13:56:34.654314
-No vulnerabilities found.
-
-
-dylanvee/flask-hello-world
-https://github.com/dylanvee/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-19 13:56:35.210140
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-adamjmarkham/flask-micro-blog
-https://github.com/adamjmarkham/flask-micro-blog
-Entry file: flask-micro-blog/micro_blog_flask.py
-Scanned: 2016-10-19 13:56:43.649954
-No vulnerabilities found.
-
-
-chrismeono1022/microblog_flask_tutorial
-https://github.com/chrismeono1022/microblog_flask_tutorial
-Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-19 13:56:47.279084
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jsutterfield/flaskr-buildout
-https://github.com/jsutterfield/flaskr-buildout
-Entry file: flaskr-buildout/src/flaskr/flaskr.py
-Scanned: 2016-10-19 13:56:54.890901
-No vulnerabilities found.
-
-
-corydolphin/boilerflask-facebook
-https://github.com/corydolphin/boilerflask-facebook
-Entry file: boilerflask-facebook/boilerflask/__init__.py
-Scanned: 2016-10-19 13:57:03.438367
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-subdesign/temp_Flaskblog
-https://github.com/subdesign/temp_Flaskblog
-Entry file: temp_Flaskblog/app.py
-Scanned: 2016-10-19 13:57:05.063205
-Vulnerability 1:
-File: temp_Flaskblog/app.py
- > User input at line 107, trigger word ".data":
- cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d])
-File: temp_Flaskblog/app.py
- > reaches line 107, trigger word "execute(":
- cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d])
-
-Vulnerability 2:
-File: temp_Flaskblog/app.py
- > User input at line 129, trigger word ".data":
- cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id))
-File: temp_Flaskblog/app.py
- > reaches line 129, trigger word "execute(":
- cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id))
-
-
-
-farresmoidu/weather
-https://github.com/farresmoidu/weather
-Entry file: weather/weather.py
-Scanned: 2016-10-19 13:57:06.397311
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thensgens/vvs
-https://github.com/thensgens/vvs
-Entry file: vvs/src/flask/sessions.py
-Scanned: 2016-10-19 13:57:08.481989
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mwieler/soccer
-https://github.com/mwieler/soccer
-Entry file: soccer/soccer/main.py
-Scanned: 2016-10-19 13:57:09.878543
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shiroyuki/tori-sample-blog
-https://github.com/shiroyuki/tori-sample-blog
-Entry file: tori-sample-blog/main.py
-Scanned: 2016-10-19 13:57:11.284027
-No vulnerabilities found.
-
-
-jackvnimble/jackvnimble
-https://github.com/jackvnimble/jackvnimble
-Entry file: jackvnimble/flaskblog.py
-Scanned: 2016-10-19 13:57:14.055245
-No vulnerabilities found.
-
-
-micahwalter/hello-mysql
-https://github.com/micahwalter/hello-mysql
-Entry file: hello-mysql/hello-mysql.py
-Scanned: 2016-10-19 13:57:15.354958
-No vulnerabilities found.
-
-
-itsme300/assignment
-https://github.com/itsme300/assignment
-Entry file: assignment/iptables.py
-Scanned: 2016-10-19 13:57:16.753853
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yhyap/lipsum
-https://github.com/yhyap/lipsum
-Entry file: lipsum/flask/app.py
-Scanned: 2016-10-19 13:57:18.900535
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lxchavez/CSULB-Confessions
-https://github.com/lxchavez/CSULB-Confessions
-Entry file: CSULB-Confessions/confessions_app/__init__.py
-Scanned: 2016-10-19 13:57:21.885565
-No vulnerabilities found.
-
-
-tornado-utils/tornado-restless
-https://github.com/tornado-utils/tornado-restless
-Entry file: tornado-restless/tests/base.py
-Scanned: 2016-10-19 13:57:25.399463
-No vulnerabilities found.
-
-
-btomashvili/flasb
-https://github.com/btomashvili/flasb
-Entry file: None
-Scanned: 2016-10-19 13:57:25.919894
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb.
-
-maxcountryman/flask-simpleoauth
-https://github.com/maxcountryman/flask-simpleoauth
-Entry file: flask-simpleoauth/flask_simpleoauth/app.py
-Scanned: 2016-10-19 13:57:27.355851
-Vulnerability 1:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 30, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.index'))
-Reassigned in:
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 30, trigger word "url_for(":
- next_url = request.args.get('next_url', url_for('.index'))
-
-Vulnerability 2:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 30, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.index'))
-Reassigned in:
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 3:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 42, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.login'))
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 42, trigger word "url_for(":
- next_url = request.args.get('next_url', url_for('.login'))
-
-Vulnerability 4:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 42, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.login'))
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 44, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 5:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 53, trigger word ".data":
- consumer = Consumer(name=form.name.data, callback_uri=form.callback_uri.data)
-Reassigned in:
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 58: args = 'key''secret'consumer.keyconsumer.secret
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 62: consumer = Consumer.objects.with_id(consumer_id)
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 59, trigger word "flash(":
- flash('Consumer created. Key {key} Secret {secret}'.format(args))
-
-
-
-bayazee/flask-mosession
-https://github.com/bayazee/flask-mosession
-Entry file: flask-mosession/example/example.py
-Scanned: 2016-10-19 13:57:28.899700
-No vulnerabilities found.
-
-
-fabin/Flaskr
-https://github.com/fabin/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-19 13:57:29.437895
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dorajistyle/proposal_center_python_flask_sqlalchemy_jade
-https://github.com/dorajistyle/proposal_center_python_flask_sqlalchemy_jade
-Entry file: proposal_center_python_flask_sqlalchemy_jade/application/__init__.py
-Scanned: 2016-10-19 13:57:31.628223
-Vulnerability 1:
-File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py
- > User input at line 58, trigger word "get(":
- feedback = Feedback.query.get(feedback_id)
-File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py
- > reaches line 59, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(feedback_id=feedback_id, vote_count=feedback.vote_count())
-
-
-
-fabin/Flask-Upload
-https://github.com/fabin/Flask-Upload
-Entry file: Flask-Upload/upload/__init__.py
-Scanned: 2016-10-19 13:57:32.997675
-Vulnerability 1:
-File: Flask-Upload/upload/__init__.py
- > User input at line 24, trigger word "files[":
- uploadedFile = request.files['file']
-Reassigned in:
- File: Flask-Upload/upload/__init__.py
- > Line 26: filename = uploadedFile.filename
- File: Flask-Upload/upload/__init__.py
- > Line 36: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File (in package)
-
- '
-File: Flask-Upload/upload/__init__.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob))
-
-
-
-gabrielengel/learn-flask
-https://github.com/gabrielengel/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-19 13:57:35.770419
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mutaku/alfred_flask
-https://github.com/mutaku/alfred_flask
-Entry file: alfred_flask/alfred.py
-Scanned: 2016-10-19 13:57:36.287593
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-erikgrueter/flask_app
-https://github.com/erikgrueter/flask_app
-Entry file: None
-Scanned: 2016-10-19 13:57:43.793528
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app.
-
-marksteve/flask-nsq
-https://github.com/marksteve/flask-nsq
-Entry file: flask-nsq/test.py
-Scanned: 2016-10-19 13:57:46.313939
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-luxuia/gene_designer
-https://github.com/luxuia/gene_designer
-Entry file: gene_designer/geneDesigne.py
-Scanned: 2016-10-19 13:58:05.359324
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rubinovitz/flask-gevent-boiler
-https://github.com/rubinovitz/flask-gevent-boiler
-Entry file: flask-gevent-boiler/app.py
-Scanned: 2016-10-19 13:58:05.897788
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyhmltn/stripe-flask-test
-https://github.com/andyhmltn/stripe-flask-test
-Entry file: stripe-flask-test/main.py
-Scanned: 2016-10-19 13:58:07.421973
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-manuclementz/shrt
-https://github.com/manuclementz/shrt
-Entry file: shrt/app.py
-Scanned: 2016-10-19 13:58:11.243823
-Vulnerability 1:
-File: shrt/app.py
- > User input at line 46, trigger word "form[":
- link = ShortLink(request.form['url'])
-Reassigned in:
- File: shrt/app.py
- > Line 49: link.encoded_id = encode_id(link.id)
- File: shrt/app.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
-File: shrt/app.py
- > reaches line 52, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id))
-
-Vulnerability 2:
-File: shrt/app.py
- > User input at line 46, trigger word "form[":
- link = ShortLink(request.form['url'])
-Reassigned in:
- File: shrt/app.py
- > Line 49: link.encoded_id = encode_id(link.id)
- File: shrt/app.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
-File: shrt/app.py
- > reaches line 52, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id))
-
-
-
-liontree/lemonbook
-https://github.com/liontree/lemonbook
-Entry file: lemonbook/__init__.py
-Scanned: 2016-10-19 13:58:13.626917
-Vulnerability 1:
-File: lemonbook/common/flask_login.py
- > User input at line 227, trigger word "get(":
- cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME)
-File: lemonbook/common/flask_login.py
- > reaches line 237, trigger word "set_cookie(":
- response.set_cookie(cookie_name, data,expires=expires, domain=domain)
-
-Vulnerability 2:
-File: lemonbook/common/flask_login.py
- > User input at line 228, trigger word "get(":
- duration = config.get('REMEMBER_COOKIE_DURATION', COOKIE_DURATION)
-Reassigned in:
- File: lemonbook/common/flask_login.py
- > Line 235: expires = datetime.utcnow() + duration
-File: lemonbook/common/flask_login.py
- > reaches line 237, trigger word "set_cookie(":
- response.set_cookie(cookie_name, data,expires=expires, domain=domain)
-
-Vulnerability 3:
-File: lemonbook/common/flask_login.py
- > User input at line 229, trigger word "get(":
- domain = config.get('REMEMBER_COOKIE_DOMAIN', None)
-File: lemonbook/common/flask_login.py
- > reaches line 237, trigger word "set_cookie(":
- response.set_cookie(cookie_name, data,expires=expires, domain=domain)
-
-Vulnerability 4:
-File: lemonbook/views/notes.py
- > User input at line 50, trigger word "form[":
- date = request.form['date'].strip()
-Reassigned in:
- File: lemonbook/views/notes.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents)
- File: lemonbook/views/notes.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest'))
-File: lemonbook/views/notes.py
- > reaches line 55, trigger word "replace(":
- date = date.replace('/', '')
-
-Vulnerability 5:
-File: lemonbook/views/notes.py
- > User input at line 50, trigger word "form[":
- date = request.form['date'].strip()
-Reassigned in:
- File: lemonbook/views/notes.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents)
- File: lemonbook/views/notes.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest'))
-File: lemonbook/views/notes.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date))
-
-
-
-willkg/fredrik
-https://github.com/willkg/fredrik
-Entry file: fredrik/fredrik/project-template/PROJECTMODULE/main.py
-Scanned: 2016-10-19 13:58:15.273935
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scotfu/gae-twitter
-https://github.com/scotfu/gae-twitter
-Entry file: gae-twitter/lib/flask/sessions.py
-Scanned: 2016-10-19 13:58:19.833151
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-richardmonette/webremote
-https://github.com/richardmonette/webremote
-Entry file: webremote/app.py
-Scanned: 2016-10-19 13:58:21.610741
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-micahwalter/hello-mysql
-https://github.com/micahwalter/hello-mysql
-Entry file: hello-mysql/hello-mysql.py
-Scanned: 2016-10-19 13:58:22.911087
-No vulnerabilities found.
-
-
-joshsee/GAE-Online-Apparel-Survey-Form
-https://github.com/joshsee/GAE-Online-Apparel-Survey-Form
-Entry file: GAE-Online-Apparel-Survey-Form/flask/sessions.py
-Scanned: 2016-10-19 13:58:25.134036
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-samsolariusleo/Flask
-https://github.com/samsolariusleo/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-19 13:58:26.793030
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adamgreenhall/flask-haml-sass-coffee-template
-https://github.com/adamgreenhall/flask-haml-sass-coffee-template
-Entry file: flask-haml-sass-coffee-template/app.py
-Scanned: 2016-10-19 13:58:28.587018
-No vulnerabilities found.
-
-
-prakhar1989/flask-tuts
-https://github.com/prakhar1989/flask-tuts
-Entry file: flask-tuts/lesson-2/blogs/__init__.py
-Scanned: 2016-10-19 13:58:31.993430
-No vulnerabilities found.
-
-
-damour/flaskr
-https://github.com/damour/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:58:33.089989
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fabin/Flaskr
-https://github.com/fabin/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-19 13:58:33.700202
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Aussiroth/FlaskPractical
-https://github.com/Aussiroth/FlaskPractical
-Entry file: FlaskPractical/flask/routes.py
-Scanned: 2016-10-19 13:58:34.586440
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-fabin/Flask-Upload
-https://github.com/fabin/Flask-Upload
-Entry file: Flask-Upload/upload/__init__.py
-Scanned: 2016-10-19 13:58:36.356480
-Vulnerability 1:
-File: Flask-Upload/upload/__init__.py
- > User input at line 24, trigger word "files[":
- uploadedFile = request.files['file']
-Reassigned in:
- File: Flask-Upload/upload/__init__.py
- > Line 26: filename = uploadedFile.filename
- File: Flask-Upload/upload/__init__.py
- > Line 36: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File (in package)
-
- '
-File: Flask-Upload/upload/__init__.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob))
-
-
-
-lachezar/tada_backend
-https://github.com/lachezar/tada_backend
-Entry file: tada_backend/todo.py
-Scanned: 2016-10-19 13:58:38.465270
-No vulnerabilities found.
-
-
-krushton/flask-location-example
-https://github.com/krushton/flask-location-example
-Entry file: flask-location-example/app.py
-Scanned: 2016-10-19 13:58:48.344387
-No vulnerabilities found.
-
-
-david-torres/flask-rest-quickstart
-https://github.com/david-torres/flask-rest-quickstart
-Entry file: flask-rest-quickstart/application/__init__.py
-Scanned: 2016-10-19 13:58:55.704652
-No vulnerabilities found.
-
-
-Syerram/maintenance-server
-https://github.com/Syerram/maintenance-server
-Entry file: maintenance-server/run.py
-Scanned: 2016-10-19 13:59:07.257915
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bettertest-org/flask_app_skeleton_on_gae
-https://github.com/bettertest-org/flask_app_skeleton_on_gae
-Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py
-Scanned: 2016-10-19 13:59:07.805380
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-abhiomkar/contacts-rest
-https://github.com/abhiomkar/contacts-rest
-Entry file: contacts-rest/contacts.py
-Scanned: 2016-10-19 13:59:09.323572
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Giorgix/thor
-https://github.com/Giorgix/thor
-Entry file: thor/thor.py
-Scanned: 2016-10-19 13:59:10.706626
-No vulnerabilities found.
-
-
-dyim42/wiki
-https://github.com/dyim42/wiki
-Entry file: None
-Scanned: 2016-10-19 13:59:13.747750
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aromanovich/flask-webtest
-https://github.com/aromanovich/flask-webtest
-Entry file: flask-webtest/tests/core.py
-Scanned: 2016-10-19 13:59:19.843988
-No vulnerabilities found.
-
-
-sintezcs/flask
-https://github.com/sintezcs/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-19 13:59:21.929169
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wangzexin/flask
-https://github.com/wangzexin/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-19 13:59:23.514228
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Treeki/bitBoard
-https://github.com/Treeki/bitBoard
-Entry file: bitBoard/bitBoard/__init__.py
-Scanned: 2016-10-19 13:59:26.362672
-Vulnerability 1:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 173, trigger word "get(":
- pagenum = int(request.args.get('page', 1))
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 175: pagination = query.paginate(pagenum, THREADS_PER_PAGE,error_out=False)
- File: bitBoard/bitBoard/views/board.py
- > Line 180: pagination.items = add_null_entities(pagination.items)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 183, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('thread_list.html',mode='forum', forum=forum, stickies=stickies, threads=pagination.items, pagination=pagination)
-
-Vulnerability 2:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 210, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 219: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 218, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301)
-
-Vulnerability 3:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 224, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 233: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 232, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301)
-
-Vulnerability 4:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 239, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303)
- File: bitBoard/bitBoard/views/board.py
- > Line 291: user = post.creator
- File: bitBoard/bitBoard/views/board.py
- > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 250, trigger word "filter(":
- post = Post.query.filter(Post.thread == thread, Post.created_at > timestamp).order_by(db.asc(Post.created_at)).first()
-
-Vulnerability 5:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 239, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303)
- File: bitBoard/bitBoard/views/board.py
- > Line 291: user = post.creator
- File: bitBoard/bitBoard/views/board.py
- > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 255, trigger word "filter(":
- post = Post.query.filter(Post.thread == thread).order_by(db.asc(Post.created_at)).first()
-
-Vulnerability 6:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 286, trigger word "get(":
- pagenum = int(request.args.get('page', 1))
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 287: pagination = query.paginate(pagenum, POSTS_PER_PAGE,error_out=False)
- File: bitBoard/bitBoard/views/board.py
- > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 296, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply)
-
-Vulnerability 7:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 366, trigger word ".data":
- thread = Thread(title=form.title.data, subtitle=form.subtitle.data, forum=forum, creator=g.user, type=is_privateThread.PRIVATEThread.BASIC_THREAD, post_count=1)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 382: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 400: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 407: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 412: notify = Notification(thread=thread, recipient=user, type=Notification.NEW_PRIVATE_THREAD)
- File: bitBoard/bitBoard/views/board.py
- > Line 422: ret_MAYBE_FUNCTION_NAME = render_template('post.html',is_thread=True, is_private=is_private, recipient_errors=recipient_errors, form=form, forum=forum, pm_recipient_limit=PM_RECIPIENT_LIMIT, url=url)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 420, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303)
-
-Vulnerability 8:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 459, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.reply_url,code=301)
-
-Vulnerability 9:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 504, trigger word "filter(":
- notify_which = db.session.query(u_table.c.user_id, Notification.id).filter(u_table.c.thread_id == thread.id).filter(u_table.c.user_id != g.user.id).outerjoin(Notification, notify_join)
-
-Vulnerability 10:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 534, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-
-Vulnerability 11:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 536, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post))
-
-Vulnerability 12:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 536, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post))
-
-Vulnerability 13:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 546, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, thread=thread, forum=thread.forum, url=thread.reply_url)
-
-Vulnerability 14:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 577, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301)
-
-Vulnerability 15:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 579, trigger word "filter(":
- posts_before = Post.query.filter(Post.thread == thread, Post.id < post.id).count()
-
-Vulnerability 16:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 595, trigger word "render_template(":
- html = render_template('inline_edit.html',post=post, is_thread=edits_thread, form=form, url=post.edit_url)
-
-Vulnerability 17:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 627, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-
-Vulnerability 18:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 629, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content)))
-
-Vulnerability 19:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 604, trigger word ".data":
- version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 635: ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url)
- File: bitBoard/bitBoard/views/board.py
- > Line 643: ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form))
- File: bitBoard/bitBoard/views/board.py
- > Line 577: ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 627: ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 629, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content)))
-
-Vulnerability 20:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 635, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url)
-
-Vulnerability 21:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 643, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form))
-
-Vulnerability 22:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 669, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.delete_url,code=301)
-
-Vulnerability 23:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 679, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-
-Vulnerability 24:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 681, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post))
-
-Vulnerability 25:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 681, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post))
-
-Vulnerability 26:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 686, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirm_post_delete.html',post=post, thread=post.thread, forum=post.thread.forum, url=post.delete_url)
-
-Vulnerability 27:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 696, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 703: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 704: url = thread.move_url
- File: bitBoard/bitBoard/views/board.py
- > Line 730: form = MoveThreadForm(destforum=thread.forum_id)
- File: bitBoard/bitBoard/views/board.py
- > Line 734: new_forum_id = form.destforum.data
- File: bitBoard/bitBoard/views/board.py
- > Line 741: old_forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 743: old_forum.post_count -= thread.post_count
- File: bitBoard/bitBoard/views/board.py
- > Line 745: thread.forum_id = new_forum_id
- File: bitBoard/bitBoard/views/board.py
- > Line 749: new_forum.post_count += thread.post_count
-File: bitBoard/bitBoard/views/board.py
- > reaches line 710, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url,code=301)
-
-Vulnerability 28:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 696, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 703: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 704: url = thread.move_url
- File: bitBoard/bitBoard/views/board.py
- > Line 730: form = MoveThreadForm(destforum=thread.forum_id)
- File: bitBoard/bitBoard/views/board.py
- > Line 734: new_forum_id = form.destforum.data
- File: bitBoard/bitBoard/views/board.py
- > Line 741: old_forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 743: old_forum.post_count -= thread.post_count
- File: bitBoard/bitBoard/views/board.py
- > Line 745: thread.forum_id = new_forum_id
- File: bitBoard/bitBoard/views/board.py
- > Line 749: new_forum.post_count += thread.post_count
-File: bitBoard/bitBoard/views/board.py
- > reaches line 757, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303)
-
-Vulnerability 29:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 696, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 703: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 704: url = thread.move_url
- File: bitBoard/bitBoard/views/board.py
- > Line 730: form = MoveThreadForm(destforum=thread.forum_id)
- File: bitBoard/bitBoard/views/board.py
- > Line 734: new_forum_id = form.destforum.data
- File: bitBoard/bitBoard/views/board.py
- > Line 741: old_forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 743: old_forum.post_count -= thread.post_count
- File: bitBoard/bitBoard/views/board.py
- > Line 745: thread.forum_id = new_forum_id
- File: bitBoard/bitBoard/views/board.py
- > Line 749: new_forum.post_count += thread.post_count
-File: bitBoard/bitBoard/views/board.py
- > reaches line 760, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('move_thread.html',form=form, forum=forum, thread=thread, url=url)
-
-Vulnerability 30:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 775, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 782: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 785: url = thread.sticky_url
- File: bitBoard/bitBoard/views/board.py
- > Line 787: url = thread.lock_url
- File: bitBoard/bitBoard/views/board.py
- > Line 791: url = thread.follow_url
- File: bitBoard/bitBoard/views/board.py
- > Line 808: old_value = thread.is_stickied
- File: bitBoard/bitBoard/views/board.py
- > Line 822: old_value = thread.is_locked
- File: bitBoard/bitBoard/views/board.py
- > Line 836: old_value = thread.is_followed_by(g.user)
- File: bitBoard/bitBoard/views/board.py
- > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 802, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url,code=301)
-
-Vulnerability 31:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 775, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 782: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 785: url = thread.sticky_url
- File: bitBoard/bitBoard/views/board.py
- > Line 787: url = thread.lock_url
- File: bitBoard/bitBoard/views/board.py
- > Line 791: url = thread.follow_url
- File: bitBoard/bitBoard/views/board.py
- > Line 808: old_value = thread.is_stickied
- File: bitBoard/bitBoard/views/board.py
- > Line 822: old_value = thread.is_locked
- File: bitBoard/bitBoard/views/board.py
- > Line 836: old_value = thread.is_followed_by(g.user)
- File: bitBoard/bitBoard/views/board.py
- > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 869, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = form.redirect(url=thread.url)
-
-Vulnerability 32:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 775, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 782: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 785: url = thread.sticky_url
- File: bitBoard/bitBoard/views/board.py
- > Line 787: url = thread.lock_url
- File: bitBoard/bitBoard/views/board.py
- > Line 791: url = thread.follow_url
- File: bitBoard/bitBoard/views/board.py
- > Line 808: old_value = thread.is_stickied
- File: bitBoard/bitBoard/views/board.py
- > Line 822: old_value = thread.is_locked
- File: bitBoard/bitBoard/views/board.py
- > Line 836: old_value = thread.is_followed_by(g.user)
- File: bitBoard/bitBoard/views/board.py
- > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 871, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirm.html',form=form, crumbs_type='thread', forum=forum, thread=thread, final_crumb='%s Thread' % cap_verb, message=message, url=url)
-
-Vulnerability 33:
-File: bitBoard/bitBoard/views/base.py
- > User input at line 49, trigger word "get(":
- target = get_redirect_target() or url
-Reassigned in:
- File: bitBoard/bitBoard/views/base.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data)
-File: bitBoard/bitBoard/views/base.py
- > reaches line 50, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303)
-
-Vulnerability 34:
-File: bitBoard/bitBoard/views/base.py
- > User input at line 49, trigger word "get(":
- target = get_redirect_target() or url
-Reassigned in:
- File: bitBoard/bitBoard/views/base.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data)
-File: bitBoard/bitBoard/views/base.py
- > reaches line 50, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303)
-
-Vulnerability 35:
-File: bitBoard/bitBoard/views/wiki.py
- > User input at line 31, trigger word "get(":
- revision = WikiRevision.query.get(revision_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/wiki.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(page.url,code=303)
-File: bitBoard/bitBoard/views/wiki.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('wiki_page.html',is_old_revision=True, page=page, revision=revision)
-
-Vulnerability 36:
-File: bitBoard/bitBoard/views/user.py
- > User input at line 36, trigger word ".data":
- user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first()
-Reassigned in:
- File: bitBoard/bitBoard/views/user.py
- > Line 44: self.user = user
-File: bitBoard/bitBoard/views/user.py
- > reaches line 36, trigger word "filter(":
- user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first()
-
-Vulnerability 37:
-File: bitBoard/bitBoard/views/user.py
- > User input at line 124, trigger word "get(":
- user = User.query.get(id)
-File: bitBoard/bitBoard/views/user.py
- > reaches line 128, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(user.url,code=301)
-
-Vulnerability 38:
-File: bitBoard/bitBoard/views/user.py
- > User input at line 124, trigger word "get(":
- user = User.query.get(id)
-File: bitBoard/bitBoard/views/user.py
- > reaches line 129, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('profile.html',user=user)
-
-
-
-byu-osl/familytree-sample-app
-https://github.com/byu-osl/familytree-sample-app
-Entry file: familytree-sample-app/app.py
-Scanned: 2016-10-19 13:59:26.884698
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kmiasko/flask-barcode
-https://github.com/kmiasko/flask-barcode
-Entry file: flask-barcode/wsgi.py
-Scanned: 2016-10-19 13:59:28.219837
-No vulnerabilities found.
-
-
-jayzcode/helloflask
-https://github.com/jayzcode/helloflask
-Entry file: helloflask/hello.py
-Scanned: 2016-10-19 13:59:28.763071
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py
-
-bootandy/flask-sample
-https://github.com/bootandy/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-19 13:59:29.301853
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lee814/flaskr
-https://github.com/lee814/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 13:59:29.888598
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JLtheking/FlaskExample
-https://github.com/JLtheking/FlaskExample
-Entry file: FlaskExample/routes.py
-Scanned: 2016-10-19 13:59:30.433939
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-redfive/python-flask
-https://github.com/redfive/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-19 13:59:33.589211
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-atbaker/flask-tutorial
-https://github.com/atbaker/flask-tutorial
-Entry file: None
-Scanned: 2016-10-19 13:59:35.608653
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-marcilioleite/flask-saude
-https://github.com/marcilioleite/flask-saude
-Entry file: flask-saude/app/__init__.py
-Scanned: 2016-10-19 13:59:37.424193
-Vulnerability 1:
-File: flask-saude/app/views.py
- > User input at line 11, trigger word "get(":
- m = Medico.query.get(1)
-File: flask-saude/app/views.py
- > reaches line 12, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('medico.html',medico=m)
-
-
-
-bradmerlin/porty_flask
-https://github.com/bradmerlin/porty_flask
-Entry file: porty_flask/app.py
-Scanned: 2016-10-19 13:59:38.483098
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-asap/watchman.flask
-https://github.com/asap/watchman.flask
-Entry file: None
-Scanned: 2016-10-19 13:59:39.019032
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bradmerlin/mxit-spock_flask
-https://github.com/bradmerlin/mxit-spock_flask
-Entry file: mxit-spock_flask/app.py
-Scanned: 2016-10-19 13:59:46.574787
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rartavia/flask-babel-example
-https://github.com/rartavia/flask-babel-example
-Entry file: flask-babel-example/flask-babel-example.py
-Scanned: 2016-10-19 13:59:49.902580
-No vulnerabilities found.
-
-
-elidickinson/flask-proxy-demo
-https://github.com/elidickinson/flask-proxy-demo
-Entry file: flask-proxy-demo/hello.py
-Scanned: 2016-10-19 13:59:57.280896
-No vulnerabilities found.
-
-
-bradmerlin/mxit-blackjack_flask
-https://github.com/bradmerlin/mxit-blackjack_flask
-Entry file: mxit-blackjack_flask/app.py
-Scanned: 2016-10-19 14:00:09.347888
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-geunieve/ratemyfirefart
-https://github.com/geunieve/ratemyfirefart
-Entry file: ratemyfirefart/views.py
-Scanned: 2016-10-19 14:00:11.706933
-No vulnerabilities found.
-
-
-wangxiaoxiao88/python-bookmanager
-https://github.com/wangxiaoxiao88/python-bookmanager
-Entry file: python-bookmanager/app.py
-Scanned: 2016-10-19 14:00:13.128584
-No vulnerabilities found.
-
-
-bettertest-org/flask_app_skeleton_on_gae
-https://github.com/bettertest-org/flask_app_skeleton_on_gae
-Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py
-Scanned: 2016-10-19 14:00:13.674022
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChannelIQ/redis-explorer
-https://github.com/ChannelIQ/redis-explorer
-Entry file: redis-explorer/redis_explorer/__init__.py
-Scanned: 2016-10-19 14:00:16.226225
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-dougdragon/fuckyeanouns.com
-https://github.com/dougdragon/fuckyeanouns.com
-Entry file: None
-Scanned: 2016-10-19 14:00:17.548163
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dougdragon/fuckyeanouns.com.
-
-brocksamson/minesweeper
-https://github.com/brocksamson/minesweeper
-Entry file: minesweeper/minesweeper/__init__.py
-Scanned: 2016-10-19 14:00:20.504293
-No vulnerabilities found.
-
-
-Sadhanandh/Chat-thumbnailer
-https://github.com/Sadhanandh/Chat-thumbnailer
-Entry file: Chat-thumbnailer/urllib2-enabled/flask_app.py
-Scanned: 2016-10-19 14:00:22.960607
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-znewman01/creepy
-https://github.com/znewman01/creepy
-Entry file: creepy/creepy/app.py
-Scanned: 2016-10-19 14:00:24.619752
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aliismayilov/microblog
-https://github.com/aliismayilov/microblog
-Entry file: None
-Scanned: 2016-10-19 14:00:25.133486
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-konrad/annotation_helper_web_app
-https://github.com/konrad/annotation_helper_web_app
-Entry file: annotation_helper_web_app/annotate.py
-Scanned: 2016-10-19 14:00:26.571709
-No vulnerabilities found.
-
-
-smerritt/tempurl-signer
-https://github.com/smerritt/tempurl-signer
-Entry file: tempurl-signer/app.py
-Scanned: 2016-10-19 14:00:27.885477
-No vulnerabilities found.
-
-
-laiqing/crossFireWall-Search
-https://github.com/laiqing/crossFireWall-Search
-Entry file: crossFireWall-Search/google-enchance.py
-Scanned: 2016-10-19 14:00:29.440559
-No vulnerabilities found.
-
-
-lepture/flask-oauthlib
-https://github.com/lepture/flask-oauthlib
-Entry file: flask-oauthlib/flask_oauthlib/provider/oauth1.py
-Scanned: 2016-10-19 14:00:33.811528
-Vulnerability 1:
-File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > User input at line 87, trigger word "get(":
- error_endpoint = self.app.config.get('OAUTH1_PROVIDER_ERROR_ENDPOINT')
-Reassigned in:
- File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = '/oauth/errors'
- File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = error_uri
-File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > reaches line 89, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint)
-
-Vulnerability 2:
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > User input at line 104, trigger word "get(":
- error_endpoint = self.app.config.get('OAUTH2_PROVIDER_ERROR_ENDPOINT')
-Reassigned in:
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 107: ret_MAYBE_FUNCTION_NAME = '/oauth/errors'
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = error_uri
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > reaches line 106, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint)
-
-Vulnerability 3:
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > User input at line 447, trigger word "get(":
- redirect_uri = credentials.get('redirect_uri')
-Reassigned in:
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 464: ret_MAYBE_FUNCTION_NAME = redirect(add_params_to_uri(self.error_uri, 'error'str(e)))
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 455: ret_MAYBE_FUNCTION_NAME = create_response(ret)
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 458: ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(self.error_uri))
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > reaches line 461, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(redirect_uri or self.error_uri))
-
-
-
-miguelgrinberg/Flask-HTTPAuth
-https://github.com/miguelgrinberg/Flask-HTTPAuth
-Entry file: Flask-HTTPAuth/examples/basic_auth.py
-Scanned: 2016-10-19 14:00:37.566600
-No vulnerabilities found.
-
-
-plastboks/Flaskmarks
-https://github.com/plastboks/Flaskmarks
-Entry file: Flaskmarks/flaskmarks/__init__.py
-Scanned: 2016-10-19 14:00:39.790350
-Vulnerability 1:
-File: Flaskmarks/flaskmarks/views/marks.py
- > User input at line 92, trigger word "get(":
- q = request.args.get('q')
-Reassigned in:
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 98: m = g.user.q_marks_by_string(page, q, t)
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks'))
-File: Flaskmarks/flaskmarks/views/marks.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m)
-
-Vulnerability 2:
-File: Flaskmarks/flaskmarks/views/marks.py
- > User input at line 93, trigger word "get(":
- t = request.args.get('type')
-Reassigned in:
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 98: m = g.user.q_marks_by_string(page, q, t)
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks'))
-File: Flaskmarks/flaskmarks/views/marks.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m)
-
-Vulnerability 3:
-File: Flaskmarks/flaskmarks/views/auth.py
- > User input at line 33, trigger word ".data":
- u = User.by_uname_or_email(form.username.data)
-File: Flaskmarks/flaskmarks/views/auth.py
- > reaches line 38, trigger word "flash(":
- flash('Welcome %s.' % u.username,category='success')
-
-
-
-sintezcs/flask
-https://github.com/sintezcs/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-19 14:00:40.414316
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-klen/mixer
-https://github.com/klen/mixer
-Entry file: mixer/tests/test_flask.py
-Scanned: 2016-10-19 14:00:42.571652
-No vulnerabilities found.
-
-
-fedenusy/flaskr
-https://github.com/fedenusy/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 14:00:43.579217
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lee814/flaskr
-https://github.com/lee814/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-19 14:00:44.099342
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paraboul/FlaskPress
-https://github.com/paraboul/FlaskPress
-Entry file: None
-Scanned: 2016-10-19 14:00:44.622415
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/paraboul/FlaskPress.
-
-AlexeyMK/gglto_flask
-https://github.com/AlexeyMK/gglto_flask
-Entry file: gglto_flask/gglto.py
-Scanned: 2016-10-19 14:00:46.278159
-Vulnerability 1:
-File: gglto_flask/gglto.py
- > User input at line 27, trigger word "get(":
- base_path = domain_to_redirect_url.get(request.headers['Host'], 'http://google.com/search?q={}')
-File: gglto_flask/gglto.py
- > reaches line 30, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(base_path.format(query_escaped))
-
-
-
-DamnedFacts/flask-contact
-https://github.com/DamnedFacts/flask-contact
-Entry file: flask-contact/main.py
-Scanned: 2016-10-19 14:00:46.807878
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-maxbucknell/vanilla_flask
-https://github.com/maxbucknell/vanilla_flask
-Entry file: vanilla_flask/vanilla/__init__.py
-Scanned: 2016-10-19 14:00:48.465748
-No vulnerabilities found.
-
-
-sammyrulez/flask-grolla
-https://github.com/sammyrulez/flask-grolla
-Entry file: flask-grolla/tests.py
-Scanned: 2016-10-19 14:00:50.578136
-Vulnerability 1:
-File: flask-grolla/flask_grolla.py
- > User input at line 22, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: flask-grolla/flask_grolla.py
- > reaches line 22, trigger word "url_for(":
- next_url = request.args.get('next') or url_for('index')
-
-Vulnerability 2:
-File: flask-grolla/flask_grolla.py
- > User input at line 22, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: flask-grolla/flask_grolla.py
- > reaches line 25, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 3:
-File: flask-grolla/flask_grolla.py
- > User input at line 22, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: flask-grolla/flask_grolla.py
- > reaches line 32, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-
-
-duffy25/sample_flask
-https://github.com/duffy25/sample_flask
-Entry file: sample_flask/sample_flask.py
-Scanned: 2016-10-19 14:00:58.116350
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Joinhack/agent
-https://github.com/Joinhack/agent
-Entry file: agent/flask_sqlalchemy.py
-Scanned: 2016-10-19 14:01:12.067463
-Vulnerability 1:
-File: agent/agent/views/user.py
- > User input at line 14, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/user.py
- > Line 17: user = um.getByLoginId(loginid)
- File: agent/agent/views/user.py
- > Line 18: company = um.getUserCompany(user)
- File: agent/agent/views/user.py
- > Line 19: region = user.department.region
- File: agent/agent/views/user.py
- > Line 20: cities = dm.getCitiesOfCompany(company)
-File: agent/agent/views/user.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=user, company=company, region=region, cities=cities)
-
-Vulnerability 2:
-File: agent/agent/views/user.py
- > User input at line 44, trigger word "form[":
- area = request.form['area']
-Reassigned in:
- File: agent/agent/views/user.py
- > Line 46: reg = Region(type=3, name=name, parent_id=area)
- File: agent/agent/views/user.py
- > Line 49: data = 'value''content''selected'reg.idreg.nameTrue
-File: agent/agent/views/user.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data)
-
-Vulnerability 3:
-File: agent/agent/views/user.py
- > User input at line 45, trigger word "form[":
- name = request.form['section']
-Reassigned in:
- File: agent/agent/views/user.py
- > Line 46: reg = Region(type=3, name=name, parent_id=area)
- File: agent/agent/views/user.py
- > Line 49: data = 'value''content''selected'reg.idreg.nameTrue
-File: agent/agent/views/user.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data)
-
-Vulnerability 4:
-File: agent/agent/views/house.py
- > User input at line 12, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 15: user = um.getByLoginId(loginid)
- File: agent/agent/views/house.py
- > Line 16: company = um.getUserCompany(user)
- File: agent/agent/views/house.py
- > Line 17: cities = dm.getCitiesOfCompany(company)
-File: agent/agent/views/house.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities))
-
-Vulnerability 5:
-File: agent/agent/views/house.py
- > User input at line 12, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 15: user = um.getByLoginId(loginid)
- File: agent/agent/views/house.py
- > Line 16: company = um.getUserCompany(user)
- File: agent/agent/views/house.py
- > Line 17: cities = dm.getCitiesOfCompany(company)
-File: agent/agent/views/house.py
- > reaches line 18, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities))
-
-Vulnerability 6:
-File: agent/agent/views/house.py
- > User input at line 34, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 36: user = um.getByLoginId(loginid)
- File: agent/agent/views/house.py
- > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q)
- File: agent/agent/views/house.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query')
-File: agent/agent/views/house.py
- > reaches line 39, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data))
-
-Vulnerability 7:
-File: agent/agent/views/house.py
- > User input at line 45, trigger word "form[":
- community_name = request.form['community']
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 55: community = Community(name=community_name, location=location)
-File: agent/agent/views/house.py
- > reaches line 67, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name)
-
-Vulnerability 8:
-File: agent/agent/views/house.py
- > User input at line 46, trigger word "form[":
- location = request.form['location']
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 55: community = Community(name=community_name, location=location)
-File: agent/agent/views/house.py
- > reaches line 67, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name)
-
-
-
-vasnake/mapfeatureserver
-https://github.com/vasnake/mapfeatureserver
-Entry file: None
-Scanned: 2016-10-19 14:01:12.596272
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vasnake/mapfeatureserver.
-
-tonilxm/1stFlask
-https://github.com/tonilxm/1stFlask
-Entry file: 1stFlask/src/lib/flask/sessions.py
-Scanned: 2016-10-19 14:01:13.149961
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cldershem/WebFlask-CleanTemplate
-https://github.com/cldershem/WebFlask-CleanTemplate
-Entry file: None
-Scanned: 2016-10-19 14:01:13.661799
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-brooks/python-flask-sample
-https://github.com/brooks/python-flask-sample
-Entry file: python-flask-sample/hello.py
-Scanned: 2016-10-19 14:01:15.254180
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py
-
-palei/Just-Another-Flask-App
-https://github.com/palei/Just-Another-Flask-App
-Entry file: Just-Another-Flask-App/app/__init__.py
-Scanned: 2016-10-19 14:01:16.802908
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-FriendCode/python-flask-sample
-https://github.com/FriendCode/python-flask-sample
-Entry file: python-flask-sample/hello.py
-Scanned: 2016-10-19 14:01:18.354455
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py
-
-thrisp/flarf
-https://github.com/thrisp/flarf
-Entry file: flarf/examples/example.py
-Scanned: 2016-10-19 14:01:23.399347
-No vulnerabilities found.
-
-
-geunieve/ratemyfirefart
-https://github.com/geunieve/ratemyfirefart
-Entry file: ratemyfirefart/views.py
-Scanned: 2016-10-19 14:01:25.696816
-No vulnerabilities found.
-
-
-lhr530124/nozomiServer
-https://github.com/lhr530124/nozomiServer
-Entry file: nozomiServer/app.py
-Scanned: 2016-10-19 14:01:28.075186
-No vulnerabilities found.
-
-
-ChannelIQ/redis-explorer
-https://github.com/ChannelIQ/redis-explorer
-Entry file: redis-explorer/redis_explorer/__init__.py
-Scanned: 2016-10-19 14:01:28.588041
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sangallimarco/arduino_raspberry_garden_ui
-https://github.com/sangallimarco/arduino_raspberry_garden_ui
-Entry file: arduino_raspberry_garden_ui/main.py
-Scanned: 2016-10-19 14:01:29.113224
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-carlosvin/cmsflask
-https://github.com/carlosvin/cmsflask
-Entry file: cmsflask/cmsflask/__init__.py
-Scanned: 2016-10-19 14:01:30.985871
-No vulnerabilities found.
-
-
-Sadhanandh/Fb-page-manager
-https://github.com/Sadhanandh/Fb-page-manager
-Entry file: Fb-page-manager/flask_app.py
-Scanned: 2016-10-19 14:01:31.516951
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chromy/pithy
-https://github.com/chromy/pithy
-Entry file: None
-Scanned: 2016-10-19 14:01:33.047956
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/chromy/pithy.
-
-lpolepeddi/intro-to-flask
-https://github.com/lpolepeddi/intro-to-flask
-Entry file: intro-to-flask/intro_to_flask/__init__.py
-Scanned: 2016-10-20 06:51:13.042094
-No vulnerabilities found.
-
-
-saltycrane/flask-jquery-ajax-example
-https://github.com/saltycrane/flask-jquery-ajax-example
-Entry file: None
-Scanned: 2016-10-20 06:51:13.559213
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example.
-
-jdiez17/flask-paypal
-https://github.com/jdiez17/flask-paypal
-Entry file: flask-paypal/app.py
-Scanned: 2016-10-20 06:51:14.818617
-Vulnerability 1:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 33, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Everything looks good!
- Click here to complete the payment.
- ' % url_for('paypal_do',token=getexp_response['TOKEN'])
-
-Vulnerability 2:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Oh noes! PayPal returned an error code.
-
- %s
-
- Click here to try again.
- ' % (getexp_response['ACK'], url_for('index'))
-
-
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 06:51:16.184186
-No vulnerabilities found.
-
-
-tarbell-project/tarbell
-https://github.com/tarbell-project/tarbell
-Entry file: tarbell/tarbell/app.py
-Scanned: 2016-10-20 06:51:17.138369
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 06:51:17.655636
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-becdot/adventures-in-text
-https://github.com/becdot/adventures-in-text
-Entry file: adventures-in-text/db_methods.py
-Scanned: 2016-10-20 06:51:18.179937
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dirn/Flask-Simon
-https://github.com/dirn/Flask-Simon
-Entry file: Flask-Simon/examples/flaskr/flaskr.py
-Scanned: 2016-10-20 06:51:19.657719
-No vulnerabilities found.
-
-
-caub/flask-geo
-https://github.com/caub/flask-geo
-Entry file: flask-geo/myMap.py
-Scanned: 2016-10-20 06:51:20.180706
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-masayang/flask_dev
-https://github.com/masayang/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 06:51:20.697868
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-20 06:51:21.952416
-No vulnerabilities found.
-
-
-ffiiccuuss/torouterui
-https://github.com/ffiiccuuss/torouterui
-Entry file: torouterui/torouterui/__init__.py
-Scanned: 2016-10-20 06:51:22.468860
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marsella/andrea
-https://github.com/marsella/andrea
-Entry file: andrea/init.py
-Scanned: 2016-10-20 06:51:23.553479
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py
-
-embr/multithon
-https://github.com/embr/multithon
-Entry file: multithon/multithon.py
-Scanned: 2016-10-20 06:51:25.132938
-No vulnerabilities found.
-
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-20 06:51:25.646343
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-20 06:51:26.162908
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-20 06:51:28.003866
-No vulnerabilities found.
-
-
-MaxPresman/tempymail
-https://github.com/MaxPresman/tempymail
-Entry file: tempymail/flask_frontend.py
-Scanned: 2016-10-20 06:51:28.523630
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 06:51:30.896551
-No vulnerabilities found.
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-20 06:51:32.410798
-No vulnerabilities found.
-
-
-Blender3D/Flask-LESS
-https://github.com/Blender3D/Flask-LESS
-Entry file: Flask-LESS/flask_less.py
-Scanned: 2016-10-20 06:51:34.737347
-No vulnerabilities found.
-
-
-hex/flaskr
-https://github.com/hex/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 06:51:35.280176
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 06:51:36.270667
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 06:51:36.792104
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lpolepeddi/intro-to-flask
-https://github.com/lpolepeddi/intro-to-flask
-Entry file: intro-to-flask/intro_to_flask/__init__.py
-Scanned: 2016-10-20 06:53:14.651536
-No vulnerabilities found.
-
-
-saltycrane/flask-jquery-ajax-example
-https://github.com/saltycrane/flask-jquery-ajax-example
-Entry file: None
-Scanned: 2016-10-20 06:53:15.147947
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example.
-
-jdiez17/flask-paypal
-https://github.com/jdiez17/flask-paypal
-Entry file: flask-paypal/app.py
-Scanned: 2016-10-20 06:53:16.345532
-Vulnerability 1:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 33, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Everything looks good!
- Click here to complete the payment.
- ' % url_for('paypal_do',token=getexp_response['TOKEN'])
-
-Vulnerability 2:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Oh noes! PayPal returned an error code.
-
- %s
-
- Click here to try again.
- ' % (getexp_response['ACK'], url_for('index'))
-
-
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 06:53:17.680291
-No vulnerabilities found.
-
-
-tarbell-project/tarbell
-https://github.com/tarbell-project/tarbell
-Entry file: tarbell/tarbell/app.py
-Scanned: 2016-10-20 06:53:18.630604
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 06:53:19.112148
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-becdot/adventures-in-text
-https://github.com/becdot/adventures-in-text
-Entry file: adventures-in-text/db_methods.py
-Scanned: 2016-10-20 06:53:19.597455
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dirn/Flask-Simon
-https://github.com/dirn/Flask-Simon
-Entry file: Flask-Simon/examples/flaskr/flaskr.py
-Scanned: 2016-10-20 06:53:21.029904
-No vulnerabilities found.
-
-
-caub/flask-geo
-https://github.com/caub/flask-geo
-Entry file: flask-geo/myMap.py
-Scanned: 2016-10-20 06:53:21.530338
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-masayang/flask_dev
-https://github.com/masayang/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 06:53:22.029691
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-20 06:53:23.266967
-No vulnerabilities found.
-
-
-ffiiccuuss/torouterui
-https://github.com/ffiiccuuss/torouterui
-Entry file: torouterui/torouterui/__init__.py
-Scanned: 2016-10-20 06:53:23.771455
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marsella/andrea
-https://github.com/marsella/andrea
-Entry file: andrea/init.py
-Scanned: 2016-10-20 06:53:24.786259
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py
-
-embr/multithon
-https://github.com/embr/multithon
-Entry file: multithon/multithon.py
-Scanned: 2016-10-20 06:53:26.343027
-No vulnerabilities found.
-
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-20 06:53:26.856531
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-20 06:53:27.367748
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-20 06:53:29.297310
-No vulnerabilities found.
-
-
-MaxPresman/tempymail
-https://github.com/MaxPresman/tempymail
-Entry file: tempymail/flask_frontend.py
-Scanned: 2016-10-20 06:53:29.802200
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 06:53:32.116384
-No vulnerabilities found.
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-20 06:53:33.651567
-No vulnerabilities found.
-
-
-Blender3D/Flask-LESS
-https://github.com/Blender3D/Flask-LESS
-Entry file: Flask-LESS/flask_less.py
-Scanned: 2016-10-20 06:53:35.987428
-No vulnerabilities found.
-
-
-hex/flaskr
-https://github.com/hex/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 06:53:36.507315
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 06:53:37.476644
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 06:53:37.973907
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lpolepeddi/intro-to-flask
-https://github.com/lpolepeddi/intro-to-flask
-Entry file: intro-to-flask/intro_to_flask/__init__.py
-Scanned: 2016-10-20 08:27:12.053852
-No vulnerabilities found.
-
-
-saltycrane/flask-jquery-ajax-example
-https://github.com/saltycrane/flask-jquery-ajax-example
-Entry file: None
-Scanned: 2016-10-20 08:27:12.547228
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example.
-
-jdiez17/flask-paypal
-https://github.com/jdiez17/flask-paypal
-Entry file: flask-paypal/app.py
-Scanned: 2016-10-20 08:27:13.749667
-Vulnerability 1:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 33, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Everything looks good!
- Click here to complete the payment.
- ' % url_for('paypal_do',token=getexp_response['TOKEN'])
-
-Vulnerability 2:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Oh noes! PayPal returned an error code.
-
- %s
-
- Click here to try again.
- ' % (getexp_response['ACK'], url_for('index'))
-
-
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 08:27:15.080607
-No vulnerabilities found.
-
-
-tarbell-project/tarbell
-https://github.com/tarbell-project/tarbell
-Entry file: tarbell/tarbell/app.py
-Scanned: 2016-10-20 08:27:16.449274
-Vulnerability 1:
-File: tarbell/tarbell/app.py
- > User input at line 558, trigger word "get(":
- spreadsheet_file = self.client.files().get(fileId=key).execute()
-File: tarbell/tarbell/app.py
- > reaches line 558, trigger word "execute(":
- spreadsheet_file = self.client.files().get(fileId=key).execute()
-
-
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 08:27:16.952327
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-becdot/adventures-in-text
-https://github.com/becdot/adventures-in-text
-Entry file: adventures-in-text/db_methods.py
-Scanned: 2016-10-20 08:27:17.464339
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dirn/Flask-Simon
-https://github.com/dirn/Flask-Simon
-Entry file: Flask-Simon/examples/flaskr/flaskr.py
-Scanned: 2016-10-20 08:27:18.903986
-No vulnerabilities found.
-
-
-caub/flask-geo
-https://github.com/caub/flask-geo
-Entry file: flask-geo/myMap.py
-Scanned: 2016-10-20 08:27:19.428052
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-masayang/flask_dev
-https://github.com/masayang/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 08:27:19.965994
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-20 08:27:21.315854
-No vulnerabilities found.
-
-
-ffiiccuuss/torouterui
-https://github.com/ffiiccuuss/torouterui
-Entry file: torouterui/torouterui/__init__.py
-Scanned: 2016-10-20 08:27:21.825577
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marsella/andrea
-https://github.com/marsella/andrea
-Entry file: andrea/init.py
-Scanned: 2016-10-20 08:27:22.879104
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py
-
-embr/multithon
-https://github.com/embr/multithon
-Entry file: multithon/multithon.py
-Scanned: 2016-10-20 08:27:24.451190
-No vulnerabilities found.
-
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-20 08:27:24.964353
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-20 08:27:25.463728
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-20 08:27:27.902289
-No vulnerabilities found.
-
-
-MaxPresman/tempymail
-https://github.com/MaxPresman/tempymail
-Entry file: tempymail/flask_frontend.py
-Scanned: 2016-10-20 08:27:28.409485
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 08:27:30.625953
-No vulnerabilities found.
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-20 08:27:32.136133
-No vulnerabilities found.
-
-
-Blender3D/Flask-LESS
-https://github.com/Blender3D/Flask-LESS
-Entry file: Flask-LESS/flask_less.py
-Scanned: 2016-10-20 08:27:34.387562
-No vulnerabilities found.
-
-
-hex/flaskr
-https://github.com/hex/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:27:34.911900
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 08:27:35.896431
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 08:27:36.391196
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-parryjacob/flask-boilerplate
-https://github.com/parryjacob/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 08:28:10.938439
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/parryjacob/flask-boilerplate.
-
-jpercent/flask-control
-https://github.com/jpercent/flask-control
-Entry file: flask-control/example.py
-Scanned: 2016-10-20 08:28:11.447146
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Ceasar/pocket_flask
-https://github.com/Ceasar/pocket_flask
-Entry file: pocket_flask/app/__init__.py
-Scanned: 2016-10-20 08:28:13.960309
-No vulnerabilities found.
-
-
-CMGS/poll
-https://github.com/CMGS/poll
-Entry file: poll/app.py
-Scanned: 2016-10-20 08:28:17.074592
-Vulnerability 1:
-File: poll/app.py
- > User input at line 31, trigger word "get(":
- q = request.args.get('q', '')
-File: poll/app.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=g.user, subjects=get_subjects(q), groups=get_groups(), group=get_group(q))
-
-Vulnerability 2:
-File: poll/app.py
- > User input at line 59, trigger word "get(":
- group = request.form.get('group')
-Reassigned in:
- File: poll/app.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups())
-File: poll/app.py
- > reaches line 64, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group))
-
-Vulnerability 3:
-File: poll/app.py
- > User input at line 59, trigger word "get(":
- group = request.form.get('group')
-Reassigned in:
- File: poll/app.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups())
-File: poll/app.py
- > reaches line 64, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group))
-
-
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-20 08:28:18.387324
-No vulnerabilities found.
-
-
-dogrdon/txtr
-https://github.com/dogrdon/txtr
-Entry file: txtr/txtr.py
-Scanned: 2016-10-20 08:28:18.899209
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-20 08:28:19.397664
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-perjo927/Portfolio
-https://github.com/perjo927/Portfolio
-Entry file: Portfolio/server.py
-Scanned: 2016-10-20 08:28:21.902112
-Vulnerability 1:
-File: Portfolio/server.py
- > User input at line 96, trigger word "form[":
- search_string = request.form['key']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 2:
-File: Portfolio/server.py
- > User input at line 99, trigger word "form[":
- sort_order = request.form['sort_order']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 3:
-File: Portfolio/server.py
- > User input at line 100, trigger word "form[":
- sort_by = request.form['sort_by']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-20 08:28:22.418123
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sburns/switchboard
-https://github.com/sburns/switchboard
-Entry file: switchboard/sample_app.py
-Scanned: 2016-10-20 08:28:22.924289
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ahawker/jpool
-https://github.com/ahawker/jpool
-Entry file: None
-Scanned: 2016-10-20 08:28:23.423695
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-20 08:28:25.339036
-No vulnerabilities found.
-
-
-bogdan-kulynych/cloudlectures
-https://github.com/bogdan-kulynych/cloudlectures
-Entry file: cloudlectures/flask/sessions.py
-Scanned: 2016-10-20 08:28:25.894192
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DanielleSucher/BookQueue
-https://github.com/DanielleSucher/BookQueue
-Entry file: BookQueue/app.py
-Scanned: 2016-10-20 08:28:27.239965
-Vulnerability 1:
-File: BookQueue/app.py
- > User input at line 145, trigger word "form[":
- from_email = request.form['sender'].lower()
-File: BookQueue/app.py
- > reaches line 146, trigger word "filter(":
- query = User.query.filter(User.email == from_email)
-
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-20 08:28:30.381453
-No vulnerabilities found.
-
-
-maxcnunes/flaskgaedemo
-https://github.com/maxcnunes/flaskgaedemo
-Entry file: flaskgaedemo/main.py
-Scanned: 2016-10-20 08:28:31.442540
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-domenicosolazzo/flask_examples
-https://github.com/domenicosolazzo/flask_examples
-Entry file: flask_examples/logger_example.py
-Scanned: 2016-10-20 08:28:33.078443
-No vulnerabilities found.
-
-
-akostyuk/flask-dbmigrate
-https://github.com/akostyuk/flask-dbmigrate
-Entry file: flask-dbmigrate/tests.py
-Scanned: 2016-10-20 08:28:33.591971
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-50onRed/phillypug-flask
-https://github.com/50onRed/phillypug-flask
-Entry file: phillypug-flask/phillypug/app.py
-Scanned: 2016-10-20 08:28:34.950694
-Vulnerability 1:
-File: phillypug-flask/phillypug/views.py
- > User input at line 19, trigger word "get(":
- repos = redis_client.get(repos_key)
-Reassigned in:
- File: phillypug-flask/phillypug/views.py
- > Line 21: repos = json.loads(repos)
-File: phillypug-flask/phillypug/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',repos=repos)
-
-
-
-booo/flask-gtfs
-https://github.com/booo/flask-gtfs
-Entry file: None
-Scanned: 2016-10-20 08:28:35.468180
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 08:28:35.963498
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nerevu/prometheus
-https://github.com/nerevu/prometheus
-Entry file: prometheus/app/__init__.py
-Scanned: 2016-10-20 08:28:36.477247
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottdnz/flask_skeleton
-https://github.com/scottdnz/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 08:28:36.981272
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-pavlenko-volodymyr/flask-study
-https://github.com/pavlenko-volodymyr/flask-study
-Entry file: flask-study/hello.py
-Scanned: 2016-10-20 08:28:37.510487
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-slizadel/flask-gitrcv
-https://github.com/slizadel/flask-gitrcv
-Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py
-Scanned: 2016-10-20 08:28:38.760043
-No vulnerabilities found.
-
-
-apjd/flask-heroku
-https://github.com/apjd/flask-heroku
-Entry file: flask-heroku/flasky.py
-Scanned: 2016-10-20 08:28:40.030416
-No vulnerabilities found.
-
-
-scardine/flask-locale
-https://github.com/scardine/flask-locale
-Entry file: flask-locale/tests/__init__.py
-Scanned: 2016-10-20 08:28:41.353299
-No vulnerabilities found.
-
-
-JunilJacob/Paint-app-using-Flask
-https://github.com/JunilJacob/Paint-app-using-Flask
-Entry file: Paint-app-using-Flask/hello.py
-Scanned: 2016-10-20 08:29:13.177705
-Vulnerability 1:
-File: Paint-app-using-Flask/hello.py
- > User input at line 12, trigger word "form[":
- name = request.form['pname']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 16: iname = (name)
-File: Paint-app-using-Flask/hello.py
- > reaches line 18, trigger word "execute(":
- c.execute('DELETE FROM Image WHERE file=?', iname)
-
-Vulnerability 2:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 19, trigger word "execute(":
- c.execute('INSERT INTO Image VALUES (?,?)', image)
-
-Vulnerability 3:
-File: Paint-app-using-Flask/hello.py
- > User input at line 12, trigger word "form[":
- name = request.form['pname']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 16: iname = (name)
-File: Paint-app-using-Flask/hello.py
- > reaches line 19, trigger word "execute(":
- c.execute('INSERT INTO Image VALUES (?,?)', image)
-
-Vulnerability 4:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 34, trigger word "execute(":
- for row in c.execute('SELECT * FROM Image WHERE file=?', filename):
-
-Vulnerability 5:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 36, trigger word "render_template(":
- resp = Response('' + render_template('paint.html'),status=200, mimetype='html')
-
-
-
-dimfox/flask-mega-tutorial
-https://github.com/dimfox/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 08:29:13.693957
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-callahad/temp-flask-persona-demo
-https://github.com/callahad/temp-flask-persona-demo
-Entry file: temp-flask-persona-demo/example.py
-Scanned: 2016-10-20 08:29:17.679223
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshsee/GAE-flask-cms
-https://github.com/joshsee/GAE-flask-cms
-Entry file: GAE-flask-cms/flask/sessions.py
-Scanned: 2016-10-20 08:29:19.204669
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshkurz/exi
-https://github.com/joshkurz/exi
-Entry file: exi/exi/tests/security/test_app/__init__.py
-Scanned: 2016-10-20 08:29:20.885836
-No vulnerabilities found.
-
-
-booo/baedproject
-https://github.com/booo/baedproject
-Entry file: baedproject/app.py
-Scanned: 2016-10-20 08:29:22.107180
-No vulnerabilities found.
-
-
-kalimatas/herokuflask
-https://github.com/kalimatas/herokuflask
-Entry file: herokuflask/app.py
-Scanned: 2016-10-20 08:29:23.315458
-No vulnerabilities found.
-
-
-norbert/helloflask
-https://github.com/norbert/helloflask
-Entry file: helloflask/hello.py
-Scanned: 2016-10-20 08:29:23.851395
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py
-
-perjo927/Portfolio
-https://github.com/perjo927/Portfolio
-Entry file: Portfolio/server.py
-Scanned: 2016-10-20 08:29:26.587197
-Vulnerability 1:
-File: Portfolio/server.py
- > User input at line 96, trigger word "form[":
- search_string = request.form['key']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 2:
-File: Portfolio/server.py
- > User input at line 99, trigger word "form[":
- sort_order = request.form['sort_order']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 3:
-File: Portfolio/server.py
- > User input at line 100, trigger word "form[":
- sort_by = request.form['sort_by']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-
-
-Pusungwi/lobotomizer
-https://github.com/Pusungwi/lobotomizer
-Entry file: None
-Scanned: 2016-10-20 08:29:27.136162
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer.
-
-ahawker/jpool
-https://github.com/ahawker/jpool
-Entry file: None
-Scanned: 2016-10-20 08:29:27.627894
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool.
-
-takosuke/pizzasuicideclub
-https://github.com/takosuke/pizzasuicideclub
-Entry file: pizzasuicideclub/psc_app/__init__.py
-Scanned: 2016-10-20 08:29:33.690341
-Vulnerability 1:
-File: pizzasuicideclub/psc_app/filters.py
- > User input at line 15, trigger word "Markup(":
- result = Markup(result)
-Reassigned in:
- File: pizzasuicideclub/psc_app/filters.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = result
-File: pizzasuicideclub/psc_app/filters.py
- > reaches line 12, trigger word "replace(":
- result = '
-
-'.join(('
%s
' % p.replace('
-', '
-') for p in _paragraph_re.split(escape(value))))
-This vulnerability is potentially sanitised by: ['escape']
-
-Vulnerability 2:
-File: pizzasuicideclub/psc_app/pages/views.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(postId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/pages/views.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('404.html',user=user)
-File: pizzasuicideclub/psc_app/pages/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pages/permalink.html',title=post.title, post=post, user=user)
-
-Vulnerability 3:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 31, trigger word "get(":
- profile = User.query.get(userId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('pages.userlist'))
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users/profile.html',profile=profile, user=user, form=form)
-
-Vulnerability 4:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 54, trigger word "flash(":
- flash('You are logged in %s' % user.username)
-
-Vulnerability 5:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 55, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 6:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 55, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 7:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 79, trigger word ".data":
- file = form.image.data
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 80: profile_pic = utilities.file_save(file, 'profilepics')
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 8:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 81, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 9:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 79, trigger word ".data":
- file = form.image.data
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 80: profile_pic = utilities.file_save(file, 'profilepics')
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 10:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 81, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 11:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 140, trigger word "get(":
- user = User.query.get(userId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 134: user = g.user
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=userId))
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 145, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users/modify_password.html',form=form, user=user)
-
-
-
-neilduncan/FlickrPlaceholders
-https://github.com/neilduncan/FlickrPlaceholders
-Entry file: FlickrPlaceholders/main.py
-Scanned: 2016-10-20 08:29:34.950411
-No vulnerabilities found.
-
-
-amaterasu-/placeholder
-https://github.com/amaterasu-/placeholder
-Entry file: placeholder/image.py
-Scanned: 2016-10-20 08:29:36.184828
-No vulnerabilities found.
-
-
-koon-kai/kiblog
-https://github.com/koon-kai/kiblog
-Entry file: kiblog/app.py
-Scanned: 2016-10-20 08:29:37.405804
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joelrojo/flask
-https://github.com/joelrojo/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 08:29:37.981126
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-asgoel/Merge-flask
-https://github.com/asgoel/Merge-flask
-Entry file: Merge-flask/app.py
-Scanned: 2016-10-20 08:29:38.959270
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregimba/Vodka
-https://github.com/gregimba/Vodka
-Entry file: Vodka/app.py
-Scanned: 2016-10-20 08:29:40.635859
-No vulnerabilities found.
-
-
-corydolphin/flask-olinauth
-https://github.com/corydolphin/flask-olinauth
-Entry file: flask-olinauth/example.py
-Scanned: 2016-10-20 08:29:41.874731
-No vulnerabilities found.
-
-
-danielestevez/flasktutorial
-https://github.com/danielestevez/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 08:29:43.343534
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pityonline/flaskr
-https://github.com/pityonline/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:29:43.839798
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Studentapp-Flask
-https://github.com/prabeesh/Studentapp-Flask
-Entry file: Studentapp-Flask/test.py
-Scanned: 2016-10-20 08:29:44.818815
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dproni/flask_test
-https://github.com/dproni/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 08:30:12.902664
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scardine/flask-locale
-https://github.com/scardine/flask-locale
-Entry file: flask-locale/tests/__init__.py
-Scanned: 2016-10-20 08:30:14.331538
-No vulnerabilities found.
-
-
-callahad/temp-flask-persona-demo
-https://github.com/callahad/temp-flask-persona-demo
-Entry file: temp-flask-persona-demo/example.py
-Scanned: 2016-10-20 08:30:14.831763
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kishorekdty/paint_using_flask
-https://github.com/kishorekdty/paint_using_flask
-Entry file: None
-Scanned: 2016-10-20 08:30:15.324795
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask.
-
-joshsee/GAE-flask-cms
-https://github.com/joshsee/GAE-flask-cms
-Entry file: GAE-flask-cms/flask/sessions.py
-Scanned: 2016-10-20 08:30:17.847002
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rasheedh/Heroku-Paint-Using-Flask
-https://github.com/rasheedh/Heroku-Paint-Using-Flask
-Entry file: None
-Scanned: 2016-10-20 08:30:19.346813
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask.
-
-sreekanthkaralmanna/heroku-paint-app-using-flask
-https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask
-Entry file: None
-Scanned: 2016-10-20 08:30:19.850489
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask.
-
-mikewallace1979/milk
-https://github.com/mikewallace1979/milk
-Entry file: milk/milk.py
-Scanned: 2016-10-20 08:30:23.211434
-No vulnerabilities found.
-
-
-goonpug/goonpug-stats
-https://github.com/goonpug/goonpug-stats
-Entry file: goonpug-stats/goonpug/__init__.py
-Scanned: 2016-10-20 08:30:24.936581
-No vulnerabilities found.
-
-
-clly/blog.md
-https://github.com/clly/blog.md
-Entry file: blog/flaskr.py
-Scanned: 2016-10-20 08:30:25.432035
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-simplyluke/dothis
-https://github.com/simplyluke/dothis
-Entry file: dothis/dothis.py
-Scanned: 2016-10-20 08:30:26.681107
-No vulnerabilities found.
-
-
-oberkowitz/improv
-https://github.com/oberkowitz/improv
-Entry file: improv/mytest/app.py
-Scanned: 2016-10-20 08:30:27.272117
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: improv/mytest/venv/lib/python2.7/genericpath.py
-
-mikeboers/Flask-Images
-https://github.com/mikeboers/Flask-Images
-Entry file: Flask-Images/tests/__init__.py
-Scanned: 2016-10-20 08:30:29.702913
-No vulnerabilities found.
-
-
-berlotto/flask-app-template
-https://github.com/berlotto/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-20 08:30:35.695807
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-corydolphin/flask-jsonpify
-https://github.com/corydolphin/flask-jsonpify
-Entry file: flask-jsonpify/test.py
-Scanned: 2016-10-20 08:30:38.084229
-No vulnerabilities found.
-
-
-eadmundo/flask-static-blog
-https://github.com/eadmundo/flask-static-blog
-Entry file: flask-static-blog/app/__init__.py
-Scanned: 2016-10-20 08:30:39.907747
-Vulnerability 1:
-File: flask-static-blog/app/blueprints/blog/views.py
- > User input at line 17, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 30: pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10))
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0])
-File: flask-static-blog/app/blueprints/blog/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args)
-
-Vulnerability 2:
-File: flask-static-blog/app/blueprints/blog/views.py
- > User input at line 30, trigger word "get(":
- pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10))
-Reassigned in:
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0])
-File: flask-static-blog/app/blueprints/blog/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args)
-
-
-
-0atman/flask-basic
-https://github.com/0atman/flask-basic
-Entry file: flask-basic/flask-basic.py
-Scanned: 2016-10-20 08:30:41.633652
-No vulnerabilities found.
-
-
-clmns/flasktest
-https://github.com/clmns/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 08:30:42.639265
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zfdang/memcached-in-openshift
-https://github.com/zfdang/memcached-in-openshift
-Entry file: memcached-in-openshift/wsgi/main.py
-Scanned: 2016-10-20 08:30:43.147278
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-garethpaul/flask-sample
-https://github.com/garethpaul/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 08:30:43.654669
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-naveenpremchand02/flask_url
-https://github.com/naveenpremchand02/flask_url
-Entry file: flask_url/url.py
-Scanned: 2016-10-20 08:30:45.129496
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cpdean/flask-oauth-tutorial
-https://github.com/cpdean/flask-oauth-tutorial
-Entry file: flask-oauth-tutorial/flaskr.py
-Scanned: 2016-10-20 08:30:46.368707
-No vulnerabilities found.
-
-
-xiechao06/Flask-NavBar
-https://github.com/xiechao06/Flask-NavBar
-Entry file: Flask-NavBar/flask_nav_bar.py
-Scanned: 2016-10-20 08:30:46.917745
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nsfyn55/flask-mega-tutorial
-https://github.com/nsfyn55/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 08:31:13.435892
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kshitizrimal/flaskr-modified
-https://github.com/kshitizrimal/flaskr-modified
-Entry file: flaskr-modified/flaskr.py
-Scanned: 2016-10-20 08:31:14.002040
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prasanthkumara/Heroku-Paint-App-Using--Flask
-https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask
-Entry file: None
-Scanned: 2016-10-20 08:31:15.971191
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask.
-
-pyxze/PyxzeCorpus
-https://github.com/pyxze/PyxzeCorpus
-Entry file: PyxzeCorpus/corpus.py
-Scanned: 2016-10-20 08:31:19.216973
-No vulnerabilities found.
-
-
-crcsmnky/thehotspot
-https://github.com/crcsmnky/thehotspot
-Entry file: thehotspot/v2/app.py
-Scanned: 2016-10-20 08:31:20.770633
-Vulnerability 1:
-File: thehotspot/v2/app.py
- > User input at line 54, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('places.html',places=places, count=count, skip=checkins_skip)
-
-Vulnerability 2:
-File: thehotspot/v2/app.py
- > User input at line 64, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users.html',users=users, count=count, skip=checkins_skip)
-
-Vulnerability 3:
-File: thehotspot/v2/app.py
- > User input at line 73, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 82, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('checkins.html',checkins=checkins, users=users, places=places, skip=checkins_skip, count=count)
-
-Vulnerability 4:
-File: thehotspot/v2/app.py
- > User input at line 103, trigger word "get(":
- cats_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('categories.html',categories=categories, count=count, skip=cats_skip)
-
-Vulnerability 5:
-File: thehotspot/v2/app.py
- > User input at line 114, trigger word "get(":
- places_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 118, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=cat, places=places, mapped=places.clone(), count=cat['count'], skip=places_skip)
-
-
-
-etscrivner/sovereign-states
-https://github.com/etscrivner/sovereign-states
-Entry file: sovereign-states/sovereign_states/api.py
-Scanned: 2016-10-20 08:31:22.110989
-No vulnerabilities found.
-
-
-croach/cheap-and-scalable-webistes-with-flask-code
-https://github.com/croach/cheap-and-scalable-webistes-with-flask-code
-Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py
-Scanned: 2016-10-20 08:31:23.427324
-No vulnerabilities found.
-
-
-sreedathns/paint-app-using-heroku-and-flask
-https://github.com/sreedathns/paint-app-using-heroku-and-flask
-Entry file: None
-Scanned: 2016-10-20 08:31:23.931047
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask.
-
-nesv/cask
-https://github.com/nesv/cask
-Entry file: None
-Scanned: 2016-10-20 08:31:26.431988
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask.
-
-chadgh/chessy
-https://github.com/chadgh/chessy
-Entry file: None
-Scanned: 2016-10-20 08:31:26.934297
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wowo/pithermo
-https://github.com/wowo/pithermo
-Entry file: pithermo/pithermo.py
-Scanned: 2016-10-20 08:31:27.897604
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aranasaurus/android-demo-server
-https://github.com/aranasaurus/android-demo-server
-Entry file: android-demo-server/app.py
-Scanned: 2016-10-20 08:31:30.325568
-Vulnerability 1:
-File: android-demo-server/app.py
- > User input at line 21, trigger word "get(":
- r = requests.get(url.format(query))
-Reassigned in:
- File: android-demo-server/app.py
- > Line 22: images = [(i, json.dumps(i)) for i in json.loads(r.text)['responseData']['results']]
-File: android-demo-server/app.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',images=images)
-
-
-
-mjhea0/flask-intro
-https://github.com/mjhea0/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 08:31:36.742021
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-deepgully/me
-https://github.com/deepgully/me
-Entry file: me/settings.py
-Scanned: 2016-10-20 08:31:37.325218
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mickey06/Flask-principal-example
-https://github.com/mickey06/Flask-principal-example
-Entry file: Flask-principal-example/FPrincipals.py
-Scanned: 2016-10-20 08:31:39.836691
-No vulnerabilities found.
-
-
-crazygit/flask
-https://github.com/crazygit/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 08:31:40.450727
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wingu/flask_filters
-https://github.com/wingu/flask_filters
-Entry file: flask_filters/test_flask_filters.py
-Scanned: 2016-10-20 08:31:41.828215
-No vulnerabilities found.
-
-
-BuongiornoMIP/Reding
-https://github.com/BuongiornoMIP/Reding
-Entry file: Reding/reding/app.py
-Scanned: 2016-10-20 08:31:44.159601
-No vulnerabilities found.
-
-
-mphuie/flask_base
-https://github.com/mphuie/flask_base
-Entry file: flask_base/myapp/__init__.py
-Scanned: 2016-10-20 08:31:45.978108
-No vulnerabilities found.
-
-
-colwilson/flask-lazyapi
-https://github.com/colwilson/flask-lazyapi
-Entry file: flask-lazyapi/demo_server.py
-Scanned: 2016-10-20 08:31:46.496254
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiechao06/Flask-DataBrowser
-https://github.com/xiechao06/Flask-DataBrowser
-Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py
-Scanned: 2016-10-20 08:31:47.025495
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knowshan/flaskey
-https://github.com/knowshan/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-20 08:31:48.521348
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Masagin/FlaskCelery
-https://github.com/Masagin/FlaskCelery
-Entry file: FlaskCelery/flask.py
-Scanned: 2016-10-20 08:31:49.025942
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-denz/flask_introspect
-https://github.com/denz/flask_introspect
-Entry file: flask_introspect/test/test_blueprint.py
-Scanned: 2016-10-20 08:32:14.973962
-No vulnerabilities found.
-
-
-EvilDmitri/flask-mikroblog
-https://github.com/EvilDmitri/flask-mikroblog
-Entry file: flask-mikroblog/app/__init__.py
-Scanned: 2016-10-20 08:32:16.313061
-No vulnerabilities found.
-
-
-maxcnunes/flask_bravi
-https://github.com/maxcnunes/flask_bravi
-Entry file: flask_bravi/braviapp/__init__.py
-Scanned: 2016-10-20 08:32:17.762431
-No vulnerabilities found.
-
-
-zhemao/flask_demo
-https://github.com/zhemao/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 08:32:18.738841
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SalemHarrache-Archive/flask_chat_eventsource
-https://github.com/SalemHarrache-Archive/flask_chat_eventsource
-Entry file: flask_chat_eventsource/server.py
-Scanned: 2016-10-20 08:32:20.232309
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ryanolson/flask-couchdb-schematics
-https://github.com/ryanolson/flask-couchdb-schematics
-Entry file: flask-couchdb-schematics/example/guestbook.py
-Scanned: 2016-10-20 08:32:22.706877
-Vulnerability 1:
-File: flask-couchdb-schematics/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-schematics/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-pouyan-ghasemi/flask-sql-cms
-https://github.com/pouyan-ghasemi/flask-sql-cms
-Entry file: flask-sql-cms/app.py
-Scanned: 2016-10-20 08:32:23.238477
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-texuf/myflaskproject
-https://github.com/texuf/myflaskproject
-Entry file: myflaskproject/hello.py
-Scanned: 2016-10-20 08:32:25.463433
-No vulnerabilities found.
-
-
-csesoc/bark-core
-https://github.com/csesoc/bark-core
-Entry file: bark-core/bark/__init__.py
-Scanned: 2016-10-20 08:32:27.478583
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-croach/cheap-and-scalable-webistes-with-flask-code
-https://github.com/croach/cheap-and-scalable-webistes-with-flask-code
-Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py
-Scanned: 2016-10-20 08:32:28.835400
-No vulnerabilities found.
-
-
-nesv/cask
-https://github.com/nesv/cask
-Entry file: None
-Scanned: 2016-10-20 08:32:29.326263
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask.
-
-lee212/fg-ws
-https://github.com/lee212/fg-ws
-Entry file: fg-ws/fgws/ws/FGWSApps.py
-Scanned: 2016-10-20 08:32:29.842297
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brunsgaard/qwablog
-https://github.com/brunsgaard/qwablog
-Entry file: qwablog/qwablog.py
-Scanned: 2016-10-20 08:32:36.114588
-No vulnerabilities found.
-
-
-nutrislice/mandrill-webhook-redirector
-https://github.com/nutrislice/mandrill-webhook-redirector
-Entry file: mandrill-webhook-redirector/webhook-router.py
-Scanned: 2016-10-20 08:32:38.465847
-Vulnerability 1:
-File: mandrill-webhook-redirector/webhook-router.py
- > User input at line 13, trigger word "form[":
- mandrill_event = json.loads(request.form['mandrill_events'])
-Reassigned in:
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 14: metadata = mandrill_event[0]['msg']['metadata']
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 15: domain = metadata['domain']
-File: mandrill-webhook-redirector/webhook-router.py
- > reaches line 16, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/')
-
-
-
-rubinovitz/fourequality
-https://github.com/rubinovitz/fourequality
-Entry file: fourequality/app.py
-Scanned: 2016-10-20 08:32:40.963293
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-darylchang/Hacker-Viz
-https://github.com/darylchang/Hacker-Viz
-Entry file: Hacker-Viz/flaskDir.py
-Scanned: 2016-10-20 08:32:41.484879
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexlod/movielist
-https://github.com/alexlod/movielist
-Entry file: movielist/movielist.py
-Scanned: 2016-10-20 08:32:42.993093
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dhumbert/literable
-https://github.com/dhumbert/literable
-Entry file: None
-Scanned: 2016-10-20 08:32:43.518401
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhumbert/literable.
-
-ArcTanSusan/Task_List
-https://github.com/ArcTanSusan/Task_List
-Entry file: Task_List/tipsy/tipsy.py
-Scanned: 2016-10-20 08:32:45.025600
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rbuysse/url_shortener
-https://github.com/rbuysse/url_shortener
-Entry file: url_shortener/url.py
-Scanned: 2016-10-20 08:32:46.546443
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mjhea0/flask-intro
-https://github.com/mjhea0/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 08:32:47.708920
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-seanrose/box-arcade
-https://github.com/seanrose/box-arcade
-Entry file: box-arcade/app/__init__.py
-Scanned: 2016-10-20 08:32:48.692860
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-techniq/flask-wdb
-https://github.com/techniq/flask-wdb
-Entry file: flask-wdb/example.py
-Scanned: 2016-10-20 08:32:49.930092
-No vulnerabilities found.
-
-
-mphuie/flask_base
-https://github.com/mphuie/flask_base
-Entry file: flask_base/myapp/__init__.py
-Scanned: 2016-10-20 08:32:52.314153
-No vulnerabilities found.
-
-
-theho/flask-wsgi
-https://github.com/theho/flask-wsgi
-Entry file: flask-wsgi/wsgi.py
-Scanned: 2016-10-20 08:33:17.060308
-No vulnerabilities found.
-
-
-adityaathalye/flaskr
-https://github.com/adityaathalye/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:33:17.562104
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knowshan/flaskey
-https://github.com/knowshan/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-20 08:33:19.060440
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyr/flaskapp
-https://github.com/andyr/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:33:19.572848
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp.
-
-denz/flask_introspect
-https://github.com/denz/flask_introspect
-Entry file: flask_introspect/test/test_blueprint.py
-Scanned: 2016-10-20 08:33:21.948100
-No vulnerabilities found.
-
-
-ekfriis/flask-mbtiles
-https://github.com/ekfriis/flask-mbtiles
-Entry file: flask-mbtiles/mbtileserver.py
-Scanned: 2016-10-20 08:33:23.218498
-No vulnerabilities found.
-
-
-hyaticua/flask-blog
-https://github.com/hyaticua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 08:33:23.842718
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-thearchduke/flask-boiler
-https://github.com/thearchduke/flask-boiler
-Entry file: None
-Scanned: 2016-10-20 08:33:25.367778
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-StefanKjartansson/bower-flask
-https://github.com/StefanKjartansson/bower-flask
-Entry file: bower-flask/server.py
-Scanned: 2016-10-20 08:33:28.604043
-No vulnerabilities found.
-
-
-tanayseven/Voix
-https://github.com/tanayseven/Voix
-Entry file: None
-Scanned: 2016-10-20 08:33:29.124726
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gatesphere/flaskr-flask-tutorial
-https://github.com/gatesphere/flaskr-flask-tutorial
-Entry file: flaskr-flask-tutorial/flaskr/flaskr.py
-Scanned: 2016-10-20 08:33:30.738879
-No vulnerabilities found.
-
-
-bazerk/baz-flask-base
-https://github.com/bazerk/baz-flask-base
-Entry file: baz-flask-base/app/app.py
-Scanned: 2016-10-20 08:33:32.673810
-Vulnerability 1:
-File: baz-flask-base/app/frontend/views.py
- > User input at line 26, trigger word "get(":
- form = RegisterForm(username=request.args.get('username', twitter_name), password=request.args.get('password', None))
-Reassigned in:
- File: baz-flask-base/app/frontend/views.py
- > Line 30: err = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets)
- File: baz-flask-base/app/frontend/views.py
- > Line 30: user = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets)
- File: baz-flask-base/app/frontend/views.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('frontend.login'))
-File: baz-flask-base/app/frontend/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('frontend/register.html',form=form, twitter_name=twitter_name)
-
-Vulnerability 2:
-File: baz-flask-base/app/frontend/views.py
- > User input at line 48, trigger word "get(":
- form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None))
-Reassigned in:
- File: baz-flask-base/app/frontend/views.py
- > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash)
- File: baz-flask-base/app/frontend/views.py
- > Line 57: session['user_id'] = user.id
- File: baz-flask-base/app/frontend/views.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = redirect('')
-File: baz-flask-base/app/frontend/views.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form)
-
-
-
-ryanolson/flask-couchdb-schematics
-https://github.com/ryanolson/flask-couchdb-schematics
-Entry file: flask-couchdb-schematics/example/guestbook.py
-Scanned: 2016-10-20 08:33:34.148424
-Vulnerability 1:
-File: flask-couchdb-schematics/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-schematics/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-pouyan-ghasemi/flask-sql-cms
-https://github.com/pouyan-ghasemi/flask-sql-cms
-Entry file: flask-sql-cms/app.py
-Scanned: 2016-10-20 08:33:35.662927
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Andrey-Khobnya/flask-sessions-mongo
-https://github.com/Andrey-Khobnya/flask-sessions-mongo
-Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py
-Scanned: 2016-10-20 08:33:38.930583
-No vulnerabilities found.
-
-
-igrishaev/youtube-python-api-sample
-https://github.com/igrishaev/youtube-python-api-sample
-Entry file: youtube-python-api-sample/app.py
-Scanned: 2016-10-20 08:33:39.994550
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nutrislice/mandrill-webhook-redirector
-https://github.com/nutrislice/mandrill-webhook-redirector
-Entry file: mandrill-webhook-redirector/webhook-router.py
-Scanned: 2016-10-20 08:33:42.317885
-Vulnerability 1:
-File: mandrill-webhook-redirector/webhook-router.py
- > User input at line 13, trigger word "form[":
- mandrill_event = json.loads(request.form['mandrill_events'])
-Reassigned in:
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 14: metadata = mandrill_event[0]['msg']['metadata']
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 15: domain = metadata['domain']
-File: mandrill-webhook-redirector/webhook-router.py
- > reaches line 16, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/')
-
-
-
-kfr2/pynances
-https://github.com/kfr2/pynances
-Entry file: pynances/pynances/pynances.py
-Scanned: 2016-10-20 08:33:43.659230
-No vulnerabilities found.
-
-
-WilliamMayor/geoffrey
-https://github.com/WilliamMayor/geoffrey
-Entry file: geoffrey/geoffrey.py
-Scanned: 2016-10-20 08:33:44.896867
-No vulnerabilities found.
-
-
-Timothee/Passerelle
-https://github.com/Timothee/Passerelle
-Entry file: Passerelle/passerelle.py
-Scanned: 2016-10-20 08:33:46.159828
-No vulnerabilities found.
-
-
-fusic-com/flask-todo
-https://github.com/fusic-com/flask-todo
-Entry file: flask-todo/backend/app.py
-Scanned: 2016-10-20 08:33:47.555795
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bkabrda/flask-whooshee
-https://github.com/bkabrda/flask-whooshee
-Entry file: flask-whooshee/test.py
-Scanned: 2016-10-20 08:33:49.156897
-No vulnerabilities found.
-
-
-DavidWittman/csrgenerator.com
-https://github.com/DavidWittman/csrgenerator.com
-Entry file: None
-Scanned: 2016-10-20 08:33:50.136787
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-techniq/flask-wdb
-https://github.com/techniq/flask-wdb
-Entry file: flask-wdb/example.py
-Scanned: 2016-10-20 08:33:51.471794
-No vulnerabilities found.
-
-
-1000ch/flask-handson
-https://github.com/1000ch/flask-handson
-Entry file: flask-handson/flaskr/__init__.py
-Scanned: 2016-10-20 08:33:52.007182
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ajuna/car-registration
-https://github.com/ajuna/car-registration
-Entry file: None
-Scanned: 2016-10-20 08:33:52.508448
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration.
-
-jishnujagajeeve/Flaskr
-https://github.com/jishnujagajeeve/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 08:34:15.045759
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Basher51/Flaskr
-https://github.com/Basher51/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 08:34:16.542711
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyr/flaskapp
-https://github.com/andyr/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:34:18.044340
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp.
-
-sagnew/Prank-Roulette
-https://github.com/sagnew/Prank-Roulette
-Entry file: Prank-Roulette/app.py
-Scanned: 2016-10-20 08:34:19.560275
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kaste/FlaskDeferredHandler
-https://github.com/kaste/FlaskDeferredHandler
-Entry file: FlaskDeferredHandler/flask_handler_test.py
-Scanned: 2016-10-20 08:34:20.827930
-No vulnerabilities found.
-
-
-adityaathalye/flaskr2
-https://github.com/adityaathalye/flaskr2
-Entry file: flaskr2/app.py
-Scanned: 2016-10-20 08:34:22.068069
-No vulnerabilities found.
-
-
-ConceptPending/flaskTemplate
-https://github.com/ConceptPending/flaskTemplate
-Entry file: flaskTemplate/server.py
-Scanned: 2016-10-20 08:34:24.070642
-No vulnerabilities found.
-
-
-AlexMost/Flask-starter
-https://github.com/AlexMost/Flask-starter
-Entry file: Flask-starter/app.py
-Scanned: 2016-10-20 08:34:25.340728
-No vulnerabilities found.
-
-
-samgclarke/flask-microblog
-https://github.com/samgclarke/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 08:34:25.840825
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jonomillin/learning-flask
-https://github.com/jonomillin/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 08:34:28.399735
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-berlotto/hero-flask
-https://github.com/berlotto/hero-flask
-Entry file: hero-flask/hero/__init__.py
-Scanned: 2016-10-20 08:34:31.024300
-No vulnerabilities found.
-
-
-nthfloor/Flask_learn
-https://github.com/nthfloor/Flask_learn
-Entry file: Flask_learn/login_system/flskr.py
-Scanned: 2016-10-20 08:34:35.044846
-Vulnerability 1:
-File: Flask_learn/login_system/flskr.py
- > User input at line 116, trigger word "get(":
- username = request.form.get('username')
-File: Flask_learn/login_system/flskr.py
- > reaches line 119, trigger word "filter(":
- user = User.query.filter(User.name == username and User.password == password).first()
-
-Vulnerability 2:
-File: Flask_learn/login_system/flskr.py
- > User input at line 117, trigger word "get(":
- password = request.form.get('password')
-File: Flask_learn/login_system/flskr.py
- > reaches line 119, trigger word "filter(":
- user = User.query.filter(User.name == username and User.password == password).first()
-
-
-
-mmcgahan/flask-labs-bb
-https://github.com/mmcgahan/flask-labs-bb
-Entry file: flask-labs-bb/flask_labs/__init__.py
-Scanned: 2016-10-20 08:34:37.124124
-Vulnerability 1:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 29, trigger word "filter(":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-
-Vulnerability 2:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 29, trigger word ".data":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 29, trigger word "filter(":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-
-Vulnerability 3:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index'))
-
-Vulnerability 4:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 36, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index'))
-
-Vulnerability 5:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',login_form=login_form)
-
-
-
-daisuzu/flask-app-sample
-https://github.com/daisuzu/flask-app-sample
-Entry file: flask-app-sample/db.py
-Scanned: 2016-10-20 08:34:38.388078
-No vulnerabilities found.
-
-
-penpyt/flask-couchdb-auth
-https://github.com/penpyt/flask-couchdb-auth
-Entry file: flask-couchdb-auth/example/guestbook.py
-Scanned: 2016-10-20 08:34:39.725213
-Vulnerability 1:
-File: flask-couchdb-auth/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-auth/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-rodreegez/flask-twitter-auth
-https://github.com/rodreegez/flask-twitter-auth
-Entry file: None
-Scanned: 2016-10-20 08:34:40.249067
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth.
-
-DamnedFacts/flask-hello-world
-https://github.com/DamnedFacts/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 08:34:40.796581
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ariamoraine/kitten-generator
-https://github.com/ariamoraine/kitten-generator
-Entry file: kitten-generator/flaskhello.py
-Scanned: 2016-10-20 08:34:42.473482
-No vulnerabilities found.
-
-
-honestappalachia/honest_site
-https://github.com/honestappalachia/honest_site
-Entry file: honest_site/run.py
-Scanned: 2016-10-20 08:34:43.812614
-Vulnerability 1:
-File: honest_site/run.py
- > User input at line 36, trigger word "get(":
- template = page.meta.get('template', 'default.html')
-File: honest_site/run.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,page=page)
-
-
-
-daikeshi/one-dollar-metasearch-engine
-https://github.com/daikeshi/one-dollar-metasearch-engine
-Entry file: one-dollar-metasearch-engine/app/__init__.py
-Scanned: 2016-10-20 08:34:44.314769
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-msalahi/art-party
-https://github.com/msalahi/art-party
-Entry file: art-party/app.py
-Scanned: 2016-10-20 08:34:54.027236
-No vulnerabilities found.
-
-
-honestappalachia/honest_hiddenservice
-https://github.com/honestappalachia/honest_hiddenservice
-Entry file: honest_hiddenservice/run.py
-Scanned: 2016-10-20 08:34:54.542168
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-saltire/artpubpy
-https://github.com/saltire/artpubpy
-Entry file: artpubpy/artpubpy.py
-Scanned: 2016-10-20 08:34:55.069042
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mcniac/simple-blog
-https://github.com/mcniac/simple-blog
-Entry file: simple-blog/tumblelog/__init__.py
-Scanned: 2016-10-20 08:35:00.983920
-No vulnerabilities found.
-
-
-ryanrdetzel/blimp-commit
-https://github.com/ryanrdetzel/blimp-commit
-Entry file: blimp-commit/blimp_commit.py
-Scanned: 2016-10-20 08:35:02.293795
-No vulnerabilities found.
-
-
-fusic-com/flask-webcache
-https://github.com/fusic-com/flask-webcache
-Entry file: flask-webcache/contrib/sleepycalc/app.py
-Scanned: 2016-10-20 08:35:08.594266
-No vulnerabilities found.
-
-
-rehandalal/flask-mobility
-https://github.com/rehandalal/flask-mobility
-Entry file: flask-mobility/flask_mobility/tests/test_decorators.py
-Scanned: 2016-10-20 08:35:16.971818
-Vulnerability 1:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 46, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 48, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 2:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 46, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 51, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-Vulnerability 3:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 67, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 69, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 4:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 67, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 72, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-Vulnerability 5:
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > User input at line 33, trigger word "get(":
- MOBILE_COOKIE = self.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > reaches line 36, trigger word "set_cookie(":
- self.app.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 6:
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > User input at line 33, trigger word "get(":
- MOBILE_COOKIE = self.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > reaches line 40, trigger word "set_cookie(":
- self.app.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-
-
-kelp404/Flask-GAE
-https://github.com/kelp404/Flask-GAE
-Entry file: None
-Scanned: 2016-10-20 08:35:17.476297
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jaysonsantos/jinja-assets-compressor
-https://github.com/jaysonsantos/jinja-assets-compressor
-Entry file: jinja-assets-compressor/jac/contrib/flask.py
-Scanned: 2016-10-20 08:35:20.286992
-No vulnerabilities found.
-
-
-nabetama/flaskr
-https://github.com/nabetama/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:35:21.275190
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sagnew/Prank-Roulette
-https://github.com/sagnew/Prank-Roulette
-Entry file: Prank-Roulette/app.py
-Scanned: 2016-10-20 08:35:21.776187
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jpscaletti/authcode
-https://github.com/jpscaletti/authcode
-Entry file: authcode/examples/default/app.py
-Scanned: 2016-10-20 08:35:28.018545
-No vulnerabilities found.
-
-
-samgclarke/flask-microblog
-https://github.com/samgclarke/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 08:35:28.517624
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shunyata/flask-helloworld
-https://github.com/shunyata/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-20 08:35:30.421189
-No vulnerabilities found.
-
-
-stephen-allison/basic-flask
-https://github.com/stephen-allison/basic-flask
-Entry file: None
-Scanned: 2016-10-20 08:35:30.938896
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask.
-
-bollwyvl/flask-reloaded
-https://github.com/bollwyvl/flask-reloaded
-Entry file: None
-Scanned: 2016-10-20 08:35:32.451322
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded.
-
-kitanata/flask-demo
-https://github.com/kitanata/flask-demo
-Entry file: None
-Scanned: 2016-10-20 08:35:35.983512
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo.
-
-berlotto/hero-flask
-https://github.com/berlotto/hero-flask
-Entry file: hero-flask/hero/__init__.py
-Scanned: 2016-10-20 08:35:39.258200
-No vulnerabilities found.
-
-
-flyingsparx/MongoFlask
-https://github.com/flyingsparx/MongoFlask
-Entry file: MongoFlask/application.py
-Scanned: 2016-10-20 08:35:40.577096
-Vulnerability 1:
-File: MongoFlask/application.py
- > User input at line 39, trigger word "form[":
- person = User.query.filter(User.name == request.form['username']).first()
-File: MongoFlask/application.py
- > reaches line 39, trigger word "filter(":
- person = User.query.filter(User.name == request.form['username']).first()
-
-Vulnerability 2:
-File: MongoFlask/application.py
- > User input at line 64, trigger word "form[":
- person = User.query.filter(User.name == request.form['username']).first()
-Reassigned in:
- File: MongoFlask/application.py
- > Line 67: session['id'] = person.id
-File: MongoFlask/application.py
- > reaches line 64, trigger word "filter(":
- person = User.query.filter(User.name == request.form['username']).first()
-
-
-
-DanAlbert/flask-guestbook
-https://github.com/DanAlbert/flask-guestbook
-Entry file: flask-guestbook/guestbook.py
-Scanned: 2016-10-20 08:35:41.898141
-No vulnerabilities found.
-
-
-kirkeby/empty-flask
-https://github.com/kirkeby/empty-flask
-Entry file: empty-flask/app/app.py
-Scanned: 2016-10-20 08:35:42.884859
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rehandalal/buchner
-https://github.com/rehandalal/buchner
-Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py
-Scanned: 2016-10-20 08:35:46.558238
-No vulnerabilities found.
-
-
-vitalk/flask-staticutils
-https://github.com/vitalk/flask-staticutils
-Entry file: flask-staticutils/tests/test_app/__init__.py
-Scanned: 2016-10-20 08:35:47.939310
-No vulnerabilities found.
-
-
-chiwong/flask_quickstart
-https://github.com/chiwong/flask_quickstart
-Entry file: flask_quickstart/hello.py
-Scanned: 2016-10-20 08:35:48.578620
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py
-
-archieyang/flask_app
-https://github.com/archieyang/flask_app
-Entry file: None
-Scanned: 2016-10-20 08:35:49.097427
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app.
-
-ipfans/openshift-flask-template
-https://github.com/ipfans/openshift-flask-template
-Entry file: openshift-flask-template/wsgi/mainapp.py
-Scanned: 2016-10-20 08:35:50.422537
-No vulnerabilities found.
-
-
-minhtuev/flask-google-map-example
-https://github.com/minhtuev/flask-google-map-example
-Entry file: flask-google-map-example/server.py
-Scanned: 2016-10-20 08:35:55.656122
-No vulnerabilities found.
-
-
-DamnedFacts/flask-hello-world
-https://github.com/DamnedFacts/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 08:35:56.170394
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-philangist/url-shorten
-https://github.com/philangist/url-shorten
-Entry file: url-shorten/shorten.py
-Scanned: 2016-10-20 08:35:56.674473
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fabionatali/DigiWebStats
-https://github.com/fabionatali/DigiWebStats
-Entry file: DigiWebStats/app.py
-Scanned: 2016-10-20 08:35:58.239175
-Vulnerability 1:
-File: DigiWebStats/app.py
- > User input at line 31, trigger word "get(":
- start_date = request.args.get('start_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 47, trigger word "execute(":
- data = engine.execute(query).fetchall()
-
-Vulnerability 2:
-File: DigiWebStats/app.py
- > User input at line 32, trigger word "get(":
- end_date = request.args.get('end_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 47, trigger word "execute(":
- data = engine.execute(query).fetchall()
-
-Vulnerability 3:
-File: DigiWebStats/app.py
- > User input at line 31, trigger word "get(":
- start_date = request.args.get('start_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data)
-
-Vulnerability 4:
-File: DigiWebStats/app.py
- > User input at line 32, trigger word "get(":
- end_date = request.args.get('end_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data)
-
-
-
-confessin/addressbook
-https://github.com/confessin/addressbook
-Entry file: addressbook/addressbook.py
-Scanned: 2016-10-20 08:36:02.465399
-No vulnerabilities found.
-
-
-nafur/flmpc
-https://github.com/nafur/flmpc
-Entry file: flmpc/main.py
-Scanned: 2016-10-20 08:36:03.836749
-No vulnerabilities found.
-
-
-honestappalachia/honest_hiddenservice
-https://github.com/honestappalachia/honest_hiddenservice
-Entry file: honest_hiddenservice/run.py
-Scanned: 2016-10-20 08:36:04.331522
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kvalle/greetr
-https://github.com/kvalle/greetr
-Entry file: greetr/greetr/__init__.py
-Scanned: 2016-10-20 08:36:16.733368
-No vulnerabilities found.
-
-
-dan-v/crossfitboxreview
-https://github.com/dan-v/crossfitboxreview
-Entry file: crossfitboxreview/seed_affiliates.py
-Scanned: 2016-10-20 08:36:18.450346
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mjhea0/brew
-https://github.com/mjhea0/brew
-Entry file: brew/app.py
-Scanned: 2016-10-20 08:36:24.528189
-No vulnerabilities found.
-
-
-DoctorMalboro/leandropoblet.com
-https://github.com/DoctorMalboro/leandropoblet.com
-Entry file: None
-Scanned: 2016-10-20 08:36:25.027321
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ryanrdetzel/blimp-commit
-https://github.com/ryanrdetzel/blimp-commit
-Entry file: blimp-commit/blimp_commit.py
-Scanned: 2016-10-20 08:36:26.277398
-No vulnerabilities found.
-
-
-danielholmstrom/flask-alchemyview
-https://github.com/danielholmstrom/flask-alchemyview
-Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
-Scanned: 2016-10-20 08:36:30.249395
-Vulnerability 1:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 150, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:get',id=model_id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 150, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:get',id=model_id))
-
-Vulnerability 2:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 154, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:get',id='a string'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 154, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:get',id='a string'))
-
-Vulnerability 3:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 181, trigger word "get(":
- m = self.session.query(SimpleModel).get(model_id)
-Reassigned in:
- File: flask-alchemyview/tests/test_view.py
- > Line 174: m = SimpleModel('name')
- File: flask-alchemyview/tests/test_view.py
- > Line 177: model_id = m.id
-File: flask-alchemyview/tests/test_view.py
- > reaches line 178, trigger word "url_for(":
- response = self.json_put(url_for('SimpleModelView:put',id=model_id), 'name''new name')
-
-Vulnerability 4:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 197, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:delete',id=model_id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 197, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:delete',id=model_id))
-
-Vulnerability 5:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 209, trigger word "get(":
- m = self.session.query(SimpleModel).get(model_id)
-Reassigned in:
- File: flask-alchemyview/tests/test_view.py
- > Line 202: m = SimpleModel('name')
- File: flask-alchemyview/tests/test_view.py
- > Line 205: model_id = m.id
-File: flask-alchemyview/tests/test_view.py
- > reaches line 206, trigger word "url_for(":
- response = self.json_delete(url_for('SimpleModelView:put',id=model_id))
-
-Vulnerability 6:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 236, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 236, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10))
-
-Vulnerability 7:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 246, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 246, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-
-Vulnerability 8:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 251, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id='a string'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 251, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id='a string'))
-
-Vulnerability 9:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 258, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 258, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid'))
-
-Vulnerability 10:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 266, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:index'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 266, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:index'))
-
-Vulnerability 11:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 279, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 279, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-
-Vulnerability 12:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > reaches line 56, trigger word "url_for(":
- response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False)
-
-Vulnerability 13:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > reaches line 67, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-
-Vulnerability 14:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > reaches line 56, trigger word "url_for(":
- response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False)
-
-Vulnerability 15:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > reaches line 67, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-
-
-
-vovantics/flask-bluebone
-https://github.com/vovantics/flask-bluebone
-Entry file: flask-bluebone/app/app.py
-Scanned: 2016-10-20 08:36:30.854530
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-jpscaletti/authcode
-https://github.com/jpscaletti/authcode
-Entry file: authcode/examples/default/app.py
-Scanned: 2016-10-20 08:36:40.284296
-No vulnerabilities found.
-
-
-abulte/flask-arduino-websocket-sqlite
-https://github.com/abulte/flask-arduino-websocket-sqlite
-Entry file: flask-arduino-websocket-sqlite/app.py
-Scanned: 2016-10-20 08:36:41.646582
-No vulnerabilities found.
-
-
-futuregrid/flask_cm
-https://github.com/futuregrid/flask_cm
-Entry file: flask_cm/examples/forms/app.py
-Scanned: 2016-10-20 08:36:47.301047
-Vulnerability 1:
-File: flask_cm/examples/forms/app.py
- > User input at line 24, trigger word "get(":
- comments = session.get('comments', [])
-File: flask_cm/examples/forms/app.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form)
-
-
-
-mies/flask-heroku
-https://github.com/mies/flask-heroku
-Entry file: flask-heroku/main.py
-Scanned: 2016-10-20 08:36:48.596224
-No vulnerabilities found.
-
-
-mozillazg/flask-demo
-https://github.com/mozillazg/flask-demo
-Entry file: None
-Scanned: 2016-10-20 08:36:49.122429
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo.
-
-toastercup/flask-social
-https://github.com/toastercup/flask-social
-Entry file: flask-social/app.py
-Scanned: 2016-10-20 08:36:49.627585
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoest/flask-bardienst
-https://github.com/hoest/flask-bardienst
-Entry file: flask-bardienst/bardienst/__init__.py
-Scanned: 2016-10-20 08:36:50.890242
-No vulnerabilities found.
-
-
-danillosouza/flask-boilerplate
-https://github.com/danillosouza/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 08:36:51.398960
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danillosouza/flask-boilerplate.
-
-dogrdon/flask-map
-https://github.com/dogrdon/flask-map
-Entry file: None
-Scanned: 2016-10-20 08:36:51.919498
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sapid/Flask-Community
-https://github.com/sapid/Flask-Community
-Entry file: None
-Scanned: 2016-10-20 08:36:52.431645
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community.
-
-jaseemkp/flask-students-app
-https://github.com/jaseemkp/flask-students-app
-Entry file: flask-students-app/students.py
-Scanned: 2016-10-20 08:36:56.413107
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-minhtuev/flask-google-map-example
-https://github.com/minhtuev/flask-google-map-example
-Entry file: flask-google-map-example/server.py
-Scanned: 2016-10-20 08:36:57.651777
-No vulnerabilities found.
-
-
-garbados/flask-the-gauntlet
-https://github.com/garbados/flask-the-gauntlet
-Entry file: flask-the-gauntlet/app.py
-Scanned: 2016-10-20 08:37:03.320137
-No vulnerabilities found.
-
-
-NoxDineen/microblog
-https://github.com/NoxDineen/microblog
-Entry file: None
-Scanned: 2016-10-20 08:37:03.833773
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kaibin/Condom_Data_Server
-https://github.com/Kaibin/Condom_Data_Server
-Entry file: Condom_Data_Server/app.py
-Scanned: 2016-10-20 08:37:05.358711
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lpolepeddi/intro-to-flask
-https://github.com/lpolepeddi/intro-to-flask
-Entry file: intro-to-flask/intro_to_flask/__init__.py
-Scanned: 2016-10-20 08:39:27.898151
-No vulnerabilities found.
-
-
-saltycrane/flask-jquery-ajax-example
-https://github.com/saltycrane/flask-jquery-ajax-example
-Entry file: None
-Scanned: 2016-10-20 08:39:28.400384
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example.
-
-jdiez17/flask-paypal
-https://github.com/jdiez17/flask-paypal
-Entry file: flask-paypal/app.py
-Scanned: 2016-10-20 08:39:29.673455
-Vulnerability 1:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 33, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Everything looks good!
- Click here to complete the payment.
- ' % url_for('paypal_do',token=getexp_response['TOKEN'])
-
-Vulnerability 2:
-File: flask-paypal/app.py
- > User input at line 30, trigger word "get(":
- getexp_response = interface.get_express_checkout_details(token=request.args.get('token', ''))
-File: flask-paypal/app.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = '
- Oh noes! PayPal returned an error code.
-
- %s
-
- Click here to try again.
- ' % (getexp_response['ACK'], url_for('index'))
-
-
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 08:39:31.399898
-No vulnerabilities found.
-
-
-tarbell-project/tarbell
-https://github.com/tarbell-project/tarbell
-Entry file: tarbell/tarbell/app.py
-Scanned: 2016-10-20 08:39:40.009835
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 08:39:40.507083
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-becdot/adventures-in-text
-https://github.com/becdot/adventures-in-text
-Entry file: adventures-in-text/db_methods.py
-Scanned: 2016-10-20 08:39:41.009209
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dirn/Flask-Simon
-https://github.com/dirn/Flask-Simon
-Entry file: Flask-Simon/examples/flaskr/flaskr.py
-Scanned: 2016-10-20 08:39:42.503193
-No vulnerabilities found.
-
-
-caub/flask-geo
-https://github.com/caub/flask-geo
-Entry file: flask-geo/myMap.py
-Scanned: 2016-10-20 08:39:43.016259
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-masayang/flask_dev
-https://github.com/masayang/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 08:39:43.515684
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-20 08:39:44.835817
-No vulnerabilities found.
-
-
-ffiiccuuss/torouterui
-https://github.com/ffiiccuuss/torouterui
-Entry file: torouterui/torouterui/__init__.py
-Scanned: 2016-10-20 08:39:45.337145
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marsella/andrea
-https://github.com/marsella/andrea
-Entry file: andrea/init.py
-Scanned: 2016-10-20 08:39:46.367404
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py
-
-embr/multithon
-https://github.com/embr/multithon
-Entry file: multithon/multithon.py
-Scanned: 2016-10-20 08:39:48.125448
-No vulnerabilities found.
-
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-20 08:39:48.634254
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-20 08:39:49.134194
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-20 08:39:52.390983
-No vulnerabilities found.
-
-
-MaxPresman/tempymail
-https://github.com/MaxPresman/tempymail
-Entry file: tempymail/flask_frontend.py
-Scanned: 2016-10-20 08:39:52.895976
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregorynicholas/flask-xsrf
-https://github.com/gregorynicholas/flask-xsrf
-Entry file: flask-xsrf/flask_xsrf.py
-Scanned: 2016-10-20 08:39:54.886314
-No vulnerabilities found.
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-20 08:39:56.591554
-No vulnerabilities found.
-
-
-Blender3D/Flask-LESS
-https://github.com/Blender3D/Flask-LESS
-Entry file: Flask-LESS/flask_less.py
-Scanned: 2016-10-20 08:39:58.923912
-No vulnerabilities found.
-
-
-hex/flaskr
-https://github.com/hex/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:39:59.475347
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 08:40:00.456941
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cheesysam/flaskDemo
-https://github.com/cheesysam/flaskDemo
-Entry file: flaskDemo/flaskDemo.py
-Scanned: 2016-10-20 08:40:00.940365
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-parryjacob/flask-boilerplate
-https://github.com/parryjacob/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 08:41:26.975374
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/parryjacob/flask-boilerplate.
-
-jpercent/flask-control
-https://github.com/jpercent/flask-control
-Entry file: flask-control/example.py
-Scanned: 2016-10-20 08:41:27.475999
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Ceasar/pocket_flask
-https://github.com/Ceasar/pocket_flask
-Entry file: pocket_flask/app/__init__.py
-Scanned: 2016-10-20 08:41:29.251792
-No vulnerabilities found.
-
-
-CMGS/poll
-https://github.com/CMGS/poll
-Entry file: poll/app.py
-Scanned: 2016-10-20 08:41:35.933139
-Vulnerability 1:
-File: poll/app.py
- > User input at line 31, trigger word "get(":
- q = request.args.get('q', '')
-File: poll/app.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=g.user, subjects=get_subjects(q), groups=get_groups(), group=get_group(q))
-
-Vulnerability 2:
-File: poll/app.py
- > User input at line 59, trigger word "get(":
- group = request.form.get('group')
-Reassigned in:
- File: poll/app.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups())
-File: poll/app.py
- > reaches line 64, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group))
-
-Vulnerability 3:
-File: poll/app.py
- > User input at line 59, trigger word "get(":
- group = request.form.get('group')
-Reassigned in:
- File: poll/app.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups())
-File: poll/app.py
- > reaches line 64, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group))
-
-
-
-hoh/perfume
-https://github.com/hoh/perfume
-Entry file: perfume/perfume/__init__.py
-Scanned: 2016-10-20 08:41:37.296284
-No vulnerabilities found.
-
-
-dogrdon/txtr
-https://github.com/dogrdon/txtr
-Entry file: txtr/txtr.py
-Scanned: 2016-10-20 08:41:37.810549
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattoufoutu/TrendnetStalker
-https://github.com/mattoufoutu/TrendnetStalker
-Entry file: TrendnetStalker/TrendnetStalker/__init__.py
-Scanned: 2016-10-20 08:41:38.299944
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-perjo927/Portfolio
-https://github.com/perjo927/Portfolio
-Entry file: Portfolio/server.py
-Scanned: 2016-10-20 08:41:42.486274
-Vulnerability 1:
-File: Portfolio/server.py
- > User input at line 96, trigger word "form[":
- search_string = request.form['key']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 2:
-File: Portfolio/server.py
- > User input at line 99, trigger word "form[":
- sort_order = request.form['sort_order']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 3:
-File: Portfolio/server.py
- > User input at line 100, trigger word "form[":
- sort_by = request.form['sort_by']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-
-
-cyrilaub/myMap_python
-https://github.com/cyrilaub/myMap_python
-Entry file: myMap_python/myMap.py
-Scanned: 2016-10-20 08:41:42.995675
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sburns/switchboard
-https://github.com/sburns/switchboard
-Entry file: switchboard/sample_app.py
-Scanned: 2016-10-20 08:41:43.498294
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ahawker/jpool
-https://github.com/ahawker/jpool
-Entry file: None
-Scanned: 2016-10-20 08:41:43.998601
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool.
-
-sysr-q/phi
-https://github.com/sysr-q/phi
-Entry file: phi/phi/phi.py
-Scanned: 2016-10-20 08:41:47.425334
-No vulnerabilities found.
-
-
-bogdan-kulynych/cloudlectures
-https://github.com/bogdan-kulynych/cloudlectures
-Entry file: cloudlectures/flask/sessions.py
-Scanned: 2016-10-20 08:41:47.950235
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DanielleSucher/BookQueue
-https://github.com/DanielleSucher/BookQueue
-Entry file: BookQueue/app.py
-Scanned: 2016-10-20 08:41:49.343095
-Vulnerability 1:
-File: BookQueue/app.py
- > User input at line 145, trigger word "form[":
- from_email = request.form['sender'].lower()
-File: BookQueue/app.py
- > reaches line 146, trigger word "filter(":
- query = User.query.filter(User.email == from_email)
-
-
-
-allanlei/flask-email
-https://github.com/allanlei/flask-email
-Entry file: flask-email/tests/__init__.py
-Scanned: 2016-10-20 08:41:52.321427
-No vulnerabilities found.
-
-
-maxcnunes/flaskgaedemo
-https://github.com/maxcnunes/flaskgaedemo
-Entry file: flaskgaedemo/main.py
-Scanned: 2016-10-20 08:41:53.404232
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-domenicosolazzo/flask_examples
-https://github.com/domenicosolazzo/flask_examples
-Entry file: flask_examples/logger_example.py
-Scanned: 2016-10-20 08:41:54.712064
-No vulnerabilities found.
-
-
-akostyuk/flask-dbmigrate
-https://github.com/akostyuk/flask-dbmigrate
-Entry file: flask-dbmigrate/tests.py
-Scanned: 2016-10-20 08:41:55.233508
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-50onRed/phillypug-flask
-https://github.com/50onRed/phillypug-flask
-Entry file: phillypug-flask/phillypug/app.py
-Scanned: 2016-10-20 08:41:56.470275
-Vulnerability 1:
-File: phillypug-flask/phillypug/views.py
- > User input at line 19, trigger word "get(":
- repos = redis_client.get(repos_key)
-Reassigned in:
- File: phillypug-flask/phillypug/views.py
- > Line 21: repos = json.loads(repos)
-File: phillypug-flask/phillypug/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',repos=repos)
-
-
-
-booo/flask-gtfs
-https://github.com/booo/flask-gtfs
-Entry file: None
-Scanned: 2016-10-20 08:41:56.977347
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs.
-
-faruken/flask-web.py-jvm
-https://github.com/faruken/flask-web.py-jvm
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 08:41:57.466034
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nerevu/prometheus
-https://github.com/nerevu/prometheus
-Entry file: prometheus/app/__init__.py
-Scanned: 2016-10-20 08:41:57.968249
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottdnz/flask_skeleton
-https://github.com/scottdnz/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 08:41:58.471957
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-pavlenko-volodymyr/flask-study
-https://github.com/pavlenko-volodymyr/flask-study
-Entry file: flask-study/hello.py
-Scanned: 2016-10-20 08:41:59.000605
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-slizadel/flask-gitrcv
-https://github.com/slizadel/flask-gitrcv
-Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py
-Scanned: 2016-10-20 08:42:00.303873
-No vulnerabilities found.
-
-
-apjd/flask-heroku
-https://github.com/apjd/flask-heroku
-Entry file: flask-heroku/flasky.py
-Scanned: 2016-10-20 08:42:01.570546
-No vulnerabilities found.
-
-
-scardine/flask-locale
-https://github.com/scardine/flask-locale
-Entry file: flask-locale/tests/__init__.py
-Scanned: 2016-10-20 08:42:02.960656
-No vulnerabilities found.
-
-
-JunilJacob/Paint-app-using-Flask
-https://github.com/JunilJacob/Paint-app-using-Flask
-Entry file: Paint-app-using-Flask/hello.py
-Scanned: 2016-10-20 08:42:28.726667
-Vulnerability 1:
-File: Paint-app-using-Flask/hello.py
- > User input at line 12, trigger word "form[":
- name = request.form['pname']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 16: iname = (name)
-File: Paint-app-using-Flask/hello.py
- > reaches line 18, trigger word "execute(":
- c.execute('DELETE FROM Image WHERE file=?', iname)
-
-Vulnerability 2:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 19, trigger word "execute(":
- c.execute('INSERT INTO Image VALUES (?,?)', image)
-
-Vulnerability 3:
-File: Paint-app-using-Flask/hello.py
- > User input at line 12, trigger word "form[":
- name = request.form['pname']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 16: iname = (name)
-File: Paint-app-using-Flask/hello.py
- > reaches line 19, trigger word "execute(":
- c.execute('INSERT INTO Image VALUES (?,?)', image)
-
-Vulnerability 4:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 34, trigger word "execute(":
- for row in c.execute('SELECT * FROM Image WHERE file=?', filename):
-
-Vulnerability 5:
-File: Paint-app-using-Flask/hello.py
- > User input at line 11, trigger word "form[":
- data = request.form['pdata']
-Reassigned in:
- File: Paint-app-using-Flask/hello.py
- > Line 15: image = (name, data)
- File: Paint-app-using-Flask/hello.py
- > Line 33: data = ''
- File: Paint-app-using-Flask/hello.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = resp
- File: Paint-app-using-Flask/hello.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found'
- File: Paint-app-using-Flask/hello.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
-File: Paint-app-using-Flask/hello.py
- > reaches line 36, trigger word "render_template(":
- resp = Response('' + render_template('paint.html'),status=200, mimetype='html')
-
-
-
-dimfox/flask-mega-tutorial
-https://github.com/dimfox/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 08:42:29.227048
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-callahad/temp-flask-persona-demo
-https://github.com/callahad/temp-flask-persona-demo
-Entry file: temp-flask-persona-demo/example.py
-Scanned: 2016-10-20 08:42:37.200092
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshsee/GAE-flask-cms
-https://github.com/joshsee/GAE-flask-cms
-Entry file: GAE-flask-cms/flask/sessions.py
-Scanned: 2016-10-20 08:42:38.721279
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshkurz/exi
-https://github.com/joshkurz/exi
-Entry file: exi/exi/tests/security/test_app/__init__.py
-Scanned: 2016-10-20 08:42:41.078902
-No vulnerabilities found.
-
-
-booo/baedproject
-https://github.com/booo/baedproject
-Entry file: baedproject/app.py
-Scanned: 2016-10-20 08:42:42.312265
-No vulnerabilities found.
-
-
-kalimatas/herokuflask
-https://github.com/kalimatas/herokuflask
-Entry file: herokuflask/app.py
-Scanned: 2016-10-20 08:42:44.560846
-No vulnerabilities found.
-
-
-norbert/helloflask
-https://github.com/norbert/helloflask
-Entry file: helloflask/hello.py
-Scanned: 2016-10-20 08:42:45.087441
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py
-
-perjo927/Portfolio
-https://github.com/perjo927/Portfolio
-Entry file: Portfolio/server.py
-Scanned: 2016-10-20 08:42:49.294374
-Vulnerability 1:
-File: Portfolio/server.py
- > User input at line 96, trigger word "form[":
- search_string = request.form['key']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 2:
-File: Portfolio/server.py
- > User input at line 99, trigger word "form[":
- sort_order = request.form['sort_order']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-Vulnerability 3:
-File: Portfolio/server.py
- > User input at line 100, trigger word "form[":
- sort_by = request.form['sort_by']
-Reassigned in:
- File: Portfolio/server.py
- > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields)
-File: Portfolio/server.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string)
-
-
-
-Pusungwi/lobotomizer
-https://github.com/Pusungwi/lobotomizer
-Entry file: None
-Scanned: 2016-10-20 08:42:49.790022
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer.
-
-ahawker/jpool
-https://github.com/ahawker/jpool
-Entry file: None
-Scanned: 2016-10-20 08:42:50.283080
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool.
-
-takosuke/pizzasuicideclub
-https://github.com/takosuke/pizzasuicideclub
-Entry file: pizzasuicideclub/psc_app/__init__.py
-Scanned: 2016-10-20 08:42:58.613059
-Vulnerability 1:
-File: pizzasuicideclub/psc_app/filters.py
- > User input at line 15, trigger word "Markup(":
- result = Markup(result)
-Reassigned in:
- File: pizzasuicideclub/psc_app/filters.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = result
-File: pizzasuicideclub/psc_app/filters.py
- > reaches line 12, trigger word "replace(":
- result = '
-
-'.join(('
%s
' % p.replace('
-', '
-') for p in _paragraph_re.split(escape(value))))
-This vulnerability is potentially sanitised by: ['escape']
-
-Vulnerability 2:
-File: pizzasuicideclub/psc_app/pages/views.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(postId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/pages/views.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('404.html',user=user)
-File: pizzasuicideclub/psc_app/pages/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pages/permalink.html',title=post.title, post=post, user=user)
-
-Vulnerability 3:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 31, trigger word "get(":
- profile = User.query.get(userId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('pages.userlist'))
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users/profile.html',profile=profile, user=user, form=form)
-
-Vulnerability 4:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 54, trigger word "flash(":
- flash('You are logged in %s' % user.username)
-
-Vulnerability 5:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 55, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 6:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(username=form.username.data).first()
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 52: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 53: session['username'] = user.username
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 49: session['remember_me'] = form.remember_me.data
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 55, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 7:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 79, trigger word ".data":
- file = form.image.data
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 80: profile_pic = utilities.file_save(file, 'profilepics')
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 8:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 81, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 9:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 79, trigger word ".data":
- file = form.image.data
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 80: profile_pic = utilities.file_save(file, 'profilepics')
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 10:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 81, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 84: session['user_id'] = user.id
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home'))
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form)
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 86, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id))
-
-Vulnerability 11:
-File: pizzasuicideclub/psc_app/users/views.py
- > User input at line 140, trigger word "get(":
- user = User.query.get(userId)
-Reassigned in:
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 134: user = g.user
- File: pizzasuicideclub/psc_app/users/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=userId))
-File: pizzasuicideclub/psc_app/users/views.py
- > reaches line 145, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users/modify_password.html',form=form, user=user)
-
-
-
-neilduncan/FlickrPlaceholders
-https://github.com/neilduncan/FlickrPlaceholders
-Entry file: FlickrPlaceholders/main.py
-Scanned: 2016-10-20 08:42:59.894866
-No vulnerabilities found.
-
-
-amaterasu-/placeholder
-https://github.com/amaterasu-/placeholder
-Entry file: placeholder/image.py
-Scanned: 2016-10-20 08:43:01.137334
-No vulnerabilities found.
-
-
-koon-kai/kiblog
-https://github.com/koon-kai/kiblog
-Entry file: kiblog/app.py
-Scanned: 2016-10-20 08:43:02.274226
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joelrojo/flask
-https://github.com/joelrojo/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 08:43:02.834546
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-asgoel/Merge-flask
-https://github.com/asgoel/Merge-flask
-Entry file: Merge-flask/app.py
-Scanned: 2016-10-20 08:43:03.817977
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gregimba/Vodka
-https://github.com/gregimba/Vodka
-Entry file: Vodka/app.py
-Scanned: 2016-10-20 08:43:06.346362
-No vulnerabilities found.
-
-
-corydolphin/flask-olinauth
-https://github.com/corydolphin/flask-olinauth
-Entry file: flask-olinauth/example.py
-Scanned: 2016-10-20 08:43:07.746642
-No vulnerabilities found.
-
-
-danielestevez/flasktutorial
-https://github.com/danielestevez/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 08:43:09.252066
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pityonline/flaskr
-https://github.com/pityonline/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:43:09.755460
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Studentapp-Flask
-https://github.com/prabeesh/Studentapp-Flask
-Entry file: Studentapp-Flask/test.py
-Scanned: 2016-10-20 08:43:10.716458
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dproni/flask_test
-https://github.com/dproni/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 08:43:27.811935
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scardine/flask-locale
-https://github.com/scardine/flask-locale
-Entry file: flask-locale/tests/__init__.py
-Scanned: 2016-10-20 08:43:29.168445
-No vulnerabilities found.
-
-
-callahad/temp-flask-persona-demo
-https://github.com/callahad/temp-flask-persona-demo
-Entry file: temp-flask-persona-demo/example.py
-Scanned: 2016-10-20 08:43:29.749296
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kishorekdty/paint_using_flask
-https://github.com/kishorekdty/paint_using_flask
-Entry file: None
-Scanned: 2016-10-20 08:43:31.239792
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask.
-
-joshsee/GAE-flask-cms
-https://github.com/joshsee/GAE-flask-cms
-Entry file: GAE-flask-cms/flask/sessions.py
-Scanned: 2016-10-20 08:43:37.765289
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rasheedh/Heroku-Paint-Using-Flask
-https://github.com/rasheedh/Heroku-Paint-Using-Flask
-Entry file: None
-Scanned: 2016-10-20 08:43:39.274675
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask.
-
-sreekanthkaralmanna/heroku-paint-app-using-flask
-https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask
-Entry file: None
-Scanned: 2016-10-20 08:43:39.774949
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask.
-
-mikewallace1979/milk
-https://github.com/mikewallace1979/milk
-Entry file: milk/milk.py
-Scanned: 2016-10-20 08:43:43.038322
-No vulnerabilities found.
-
-
-goonpug/goonpug-stats
-https://github.com/goonpug/goonpug-stats
-Entry file: goonpug-stats/goonpug/__init__.py
-Scanned: 2016-10-20 08:43:46.394545
-No vulnerabilities found.
-
-
-clly/blog.md
-https://github.com/clly/blog.md
-Entry file: blog/flaskr.py
-Scanned: 2016-10-20 08:43:46.920117
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-simplyluke/dothis
-https://github.com/simplyluke/dothis
-Entry file: dothis/dothis.py
-Scanned: 2016-10-20 08:43:48.149067
-No vulnerabilities found.
-
-
-oberkowitz/improv
-https://github.com/oberkowitz/improv
-Entry file: improv/mytest/app.py
-Scanned: 2016-10-20 08:43:50.696310
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: improv/mytest/venv/lib/python2.7/genericpath.py
-
-mikeboers/Flask-Images
-https://github.com/mikeboers/Flask-Images
-Entry file: Flask-Images/tests/__init__.py
-Scanned: 2016-10-20 08:43:53.644568
-No vulnerabilities found.
-
-
-berlotto/flask-app-template
-https://github.com/berlotto/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-20 08:44:00.635610
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-corydolphin/flask-jsonpify
-https://github.com/corydolphin/flask-jsonpify
-Entry file: flask-jsonpify/test.py
-Scanned: 2016-10-20 08:44:03.053101
-No vulnerabilities found.
-
-
-eadmundo/flask-static-blog
-https://github.com/eadmundo/flask-static-blog
-Entry file: flask-static-blog/app/__init__.py
-Scanned: 2016-10-20 08:44:04.990840
-Vulnerability 1:
-File: flask-static-blog/app/blueprints/blog/views.py
- > User input at line 17, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 30: pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10))
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0])
-File: flask-static-blog/app/blueprints/blog/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args)
-
-Vulnerability 2:
-File: flask-static-blog/app/blueprints/blog/views.py
- > User input at line 30, trigger word "get(":
- pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10))
-Reassigned in:
- File: flask-static-blog/app/blueprints/blog/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0])
-File: flask-static-blog/app/blueprints/blog/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args)
-
-
-
-0atman/flask-basic
-https://github.com/0atman/flask-basic
-Entry file: flask-basic/flask-basic.py
-Scanned: 2016-10-20 08:44:06.691395
-No vulnerabilities found.
-
-
-clmns/flasktest
-https://github.com/clmns/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 08:44:07.711630
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zfdang/memcached-in-openshift
-https://github.com/zfdang/memcached-in-openshift
-Entry file: memcached-in-openshift/wsgi/main.py
-Scanned: 2016-10-20 08:44:09.202481
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-garethpaul/flask-sample
-https://github.com/garethpaul/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 08:44:10.199095
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-naveenpremchand02/flask_url
-https://github.com/naveenpremchand02/flask_url
-Entry file: flask_url/url.py
-Scanned: 2016-10-20 08:44:10.696020
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiechao06/Flask-NavBar
-https://github.com/xiechao06/Flask-NavBar
-Entry file: Flask-NavBar/flask_nav_bar.py
-Scanned: 2016-10-20 08:44:11.669858
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cpdean/flask-oauth-tutorial
-https://github.com/cpdean/flask-oauth-tutorial
-Entry file: flask-oauth-tutorial/flaskr.py
-Scanned: 2016-10-20 08:44:12.937681
-No vulnerabilities found.
-
-
-nsfyn55/flask-mega-tutorial
-https://github.com/nsfyn55/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 08:44:28.510435
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kshitizrimal/flaskr-modified
-https://github.com/kshitizrimal/flaskr-modified
-Entry file: flaskr-modified/flaskr.py
-Scanned: 2016-10-20 08:44:29.087524
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prasanthkumara/Heroku-Paint-App-Using--Flask
-https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask
-Entry file: None
-Scanned: 2016-10-20 08:44:32.063644
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask.
-
-pyxze/PyxzeCorpus
-https://github.com/pyxze/PyxzeCorpus
-Entry file: PyxzeCorpus/corpus.py
-Scanned: 2016-10-20 08:44:39.299261
-No vulnerabilities found.
-
-
-crcsmnky/thehotspot
-https://github.com/crcsmnky/thehotspot
-Entry file: thehotspot/v2/app.py
-Scanned: 2016-10-20 08:44:41.332880
-Vulnerability 1:
-File: thehotspot/v2/app.py
- > User input at line 54, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('places.html',places=places, count=count, skip=checkins_skip)
-
-Vulnerability 2:
-File: thehotspot/v2/app.py
- > User input at line 64, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users.html',users=users, count=count, skip=checkins_skip)
-
-Vulnerability 3:
-File: thehotspot/v2/app.py
- > User input at line 73, trigger word "get(":
- checkins_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 82, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('checkins.html',checkins=checkins, users=users, places=places, skip=checkins_skip, count=count)
-
-Vulnerability 4:
-File: thehotspot/v2/app.py
- > User input at line 103, trigger word "get(":
- cats_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('categories.html',categories=categories, count=count, skip=cats_skip)
-
-Vulnerability 5:
-File: thehotspot/v2/app.py
- > User input at line 114, trigger word "get(":
- places_skip = int(request.args.get('skip', 0))
-File: thehotspot/v2/app.py
- > reaches line 118, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=cat, places=places, mapped=places.clone(), count=cat['count'], skip=places_skip)
-
-
-
-etscrivner/sovereign-states
-https://github.com/etscrivner/sovereign-states
-Entry file: sovereign-states/sovereign_states/api.py
-Scanned: 2016-10-20 08:44:42.717027
-No vulnerabilities found.
-
-
-croach/cheap-and-scalable-webistes-with-flask-code
-https://github.com/croach/cheap-and-scalable-webistes-with-flask-code
-Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py
-Scanned: 2016-10-20 08:44:44.089649
-No vulnerabilities found.
-
-
-sreedathns/paint-app-using-heroku-and-flask
-https://github.com/sreedathns/paint-app-using-heroku-and-flask
-Entry file: None
-Scanned: 2016-10-20 08:44:44.601452
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask.
-
-nesv/cask
-https://github.com/nesv/cask
-Entry file: None
-Scanned: 2016-10-20 08:44:47.099087
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask.
-
-chadgh/chessy
-https://github.com/chadgh/chessy
-Entry file: None
-Scanned: 2016-10-20 08:44:47.616697
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wowo/pithermo
-https://github.com/wowo/pithermo
-Entry file: pithermo/pithermo.py
-Scanned: 2016-10-20 08:44:51.581577
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aranasaurus/android-demo-server
-https://github.com/aranasaurus/android-demo-server
-Entry file: android-demo-server/app.py
-Scanned: 2016-10-20 08:44:52.855867
-Vulnerability 1:
-File: android-demo-server/app.py
- > User input at line 21, trigger word "get(":
- r = requests.get(url.format(query))
-Reassigned in:
- File: android-demo-server/app.py
- > Line 22: images = [(i, json.dumps(i)) for i in json.loads(r.text)['responseData']['results']]
-File: android-demo-server/app.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',images=images)
-
-
-
-mjhea0/flask-intro
-https://github.com/mjhea0/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 08:45:01.317195
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-deepgully/me
-https://github.com/deepgully/me
-Entry file: me/settings.py
-Scanned: 2016-10-20 08:45:02.865850
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mickey06/Flask-principal-example
-https://github.com/mickey06/Flask-principal-example
-Entry file: Flask-principal-example/FPrincipals.py
-Scanned: 2016-10-20 08:45:05.237206
-No vulnerabilities found.
-
-
-crazygit/flask
-https://github.com/crazygit/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 08:45:05.811223
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wingu/flask_filters
-https://github.com/wingu/flask_filters
-Entry file: flask_filters/test_flask_filters.py
-Scanned: 2016-10-20 08:45:07.141889
-No vulnerabilities found.
-
-
-BuongiornoMIP/Reding
-https://github.com/BuongiornoMIP/Reding
-Entry file: Reding/reding/app.py
-Scanned: 2016-10-20 08:45:10.712742
-No vulnerabilities found.
-
-
-mphuie/flask_base
-https://github.com/mphuie/flask_base
-Entry file: flask_base/myapp/__init__.py
-Scanned: 2016-10-20 08:45:13.545427
-No vulnerabilities found.
-
-
-colwilson/flask-lazyapi
-https://github.com/colwilson/flask-lazyapi
-Entry file: flask-lazyapi/demo_server.py
-Scanned: 2016-10-20 08:45:14.047065
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiechao06/Flask-DataBrowser
-https://github.com/xiechao06/Flask-DataBrowser
-Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py
-Scanned: 2016-10-20 08:45:14.563417
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knowshan/flaskey
-https://github.com/knowshan/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-20 08:45:16.032041
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Masagin/FlaskCelery
-https://github.com/Masagin/FlaskCelery
-Entry file: FlaskCelery/flask.py
-Scanned: 2016-10-20 08:45:16.523810
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-denz/flask_introspect
-https://github.com/denz/flask_introspect
-Entry file: flask_introspect/test/test_blueprint.py
-Scanned: 2016-10-20 08:45:29.452653
-No vulnerabilities found.
-
-
-EvilDmitri/flask-mikroblog
-https://github.com/EvilDmitri/flask-mikroblog
-Entry file: flask-mikroblog/app/__init__.py
-Scanned: 2016-10-20 08:45:31.158848
-No vulnerabilities found.
-
-
-maxcnunes/flask_bravi
-https://github.com/maxcnunes/flask_bravi
-Entry file: flask_bravi/braviapp/__init__.py
-Scanned: 2016-10-20 08:45:32.654585
-No vulnerabilities found.
-
-
-zhemao/flask_demo
-https://github.com/zhemao/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 08:45:38.667858
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SalemHarrache-Archive/flask_chat_eventsource
-https://github.com/SalemHarrache-Archive/flask_chat_eventsource
-Entry file: flask_chat_eventsource/server.py
-Scanned: 2016-10-20 08:45:40.176919
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ryanolson/flask-couchdb-schematics
-https://github.com/ryanolson/flask-couchdb-schematics
-Entry file: flask-couchdb-schematics/example/guestbook.py
-Scanned: 2016-10-20 08:45:43.792239
-Vulnerability 1:
-File: flask-couchdb-schematics/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-schematics/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-pouyan-ghasemi/flask-sql-cms
-https://github.com/pouyan-ghasemi/flask-sql-cms
-Entry file: flask-sql-cms/app.py
-Scanned: 2016-10-20 08:45:44.312857
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-texuf/myflaskproject
-https://github.com/texuf/myflaskproject
-Entry file: myflaskproject/hello.py
-Scanned: 2016-10-20 08:45:45.557042
-No vulnerabilities found.
-
-
-csesoc/bark-core
-https://github.com/csesoc/bark-core
-Entry file: bark-core/bark/__init__.py
-Scanned: 2016-10-20 08:45:48.562772
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-croach/cheap-and-scalable-webistes-with-flask-code
-https://github.com/croach/cheap-and-scalable-webistes-with-flask-code
-Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py
-Scanned: 2016-10-20 08:45:52.987577
-No vulnerabilities found.
-
-
-nesv/cask
-https://github.com/nesv/cask
-Entry file: None
-Scanned: 2016-10-20 08:45:53.490281
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask.
-
-lee212/fg-ws
-https://github.com/lee212/fg-ws
-Entry file: fg-ws/fgws/ws/FGWSApps.py
-Scanned: 2016-10-20 08:45:53.991681
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brunsgaard/qwablog
-https://github.com/brunsgaard/qwablog
-Entry file: qwablog/qwablog.py
-Scanned: 2016-10-20 08:46:00.382068
-No vulnerabilities found.
-
-
-nutrislice/mandrill-webhook-redirector
-https://github.com/nutrislice/mandrill-webhook-redirector
-Entry file: mandrill-webhook-redirector/webhook-router.py
-Scanned: 2016-10-20 08:46:02.775127
-Vulnerability 1:
-File: mandrill-webhook-redirector/webhook-router.py
- > User input at line 13, trigger word "form[":
- mandrill_event = json.loads(request.form['mandrill_events'])
-Reassigned in:
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 14: metadata = mandrill_event[0]['msg']['metadata']
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 15: domain = metadata['domain']
-File: mandrill-webhook-redirector/webhook-router.py
- > reaches line 16, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/')
-
-
-
-rubinovitz/fourequality
-https://github.com/rubinovitz/fourequality
-Entry file: fourequality/app.py
-Scanned: 2016-10-20 08:46:06.275026
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-darylchang/Hacker-Viz
-https://github.com/darylchang/Hacker-Viz
-Entry file: Hacker-Viz/flaskDir.py
-Scanned: 2016-10-20 08:46:06.776841
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexlod/movielist
-https://github.com/alexlod/movielist
-Entry file: movielist/movielist.py
-Scanned: 2016-10-20 08:46:08.288717
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dhumbert/literable
-https://github.com/dhumbert/literable
-Entry file: None
-Scanned: 2016-10-20 08:46:08.792966
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhumbert/literable.
-
-ArcTanSusan/Task_List
-https://github.com/ArcTanSusan/Task_List
-Entry file: Task_List/tipsy/tipsy.py
-Scanned: 2016-10-20 08:46:11.311379
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rbuysse/url_shortener
-https://github.com/rbuysse/url_shortener
-Entry file: url_shortener/url.py
-Scanned: 2016-10-20 08:46:14.818411
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mjhea0/flask-intro
-https://github.com/mjhea0/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 08:46:16.025217
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-seanrose/box-arcade
-https://github.com/seanrose/box-arcade
-Entry file: box-arcade/app/__init__.py
-Scanned: 2016-10-20 08:46:17.019268
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-techniq/flask-wdb
-https://github.com/techniq/flask-wdb
-Entry file: flask-wdb/example.py
-Scanned: 2016-10-20 08:46:18.340439
-No vulnerabilities found.
-
-
-mphuie/flask_base
-https://github.com/mphuie/flask_base
-Entry file: flask_base/myapp/__init__.py
-Scanned: 2016-10-20 08:46:21.291568
-No vulnerabilities found.
-
-
-theho/flask-wsgi
-https://github.com/theho/flask-wsgi
-Entry file: flask-wsgi/wsgi.py
-Scanned: 2016-10-20 08:46:31.319172
-No vulnerabilities found.
-
-
-adityaathalye/flaskr
-https://github.com/adityaathalye/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:46:31.856619
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knowshan/flaskey
-https://github.com/knowshan/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-20 08:46:33.391809
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyr/flaskapp
-https://github.com/andyr/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:46:38.904887
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp.
-
-denz/flask_introspect
-https://github.com/denz/flask_introspect
-Entry file: flask_introspect/test/test_blueprint.py
-Scanned: 2016-10-20 08:46:41.308778
-No vulnerabilities found.
-
-
-ekfriis/flask-mbtiles
-https://github.com/ekfriis/flask-mbtiles
-Entry file: flask-mbtiles/mbtileserver.py
-Scanned: 2016-10-20 08:46:43.571932
-No vulnerabilities found.
-
-
-hyaticua/flask-blog
-https://github.com/hyaticua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 08:46:45.131515
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-thearchduke/flask-boiler
-https://github.com/thearchduke/flask-boiler
-Entry file: None
-Scanned: 2016-10-20 08:46:45.651951
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-StefanKjartansson/bower-flask
-https://github.com/StefanKjartansson/bower-flask
-Entry file: bower-flask/server.py
-Scanned: 2016-10-20 08:46:48.952042
-No vulnerabilities found.
-
-
-tanayseven/Voix
-https://github.com/tanayseven/Voix
-Entry file: None
-Scanned: 2016-10-20 08:46:49.477207
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gatesphere/flaskr-flask-tutorial
-https://github.com/gatesphere/flaskr-flask-tutorial
-Entry file: flaskr-flask-tutorial/flaskr/flaskr.py
-Scanned: 2016-10-20 08:46:53.748084
-No vulnerabilities found.
-
-
-bazerk/baz-flask-base
-https://github.com/bazerk/baz-flask-base
-Entry file: baz-flask-base/app/app.py
-Scanned: 2016-10-20 08:46:55.636538
-Vulnerability 1:
-File: baz-flask-base/app/frontend/views.py
- > User input at line 26, trigger word "get(":
- form = RegisterForm(username=request.args.get('username', twitter_name), password=request.args.get('password', None))
-Reassigned in:
- File: baz-flask-base/app/frontend/views.py
- > Line 30: err = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets)
- File: baz-flask-base/app/frontend/views.py
- > Line 30: user = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets)
- File: baz-flask-base/app/frontend/views.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('frontend.login'))
-File: baz-flask-base/app/frontend/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('frontend/register.html',form=form, twitter_name=twitter_name)
-
-Vulnerability 2:
-File: baz-flask-base/app/frontend/views.py
- > User input at line 48, trigger word "get(":
- form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None))
-Reassigned in:
- File: baz-flask-base/app/frontend/views.py
- > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash)
- File: baz-flask-base/app/frontend/views.py
- > Line 57: session['user_id'] = user.id
- File: baz-flask-base/app/frontend/views.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = redirect('')
-File: baz-flask-base/app/frontend/views.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form)
-
-
-
-ryanolson/flask-couchdb-schematics
-https://github.com/ryanolson/flask-couchdb-schematics
-Entry file: flask-couchdb-schematics/example/guestbook.py
-Scanned: 2016-10-20 08:46:57.177170
-Vulnerability 1:
-File: flask-couchdb-schematics/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-schematics/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-pouyan-ghasemi/flask-sql-cms
-https://github.com/pouyan-ghasemi/flask-sql-cms
-Entry file: flask-sql-cms/app.py
-Scanned: 2016-10-20 08:46:59.693036
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Andrey-Khobnya/flask-sessions-mongo
-https://github.com/Andrey-Khobnya/flask-sessions-mongo
-Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py
-Scanned: 2016-10-20 08:47:03.056073
-No vulnerabilities found.
-
-
-igrishaev/youtube-python-api-sample
-https://github.com/igrishaev/youtube-python-api-sample
-Entry file: youtube-python-api-sample/app.py
-Scanned: 2016-10-20 08:47:05.096357
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nutrislice/mandrill-webhook-redirector
-https://github.com/nutrislice/mandrill-webhook-redirector
-Entry file: mandrill-webhook-redirector/webhook-router.py
-Scanned: 2016-10-20 08:47:07.373261
-Vulnerability 1:
-File: mandrill-webhook-redirector/webhook-router.py
- > User input at line 13, trigger word "form[":
- mandrill_event = json.loads(request.form['mandrill_events'])
-Reassigned in:
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 14: metadata = mandrill_event[0]['msg']['metadata']
- File: mandrill-webhook-redirector/webhook-router.py
- > Line 15: domain = metadata['domain']
-File: mandrill-webhook-redirector/webhook-router.py
- > reaches line 16, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/')
-
-
-
-kfr2/pynances
-https://github.com/kfr2/pynances
-Entry file: pynances/pynances/pynances.py
-Scanned: 2016-10-20 08:47:08.776599
-No vulnerabilities found.
-
-
-WilliamMayor/geoffrey
-https://github.com/WilliamMayor/geoffrey
-Entry file: geoffrey/geoffrey.py
-Scanned: 2016-10-20 08:47:10.046483
-No vulnerabilities found.
-
-
-Timothee/Passerelle
-https://github.com/Timothee/Passerelle
-Entry file: Passerelle/passerelle.py
-Scanned: 2016-10-20 08:47:11.419110
-No vulnerabilities found.
-
-
-fusic-com/flask-todo
-https://github.com/fusic-com/flask-todo
-Entry file: flask-todo/backend/app.py
-Scanned: 2016-10-20 08:47:15.756147
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bkabrda/flask-whooshee
-https://github.com/bkabrda/flask-whooshee
-Entry file: flask-whooshee/test.py
-Scanned: 2016-10-20 08:47:17.463765
-No vulnerabilities found.
-
-
-DavidWittman/csrgenerator.com
-https://github.com/DavidWittman/csrgenerator.com
-Entry file: None
-Scanned: 2016-10-20 08:47:18.455989
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-techniq/flask-wdb
-https://github.com/techniq/flask-wdb
-Entry file: flask-wdb/example.py
-Scanned: 2016-10-20 08:47:19.722180
-No vulnerabilities found.
-
-
-1000ch/flask-handson
-https://github.com/1000ch/flask-handson
-Entry file: flask-handson/flaskr/__init__.py
-Scanned: 2016-10-20 08:47:20.239632
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ajuna/car-registration
-https://github.com/ajuna/car-registration
-Entry file: None
-Scanned: 2016-10-20 08:47:20.738370
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration.
-
-jishnujagajeeve/Flaskr
-https://github.com/jishnujagajeeve/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 08:47:29.280696
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Basher51/Flaskr
-https://github.com/Basher51/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 08:47:30.791935
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyr/flaskapp
-https://github.com/andyr/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:47:32.298682
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp.
-
-sagnew/Prank-Roulette
-https://github.com/sagnew/Prank-Roulette
-Entry file: Prank-Roulette/app.py
-Scanned: 2016-10-20 08:47:33.828298
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kaste/FlaskDeferredHandler
-https://github.com/kaste/FlaskDeferredHandler
-Entry file: FlaskDeferredHandler/flask_handler_test.py
-Scanned: 2016-10-20 08:47:40.122682
-No vulnerabilities found.
-
-
-adityaathalye/flaskr2
-https://github.com/adityaathalye/flaskr2
-Entry file: flaskr2/app.py
-Scanned: 2016-10-20 08:47:41.372411
-No vulnerabilities found.
-
-
-ConceptPending/flaskTemplate
-https://github.com/ConceptPending/flaskTemplate
-Entry file: flaskTemplate/server.py
-Scanned: 2016-10-20 08:47:46.636042
-No vulnerabilities found.
-
-
-AlexMost/Flask-starter
-https://github.com/AlexMost/Flask-starter
-Entry file: Flask-starter/app.py
-Scanned: 2016-10-20 08:47:47.930948
-No vulnerabilities found.
-
-
-samgclarke/flask-microblog
-https://github.com/samgclarke/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 08:47:48.440913
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jonomillin/learning-flask
-https://github.com/jonomillin/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 08:47:48.999270
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-berlotto/hero-flask
-https://github.com/berlotto/hero-flask
-Entry file: hero-flask/hero/__init__.py
-Scanned: 2016-10-20 08:47:50.374245
-No vulnerabilities found.
-
-
-nthfloor/Flask_learn
-https://github.com/nthfloor/Flask_learn
-Entry file: Flask_learn/login_system/flskr.py
-Scanned: 2016-10-20 08:48:00.491753
-Vulnerability 1:
-File: Flask_learn/login_system/flskr.py
- > User input at line 116, trigger word "get(":
- username = request.form.get('username')
-File: Flask_learn/login_system/flskr.py
- > reaches line 119, trigger word "filter(":
- user = User.query.filter(User.name == username and User.password == password).first()
-
-Vulnerability 2:
-File: Flask_learn/login_system/flskr.py
- > User input at line 117, trigger word "get(":
- password = request.form.get('password')
-File: Flask_learn/login_system/flskr.py
- > reaches line 119, trigger word "filter(":
- user = User.query.filter(User.name == username and User.password == password).first()
-
-
-
-mmcgahan/flask-labs-bb
-https://github.com/mmcgahan/flask-labs-bb
-Entry file: flask-labs-bb/flask_labs/__init__.py
-Scanned: 2016-10-20 08:48:04.971032
-Vulnerability 1:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 29, trigger word "filter(":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-
-Vulnerability 2:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 29, trigger word ".data":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 29, trigger word "filter(":
- user = db.session.query(User).filter(User.username == login_form.username.data).first()
-
-Vulnerability 3:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index'))
-
-Vulnerability 4:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 36, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index'))
-
-Vulnerability 5:
-File: flask-labs-bb/flask_labs/views.py
- > User input at line 27, trigger word "get(":
- login_form = LoginForm(request.form,next=request.args.get('next'))
-Reassigned in:
- File: flask-labs-bb/flask_labs/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer)
-File: flask-labs-bb/flask_labs/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',login_form=login_form)
-
-
-
-daisuzu/flask-app-sample
-https://github.com/daisuzu/flask-app-sample
-Entry file: flask-app-sample/db.py
-Scanned: 2016-10-20 08:48:06.301189
-No vulnerabilities found.
-
-
-penpyt/flask-couchdb-auth
-https://github.com/penpyt/flask-couchdb-auth
-Entry file: flask-couchdb-auth/example/guestbook.py
-Scanned: 2016-10-20 08:48:07.785898
-Vulnerability 1:
-File: flask-couchdb-auth/example/guestbook.py
- > User input at line 53, trigger word "get(":
- page = paginate(Signature.all(), 5, request.args.get('start'))
-File: flask-couchdb-auth/example/guestbook.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page)
-
-
-
-rodreegez/flask-twitter-auth
-https://github.com/rodreegez/flask-twitter-auth
-Entry file: None
-Scanned: 2016-10-20 08:48:08.305451
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth.
-
-DamnedFacts/flask-hello-world
-https://github.com/DamnedFacts/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 08:48:08.843770
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ariamoraine/kitten-generator
-https://github.com/ariamoraine/kitten-generator
-Entry file: kitten-generator/flaskhello.py
-Scanned: 2016-10-20 08:48:10.605778
-No vulnerabilities found.
-
-
-honestappalachia/honest_site
-https://github.com/honestappalachia/honest_site
-Entry file: honest_site/run.py
-Scanned: 2016-10-20 08:48:11.967503
-Vulnerability 1:
-File: honest_site/run.py
- > User input at line 36, trigger word "get(":
- template = page.meta.get('template', 'default.html')
-File: honest_site/run.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,page=page)
-
-
-
-daikeshi/one-dollar-metasearch-engine
-https://github.com/daikeshi/one-dollar-metasearch-engine
-Entry file: one-dollar-metasearch-engine/app/__init__.py
-Scanned: 2016-10-20 08:48:12.468636
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-msalahi/art-party
-https://github.com/msalahi/art-party
-Entry file: art-party/app.py
-Scanned: 2016-10-20 08:48:18.817291
-No vulnerabilities found.
-
-
-honestappalachia/honest_hiddenservice
-https://github.com/honestappalachia/honest_hiddenservice
-Entry file: honest_hiddenservice/run.py
-Scanned: 2016-10-20 08:48:19.332967
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-saltire/artpubpy
-https://github.com/saltire/artpubpy
-Entry file: artpubpy/artpubpy.py
-Scanned: 2016-10-20 08:48:19.838529
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mcniac/simple-blog
-https://github.com/mcniac/simple-blog
-Entry file: simple-blog/tumblelog/__init__.py
-Scanned: 2016-10-20 08:48:25.837053
-No vulnerabilities found.
-
-
-ryanrdetzel/blimp-commit
-https://github.com/ryanrdetzel/blimp-commit
-Entry file: blimp-commit/blimp_commit.py
-Scanned: 2016-10-20 08:48:27.135968
-No vulnerabilities found.
-
-
-fusic-com/flask-webcache
-https://github.com/fusic-com/flask-webcache
-Entry file: flask-webcache/contrib/sleepycalc/app.py
-Scanned: 2016-10-20 08:48:29.483504
-No vulnerabilities found.
-
-
-rehandalal/flask-mobility
-https://github.com/rehandalal/flask-mobility
-Entry file: flask-mobility/flask_mobility/tests/test_decorators.py
-Scanned: 2016-10-20 08:48:31.694444
-Vulnerability 1:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 46, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 48, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 2:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 46, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 51, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-Vulnerability 3:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 67, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 69, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 4:
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > User input at line 67, trigger word "get(":
- MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_decorators.py
- > reaches line 72, trigger word "set_cookie(":
- self.client.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-Vulnerability 5:
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > User input at line 33, trigger word "get(":
- MOBILE_COOKIE = self.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > reaches line 36, trigger word "set_cookie(":
- self.app.set_cookie('localhost', MOBILE_COOKIE, 'on')
-
-Vulnerability 6:
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > User input at line 33, trigger word "get(":
- MOBILE_COOKIE = self.config.get('MOBILE_COOKIE')
-File: flask-mobility/flask_mobility/tests/test_mobility.py
- > reaches line 40, trigger word "set_cookie(":
- self.app.set_cookie('localhost', MOBILE_COOKIE, 'off')
-
-
-
-kelp404/Flask-GAE
-https://github.com/kelp404/Flask-GAE
-Entry file: None
-Scanned: 2016-10-20 08:48:32.199729
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jaysonsantos/jinja-assets-compressor
-https://github.com/jaysonsantos/jinja-assets-compressor
-Entry file: jinja-assets-compressor/jac/contrib/flask.py
-Scanned: 2016-10-20 08:48:34.037894
-No vulnerabilities found.
-
-
-nabetama/flaskr
-https://github.com/nabetama/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:48:40.043998
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sagnew/Prank-Roulette
-https://github.com/sagnew/Prank-Roulette
-Entry file: Prank-Roulette/app.py
-Scanned: 2016-10-20 08:48:41.550959
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jpscaletti/authcode
-https://github.com/jpscaletti/authcode
-Entry file: authcode/examples/default/app.py
-Scanned: 2016-10-20 08:48:47.745519
-No vulnerabilities found.
-
-
-samgclarke/flask-microblog
-https://github.com/samgclarke/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 08:48:48.732799
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shunyata/flask-helloworld
-https://github.com/shunyata/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-20 08:48:50.006192
-No vulnerabilities found.
-
-
-stephen-allison/basic-flask
-https://github.com/stephen-allison/basic-flask
-Entry file: None
-Scanned: 2016-10-20 08:48:50.513513
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask.
-
-bollwyvl/flask-reloaded
-https://github.com/bollwyvl/flask-reloaded
-Entry file: None
-Scanned: 2016-10-20 08:48:54.017752
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded.
-
-kitanata/flask-demo
-https://github.com/kitanata/flask-demo
-Entry file: None
-Scanned: 2016-10-20 08:49:01.544824
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo.
-
-berlotto/hero-flask
-https://github.com/berlotto/hero-flask
-Entry file: hero-flask/hero/__init__.py
-Scanned: 2016-10-20 08:49:06.912299
-No vulnerabilities found.
-
-
-flyingsparx/MongoFlask
-https://github.com/flyingsparx/MongoFlask
-Entry file: MongoFlask/application.py
-Scanned: 2016-10-20 08:49:08.209674
-Vulnerability 1:
-File: MongoFlask/application.py
- > User input at line 39, trigger word "form[":
- person = User.query.filter(User.name == request.form['username']).first()
-File: MongoFlask/application.py
- > reaches line 39, trigger word "filter(":
- person = User.query.filter(User.name == request.form['username']).first()
-
-Vulnerability 2:
-File: MongoFlask/application.py
- > User input at line 64, trigger word "form[":
- person = User.query.filter(User.name == request.form['username']).first()
-Reassigned in:
- File: MongoFlask/application.py
- > Line 67: session['id'] = person.id
-File: MongoFlask/application.py
- > reaches line 64, trigger word "filter(":
- person = User.query.filter(User.name == request.form['username']).first()
-
-
-
-DanAlbert/flask-guestbook
-https://github.com/DanAlbert/flask-guestbook
-Entry file: flask-guestbook/guestbook.py
-Scanned: 2016-10-20 08:49:09.492858
-No vulnerabilities found.
-
-
-kirkeby/empty-flask
-https://github.com/kirkeby/empty-flask
-Entry file: empty-flask/app/app.py
-Scanned: 2016-10-20 08:49:10.497664
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rehandalal/buchner
-https://github.com/rehandalal/buchner
-Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py
-Scanned: 2016-10-20 08:49:14.127244
-No vulnerabilities found.
-
-
-vitalk/flask-staticutils
-https://github.com/vitalk/flask-staticutils
-Entry file: flask-staticutils/tests/test_app/__init__.py
-Scanned: 2016-10-20 08:49:15.508610
-No vulnerabilities found.
-
-
-chiwong/flask_quickstart
-https://github.com/chiwong/flask_quickstart
-Entry file: flask_quickstart/hello.py
-Scanned: 2016-10-20 08:49:16.115118
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py
-
-archieyang/flask_app
-https://github.com/archieyang/flask_app
-Entry file: None
-Scanned: 2016-10-20 08:49:16.618051
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app.
-
-ipfans/openshift-flask-template
-https://github.com/ipfans/openshift-flask-template
-Entry file: openshift-flask-template/wsgi/mainapp.py
-Scanned: 2016-10-20 08:49:17.981618
-No vulnerabilities found.
-
-
-minhtuev/flask-google-map-example
-https://github.com/minhtuev/flask-google-map-example
-Entry file: flask-google-map-example/server.py
-Scanned: 2016-10-20 08:49:20.263237
-No vulnerabilities found.
-
-
-DamnedFacts/flask-hello-world
-https://github.com/DamnedFacts/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 08:49:20.810466
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-philangist/url-shorten
-https://github.com/philangist/url-shorten
-Entry file: url-shorten/shorten.py
-Scanned: 2016-10-20 08:49:21.314895
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fabionatali/DigiWebStats
-https://github.com/fabionatali/DigiWebStats
-Entry file: DigiWebStats/app.py
-Scanned: 2016-10-20 08:49:22.928634
-Vulnerability 1:
-File: DigiWebStats/app.py
- > User input at line 31, trigger word "get(":
- start_date = request.args.get('start_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 47, trigger word "execute(":
- data = engine.execute(query).fetchall()
-
-Vulnerability 2:
-File: DigiWebStats/app.py
- > User input at line 32, trigger word "get(":
- end_date = request.args.get('end_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 47, trigger word "execute(":
- data = engine.execute(query).fetchall()
-
-Vulnerability 3:
-File: DigiWebStats/app.py
- > User input at line 31, trigger word "get(":
- start_date = request.args.get('start_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data)
-
-Vulnerability 4:
-File: DigiWebStats/app.py
- > User input at line 32, trigger word "get(":
- end_date = request.args.get('end_date', None)
-Reassigned in:
- File: DigiWebStats/app.py
- > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date()
- File: DigiWebStats/app.py
- > Line 46: query = settings.DB_QUERY % (start_date, end_date)
- File: DigiWebStats/app.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: DigiWebStats/app.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today))
-File: DigiWebStats/app.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data)
-
-
-
-confessin/addressbook
-https://github.com/confessin/addressbook
-Entry file: addressbook/addressbook.py
-Scanned: 2016-10-20 08:49:27.301515
-No vulnerabilities found.
-
-
-nafur/flmpc
-https://github.com/nafur/flmpc
-Entry file: flmpc/main.py
-Scanned: 2016-10-20 08:49:28.716368
-No vulnerabilities found.
-
-
-honestappalachia/honest_hiddenservice
-https://github.com/honestappalachia/honest_hiddenservice
-Entry file: honest_hiddenservice/run.py
-Scanned: 2016-10-20 08:49:29.238538
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kvalle/greetr
-https://github.com/kvalle/greetr
-Entry file: greetr/greetr/__init__.py
-Scanned: 2016-10-20 08:49:31.916979
-No vulnerabilities found.
-
-
-mjhea0/brew
-https://github.com/mjhea0/brew
-Entry file: brew/app.py
-Scanned: 2016-10-20 08:49:36.960780
-No vulnerabilities found.
-
-
-dan-v/crossfitboxreview
-https://github.com/dan-v/crossfitboxreview
-Entry file: crossfitboxreview/seed_affiliates.py
-Scanned: 2016-10-20 08:49:37.640637
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DoctorMalboro/leandropoblet.com
-https://github.com/DoctorMalboro/leandropoblet.com
-Entry file: None
-Scanned: 2016-10-20 08:49:38.140652
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ryanrdetzel/blimp-commit
-https://github.com/ryanrdetzel/blimp-commit
-Entry file: blimp-commit/blimp_commit.py
-Scanned: 2016-10-20 08:49:41.409666
-No vulnerabilities found.
-
-
-danielholmstrom/flask-alchemyview
-https://github.com/danielholmstrom/flask-alchemyview
-Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
-Scanned: 2016-10-20 08:49:50.421483
-Vulnerability 1:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 150, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:get',id=model_id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 150, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:get',id=model_id))
-
-Vulnerability 2:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 154, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:get',id='a string'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 154, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:get',id='a string'))
-
-Vulnerability 3:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 181, trigger word "get(":
- m = self.session.query(SimpleModel).get(model_id)
-Reassigned in:
- File: flask-alchemyview/tests/test_view.py
- > Line 174: m = SimpleModel('name')
- File: flask-alchemyview/tests/test_view.py
- > Line 177: model_id = m.id
-File: flask-alchemyview/tests/test_view.py
- > reaches line 178, trigger word "url_for(":
- response = self.json_put(url_for('SimpleModelView:put',id=model_id), 'name''new name')
-
-Vulnerability 4:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 197, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:delete',id=model_id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 197, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:delete',id=model_id))
-
-Vulnerability 5:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 209, trigger word "get(":
- m = self.session.query(SimpleModel).get(model_id)
-Reassigned in:
- File: flask-alchemyview/tests/test_view.py
- > Line 202: m = SimpleModel('name')
- File: flask-alchemyview/tests/test_view.py
- > Line 205: model_id = m.id
-File: flask-alchemyview/tests/test_view.py
- > reaches line 206, trigger word "url_for(":
- response = self.json_delete(url_for('SimpleModelView:put',id=model_id))
-
-Vulnerability 6:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 236, trigger word "get(":
- response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 236, trigger word "url_for(":
- response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10))
-
-Vulnerability 7:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 246, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 246, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-
-Vulnerability 8:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 251, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id='a string'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 251, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id='a string'))
-
-Vulnerability 9:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 258, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 258, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid'))
-
-Vulnerability 10:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 266, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:index'))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 266, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:index'))
-
-Vulnerability 11:
-File: flask-alchemyview/tests/test_view.py
- > User input at line 279, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-File: flask-alchemyview/tests/test_view.py
- > reaches line 279, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=m.id))
-
-Vulnerability 12:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > reaches line 56, trigger word "url_for(":
- response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False)
-
-Vulnerability 13:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py
- > reaches line 67, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-
-Vulnerability 14:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > reaches line 56, trigger word "url_for(":
- response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False)
-
-Vulnerability 15:
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > User input at line 67, trigger word "get(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py
- > reaches line 67, trigger word "url_for(":
- response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json')
-
-
-
-vovantics/flask-bluebone
-https://github.com/vovantics/flask-bluebone
-Entry file: flask-bluebone/app/app.py
-Scanned: 2016-10-20 08:49:50.976247
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-jpscaletti/authcode
-https://github.com/jpscaletti/authcode
-Entry file: authcode/examples/default/app.py
-Scanned: 2016-10-20 08:49:56.675841
-No vulnerabilities found.
-
-
-abulte/flask-arduino-websocket-sqlite
-https://github.com/abulte/flask-arduino-websocket-sqlite
-Entry file: flask-arduino-websocket-sqlite/app.py
-Scanned: 2016-10-20 08:49:58.069765
-No vulnerabilities found.
-
-
-futuregrid/flask_cm
-https://github.com/futuregrid/flask_cm
-Entry file: flask_cm/examples/forms/app.py
-Scanned: 2016-10-20 08:50:09.835073
-Vulnerability 1:
-File: flask_cm/examples/forms/app.py
- > User input at line 24, trigger word "get(":
- comments = session.get('comments', [])
-File: flask_cm/examples/forms/app.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form)
-
-
-
-mies/flask-heroku
-https://github.com/mies/flask-heroku
-Entry file: flask-heroku/main.py
-Scanned: 2016-10-20 08:50:12.128815
-No vulnerabilities found.
-
-
-mozillazg/flask-demo
-https://github.com/mozillazg/flask-demo
-Entry file: None
-Scanned: 2016-10-20 08:50:12.631626
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo.
-
-toastercup/flask-social
-https://github.com/toastercup/flask-social
-Entry file: flask-social/app.py
-Scanned: 2016-10-20 08:50:13.127639
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoest/flask-bardienst
-https://github.com/hoest/flask-bardienst
-Entry file: flask-bardienst/bardienst/__init__.py
-Scanned: 2016-10-20 08:50:16.387546
-No vulnerabilities found.
-
-
-danillosouza/flask-boilerplate
-https://github.com/danillosouza/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 08:50:16.885384
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danillosouza/flask-boilerplate.
-
-dogrdon/flask-map
-https://github.com/dogrdon/flask-map
-Entry file: None
-Scanned: 2016-10-20 08:50:17.409474
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sapid/Flask-Community
-https://github.com/sapid/Flask-Community
-Entry file: None
-Scanned: 2016-10-20 08:50:17.918542
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community.
-
-jaseemkp/flask-students-app
-https://github.com/jaseemkp/flask-students-app
-Entry file: flask-students-app/students.py
-Scanned: 2016-10-20 08:50:20.905155
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-minhtuev/flask-google-map-example
-https://github.com/minhtuev/flask-google-map-example
-Entry file: flask-google-map-example/server.py
-Scanned: 2016-10-20 08:50:22.209332
-No vulnerabilities found.
-
-
-garbados/flask-the-gauntlet
-https://github.com/garbados/flask-the-gauntlet
-Entry file: flask-the-gauntlet/app.py
-Scanned: 2016-10-20 08:50:28.007021
-No vulnerabilities found.
-
-
-NoxDineen/microblog
-https://github.com/NoxDineen/microblog
-Entry file: None
-Scanned: 2016-10-20 08:50:28.506145
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kaibin/Condom_Data_Server
-https://github.com/Kaibin/Condom_Data_Server
-Entry file: Condom_Data_Server/app.py
-Scanned: 2016-10-20 08:50:30.033560
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nathanrosspowell/frozenboots
-https://github.com/nathanrosspowell/frozenboots
-Entry file: None
-Scanned: 2016-10-20 08:50:33.032355
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nathanrosspowell/frozenboots.
-
-craneon/debutante
-https://github.com/craneon/debutante
-Entry file: debutante/app.py
-Scanned: 2016-10-20 08:50:38.563463
-Vulnerability 1:
-File: debutante/app.py
- > User input at line 14, trigger word "form[":
- name1 = request.form['name1']
-File: debutante/app.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age))
-
-Vulnerability 2:
-File: debutante/app.py
- > User input at line 15, trigger word "form[":
- name2 = request.form['name2']
-File: debutante/app.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age))
-
-Vulnerability 3:
-File: debutante/app.py
- > User input at line 16, trigger word "form[":
- age = request.form['age']
-File: debutante/app.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age))
-
-
-
-kljensen/async-flask-sqlalchemy-example
-https://github.com/kljensen/async-flask-sqlalchemy-example
-Entry file: async-flask-sqlalchemy-example/server.py
-Scanned: 2016-10-20 08:50:40.754991
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kommmy/Flask
-https://github.com/kommmy/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 08:50:42.273357
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rbika/flaskm
-https://github.com/rbika/flaskm
-Entry file: flaskm/flaskm.py
-Scanned: 2016-10-20 08:50:52.738317
-No vulnerabilities found.
-
-
-catfive/flaskr
-https://github.com/catfive/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:50:53.248788
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mikedll/flasksqlitedemo
-https://github.com/mikedll/flasksqlitedemo
-Entry file: flasksqlitedemo/app.py
-Scanned: 2016-10-20 08:50:53.762549
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GerardoGR/flask-boilerplate
-https://github.com/GerardoGR/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 08:50:57.278466
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/GerardoGR/flask-boilerplate.
-
-edouardswiac/linkstash-flask
-https://github.com/edouardswiac/linkstash-flask
-Entry file: linkstash-flask/app.py
-Scanned: 2016-10-20 08:51:01.789354
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mies/flask-heroku
-https://github.com/mies/flask-heroku
-Entry file: flask-heroku/main.py
-Scanned: 2016-10-20 08:51:07.098615
-No vulnerabilities found.
-
-
-mattolsen1/flask_tumblelog
-https://github.com/mattolsen1/flask_tumblelog
-Entry file: flask_tumblelog/tumblelog/__init__.py
-Scanned: 2016-10-20 08:51:11.582373
-No vulnerabilities found.
-
-
-hoest/flask-bardienst
-https://github.com/hoest/flask-bardienst
-Entry file: flask-bardienst/bardienst/__init__.py
-Scanned: 2016-10-20 08:51:12.845235
-No vulnerabilities found.
-
-
-eudaimonious/HangmanWebsite
-https://github.com/eudaimonious/HangmanWebsite
-Entry file: HangmanWebsite/application_hangman.py
-Scanned: 2016-10-20 08:51:13.991638
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bracken1983/flaskBlogDemo
-https://github.com/bracken1983/flaskBlogDemo
-Entry file: flaskBlogDemo/flask-sqlalchemy-test.py
-Scanned: 2016-10-20 08:51:14.602329
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jaseemkp/flask-students-app
-https://github.com/jaseemkp/flask-students-app
-Entry file: flask-students-app/students.py
-Scanned: 2016-10-20 08:51:16.101517
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pinchsoft/flask-newrelic-dotcloud
-https://github.com/pinchsoft/flask-newrelic-dotcloud
-Entry file: flask-newrelic-dotcloud/app.py
-Scanned: 2016-10-20 08:51:18.365101
-No vulnerabilities found.
-
-
-PurplePilot/zanzeeba
-https://github.com/PurplePilot/zanzeeba
-Entry file: zanzeeba/appstd.py
-Scanned: 2016-10-20 08:51:18.959152
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hit9/flask-sign-in-with-github.py
-https://github.com/hit9/flask-sign-in-with-github.py
-Entry file: None
-Scanned: 2016-10-20 08:51:19.460709
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bscarlett/personal-site
-https://github.com/bscarlett/personal-site
-Entry file: personal-site/PersonalSite/__init__.py
-Scanned: 2016-10-20 08:51:22.721865
-No vulnerabilities found.
-
-
-cypx/trocr
-https://github.com/cypx/trocr
-Entry file: trocr/trocr.py
-Scanned: 2016-10-20 08:51:23.731086
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ungarst/p4p_svr
-https://github.com/ungarst/p4p_svr
-Entry file: p4p_svr/server/__init__.py
-Scanned: 2016-10-20 08:51:27.258907
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-koordinates/py-pubtkt
-https://github.com/koordinates/py-pubtkt
-Entry file: py-pubtkt/app.py
-Scanned: 2016-10-20 08:51:28.751464
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jawr/flask-contact
-https://github.com/jawr/flask-contact
-Entry file: flask-contact/main.py
-Scanned: 2016-10-20 08:51:33.392285
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wbolster/flask-uuid
-https://github.com/wbolster/flask-uuid
-Entry file: flask-uuid/test_flask_uuid.py
-Scanned: 2016-10-20 08:51:38.816627
-No vulnerabilities found.
-
-
-pyr/url-shortener
-https://github.com/pyr/url-shortener
-Entry file: url-shortener/url_shortener.py
-Scanned: 2016-10-20 08:51:39.340815
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vmi356/filemanager
-https://github.com/vmi356/filemanager
-Entry file: filemanager/manager.py
-Scanned: 2016-10-20 08:51:40.882414
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stef/tlsauth
-https://github.com/stef/tlsauth
-Entry file: tlsauth/flask-demo/webapp.py
-Scanned: 2016-10-20 08:51:50.375362
-No vulnerabilities found.
-
-
-cratejoy/flask-experiment
-https://github.com/cratejoy/flask-experiment
-Entry file: flask-experiment/test/test.py
-Scanned: 2016-10-20 08:51:51.887404
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-openfree/flaskr
-https://github.com/openfree/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:51:53.391917
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulthrissur/Flask_app
-https://github.com/rahulthrissur/Flask_app
-Entry file: Flask_app/test.py
-Scanned: 2016-10-20 08:51:57.394468
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jcerise/flask-photos
-https://github.com/jcerise/flask-photos
-Entry file: flask-photos/app.py
-Scanned: 2016-10-20 08:52:02.696926
-No vulnerabilities found.
-
-
-grimkeke/miniblog
-https://github.com/grimkeke/miniblog
-Entry file: miniblog/app/__init__.py
-Scanned: 2016-10-20 08:52:12.499359
-No vulnerabilities found.
-
-
-rasheedh/Paint-Using-Flask---Mongodb-
-https://github.com/rasheedh/Paint-Using-Flask---Mongodb-
-Entry file: None
-Scanned: 2016-10-20 08:52:13.515585
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-.
-
-Pitxon/sivir
-https://github.com/Pitxon/sivir
-Entry file: sivir/app.py
-Scanned: 2016-10-20 08:52:14.760628
-No vulnerabilities found.
-
-
-sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB
-https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB
-Entry file: None
-Scanned: 2016-10-20 08:52:15.274761
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB.
-
-ssidorenko/twisker
-https://github.com/ssidorenko/twisker
-Entry file: twisker/flask/sessions.py
-Scanned: 2016-10-20 08:52:16.822052
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Gabriele91/rss-soap-server
-https://github.com/Gabriele91/rss-soap-server
-Entry file: rss-soap-server/app.py
-Scanned: 2016-10-20 08:52:24.669525
-No vulnerabilities found.
-
-
-einashaddad/follow_app
-https://github.com/einashaddad/follow_app
-Entry file: follow_app/web_button.py
-Scanned: 2016-10-20 08:52:25.185931
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cypx/trocr
-https://github.com/cypx/trocr
-Entry file: trocr/trocr.py
-Scanned: 2016-10-20 08:52:25.679682
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-haizaar/microtweet
-https://github.com/haizaar/microtweet
-Entry file: microtweet/server.py
-Scanned: 2016-10-20 08:52:26.198686
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jawr/flask-contact
-https://github.com/jawr/flask-contact
-Entry file: flask-contact/main.py
-Scanned: 2016-10-20 08:52:27.524275
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulkmr/flask-bigapp-template
-https://github.com/rahulkmr/flask-bigapp-template
-Entry file: flask-bigapp-template/main.py
-Scanned: 2016-10-20 08:52:28.053345
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stef/flask-tlsauth
-https://github.com/stef/flask-tlsauth
-Entry file: flask-tlsauth/demo/webapp.py
-Scanned: 2016-10-20 08:52:29.385416
-No vulnerabilities found.
-
-
-kennethreitz/elephant
-https://github.com/kennethreitz/elephant
-Entry file: elephant/elephant.py
-Scanned: 2016-10-20 08:52:29.983517
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stef/tlsauth
-https://github.com/stef/tlsauth
-Entry file: tlsauth/flask-demo/webapp.py
-Scanned: 2016-10-20 08:52:32.960884
-No vulnerabilities found.
-
-
-topherjaynes/flasktut
-https://github.com/topherjaynes/flasktut
-Entry file: flasktut/app/__init__.py
-Scanned: 2016-10-20 08:52:35.081531
-No vulnerabilities found.
-
-
-elboby/flask-config-override
-https://github.com/elboby/flask-config-override
-Entry file: flask-config-override/tests/basic_flask_test.py
-Scanned: 2016-10-20 08:52:38.595072
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sherzberg/flask-native-package
-https://github.com/sherzberg/flask-native-package
-Entry file: flask-native-package/application.py
-Scanned: 2016-10-20 08:52:40.912949
-No vulnerabilities found.
-
-
-McrCoderDojo/Flask-Webapps
-https://github.com/McrCoderDojo/Flask-Webapps
-Entry file: Flask-Webapps/flask1.py
-Scanned: 2016-10-20 08:52:42.217861
-No vulnerabilities found.
-
-
-xrefor/flask_tut
-https://github.com/xrefor/flask_tut
-Entry file: flask_tut/flaskr.py
-Scanned: 2016-10-20 08:52:43.493034
-No vulnerabilities found.
-
-
-xrefor/flask_stuff
-https://github.com/xrefor/flask_stuff
-Entry file: flask_stuff/main.py
-Scanned: 2016-10-20 08:52:44.771262
-No vulnerabilities found.
-
-
-akbarovs/flask-sandbox
-https://github.com/akbarovs/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-20 08:52:50.294725
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adesst/flask-blog
-https://github.com/adesst/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 08:52:52.840742
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-gourneau/anode
-https://github.com/gourneau/anode
-Entry file: anode/app.py
-Scanned: 2016-10-20 08:52:58.335735
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mmahnken/Flask_to_do_list
-https://github.com/mmahnken/Flask_to_do_list
-Entry file: Flask_to_do_list/tipsy.py
-Scanned: 2016-10-20 08:53:02.860857
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Paintapp-Javascript-Canvas-Flask
-https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask
-Entry file: Paintapp-Javascript-Canvas-Flask/test.py
-Scanned: 2016-10-20 08:53:08.161732
-Vulnerability 1:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 34, trigger word "form[":
- imgname = request.form['imagename']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 16: imgname = (imagename)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 23: imgname = row[0]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 19, trigger word "execute(":
- cur.execute('SELECT * FROM Image WHERE imgname=?', imgname)
-
-Vulnerability 2:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 35, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 24: imgdata = row[1]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata)
-
-Vulnerability 3:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 34, trigger word "form[":
- imgname = request.form['imagename']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 16: imgname = (imagename)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 23: imgname = row[0]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 42, trigger word "execute(":
- cur.execute('INSERT INTO Image VALUES(?, ?)', data)
-
-Vulnerability 4:
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > User input at line 35, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 24: imgdata = row[1]
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 37: data = (imgname, imgdata)
- File: Paintapp-Javascript-Canvas-Flask/test.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask/test.py
- > reaches line 42, trigger word "execute(":
- cur.execute('INSERT INTO Image VALUES(?, ?)', data)
-
-
-
-godber/flask-mobile-switch
-https://github.com/godber/flask-mobile-switch
-Entry file: flask-mobile-switch/missionops/missionops/__init__.py
-Scanned: 2016-10-20 08:53:12.767148
-Vulnerability 1:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 29, trigger word "form[":
- title = config_form['title']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 33: config_title.value = title
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 43: title = title.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 45: title = 'Mission Ops'
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 41, trigger word "filter(":
- title = Config.query.filter(Config.key == 'title').first()
-
-Vulnerability 2:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 30, trigger word "form[":
- image_url = config_form['url']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 37: config_url.value = image_url
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 49: image_url = image_url.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 51: image_url = '../static/Mars.jpg'
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 52: ysize = image_size(image_url)
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 24: ysize = 0
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 47, trigger word "filter(":
- image_url = Config.query.filter(Config.key == 'url').first()
-
-Vulnerability 3:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 29, trigger word "form[":
- title = config_form['title']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 33: config_title.value = title
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 43: title = title.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 45: title = 'Mission Ops'
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize)
-
-Vulnerability 4:
-File: flask-mobile-switch/missionops/missionops/views.py
- > User input at line 30, trigger word "form[":
- image_url = config_form['url']
-Reassigned in:
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 37: config_url.value = image_url
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 49: image_url = image_url.value
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 51: image_url = '../static/Mars.jpg'
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 52: ysize = image_size(image_url)
- File: flask-mobile-switch/missionops/missionops/views.py
- > Line 24: ysize = 0
-File: flask-mobile-switch/missionops/missionops/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize)
-
-
-
-naveenpremchand02/paintapp-using-Flask
-https://github.com/naveenpremchand02/paintapp-using-Flask
-Entry file: None
-Scanned: 2016-10-20 08:53:13.286974
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/naveenpremchand02/paintapp-using-Flask.
-
-orkunozbek/deploy_test
-https://github.com/orkunozbek/deploy_test
-Entry file: deploy_test/app_pack/__init__.py
-Scanned: 2016-10-20 08:53:14.548741
-No vulnerabilities found.
-
-
-y2bishop2y/microengine
-https://github.com/y2bishop2y/microengine
-Entry file: microengine/lib/flask_sqlalchemy.py
-Scanned: 2016-10-20 08:53:15.199897
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
-Scanned: 2016-10-20 08:53:18.030744
-Vulnerability 1:
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > User input at line 34, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 22: imgdata = row['imgdata']
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > reaches line 24, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata)
-
-
-
-popeliao/FlavorPlusServer
-https://github.com/popeliao/FlavorPlusServer
-Entry file: FlavorPlusServer/app.py
-Scanned: 2016-10-20 08:53:18.578768
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tatertot/tipsy
-https://github.com/tatertot/tipsy
-Entry file: tipsy/tipsy.py
-Scanned: 2016-10-20 08:53:26.100284
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ssidorenko/twisker
-https://github.com/ssidorenko/twisker
-Entry file: twisker/flask/sessions.py
-Scanned: 2016-10-20 08:53:26.621436
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-einashaddad/follow_app
-https://github.com/einashaddad/follow_app
-Entry file: follow_app/web_button.py
-Scanned: 2016-10-20 08:53:27.122551
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joepetrini/dayuntil
-https://github.com/joepetrini/dayuntil
-Entry file: dayuntil/app/__init__.py
-Scanned: 2016-10-20 08:53:27.638950
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-soniacs/mockup-boot
-https://github.com/soniacs/mockup-boot
-Entry file: mockup-boot/build.py
-Scanned: 2016-10-20 08:53:29.065044
-Vulnerability 1:
-File: mockup-boot/build.py
- > User input at line 33, trigger word "get(":
- template = page.meta.get('template', 'page.html')
-File: mockup-boot/build.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,page=page)
-
-
-
-Liquix/microblog
-https://github.com/Liquix/microblog
-Entry file: None
-Scanned: 2016-10-20 08:53:29.631479
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mvader/Quickflask
-https://github.com/mvader/Quickflask
-Entry file: Quickflask/quickflask/app.py
-Scanned: 2016-10-20 08:53:31.751591
-No vulnerabilities found.
-
-
-dnet/wsfacade
-https://github.com/dnet/wsfacade
-Entry file: wsfacade/wsfacade.py
-Scanned: 2016-10-20 08:53:32.277375
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kylemarsh/recipelister
-https://github.com/kylemarsh/recipelister
-Entry file: recipelister/recipelister/__init__.py
-Scanned: 2016-10-20 08:53:32.791224
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-croach/cheap-and-scalable-websites-code
-https://github.com/croach/cheap-and-scalable-websites-code
-Entry file: cheap-and-scalable-websites-code/generator.py
-Scanned: 2016-10-20 08:53:33.299286
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jimpurbrick/hackinabox
-https://github.com/jimpurbrick/hackinabox
-Entry file: hackinabox/app.py
-Scanned: 2016-10-20 08:53:34.611506
-No vulnerabilities found.
-
-
-thegeekchick/converter
-https://github.com/thegeekchick/converter
-Entry file: None
-Scanned: 2016-10-20 08:53:39.153301
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-angstwad/linky
-https://github.com/angstwad/linky
-Entry file: linky/linky/__init__.py
-Scanned: 2016-10-20 08:53:43.555399
-No vulnerabilities found.
-
-
-pysgf/GeoPhotoPy
-https://github.com/pysgf/GeoPhotoPy
-Entry file: GeoPhotoPy/GeoPhotoPy/__init__.py
-Scanned: 2016-10-20 08:53:58.961338
-No vulnerabilities found.
-
-
-GradySimon/RoommateDishes
-https://github.com/GradySimon/RoommateDishes
-Entry file: RoommateDishes/dishes.py
-Scanned: 2016-10-20 08:54:00.273028
-No vulnerabilities found.
-
-
-the-gigi/cloud_state
-https://github.com/the-gigi/cloud_state
-Entry file: cloud_state/CloudState.py
-Scanned: 2016-10-20 08:54:01.766052
-No vulnerabilities found.
-
-
-xiyoulaoyuanjia/flaskapp
-https://github.com/xiyoulaoyuanjia/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:54:03.160234
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiyoulaoyuanjia/flaskapp.
-
-trustrachel/Flask-FeatureFlags
-https://github.com/trustrachel/Flask-FeatureFlags
-Entry file: Flask-FeatureFlags/tests/fixtures.py
-Scanned: 2016-10-20 08:54:05.081983
-Vulnerability 1:
-File: Flask-FeatureFlags/tests/test_core_function.py
- > User input at line 55, trigger word "get(":
- response = self.test_client.get(url)
-File: Flask-FeatureFlags/tests/test_core_function.py
- > reaches line 57, trigger word "url_for(":
- response.location == url_for('redirect_destination',_external=True)
-
-Vulnerability 2:
-File: Flask-FeatureFlags/tests/test_core_function.py
- > User input at line 66, trigger word "get(":
- response = self.test_client.get(url)
-File: Flask-FeatureFlags/tests/test_core_function.py
- > reaches line 68, trigger word "url_for(":
- response.location == url_for('redirect_destination',_external=True)
-
-
-
-aahluwal/flask
-https://github.com/aahluwal/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 08:54:05.662241
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-kennethreitz/elephant
-https://github.com/kennethreitz/elephant
-Entry file: elephant/elephant.py
-Scanned: 2016-10-20 08:54:06.157572
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-clef/sample-flask
-https://github.com/clef/sample-flask
-Entry file: sample-flask/app.py
-Scanned: 2016-10-20 08:54:07.539084
-No vulnerabilities found.
-
-
-simonvc/rover-wasd-server
-https://github.com/simonvc/rover-wasd-server
-Entry file: rover-wasd-server/wasd_server.py
-Scanned: 2016-10-20 08:54:15.590159
-No vulnerabilities found.
-
-
-jonascj/flaskr
-https://github.com/jonascj/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:54:16.088673
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thinboy92/flasktuts
-https://github.com/thinboy92/flasktuts
-Entry file: flasktuts/app/__init__.py
-Scanned: 2016-10-20 08:54:17.653688
-No vulnerabilities found.
-
-
-guilhermecomum/FlaskTutorial
-https://github.com/guilhermecomum/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 08:54:18.171668
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-landakram/squeak
-https://github.com/landakram/squeak
-Entry file: squeak/app.py
-Scanned: 2016-10-20 08:54:20.247472
-Vulnerability 1:
-File: squeak/app.py
- > User input at line 73, trigger word "form[":
- search_term = request.form['term']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 2:
-File: squeak/app.py
- > User input at line 74, trigger word "form[":
- location = request.form['location']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 3:
-File: squeak/app.py
- > User input at line 83, trigger word "get(":
- response = requests.get(signed_url)
-Reassigned in:
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-
-
-xjdrew/flask-demo
-https://github.com/xjdrew/flask-demo
-Entry file: None
-Scanned: 2016-10-20 08:54:20.783937
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xjdrew/flask-demo.
-
-aerialdomo/flask_microblog
-https://github.com/aerialdomo/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 08:54:26.310795
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-akbarovs/flask-sandbox
-https://github.com/akbarovs/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-20 08:54:26.813660
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jinzhangg/flask-helloworld
-https://github.com/jinzhangg/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-20 08:54:28.616634
-No vulnerabilities found.
-
-
-hardez/Flask-Skeleton
-https://github.com/hardez/Flask-Skeleton
-Entry file: None
-Scanned: 2016-10-20 08:54:29.640339
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hardez/Flask-Skeleton.
-
-stfy86/pruebitasFlask
-https://github.com/stfy86/pruebitasFlask
-Entry file: pruebitasFlask/practica4/src/app/__init__.py
-Scanned: 2016-10-20 08:54:32.022348
-No vulnerabilities found.
-
-
-kracekumar/test-flask
-https://github.com/kracekumar/test-flask
-Entry file: test-flask/app.py
-Scanned: 2016-10-20 08:54:33.895678
-No vulnerabilities found.
-
-
-charliecrissman/microblog
-https://github.com/charliecrissman/microblog
-Entry file: None
-Scanned: 2016-10-20 08:54:34.401273
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-abulte/Flask-Bootstrap-Fanstatic
-https://github.com/abulte/Flask-Bootstrap-Fanstatic
-Entry file: Flask-Bootstrap-Fanstatic/application/__init__.py
-Scanned: 2016-10-20 08:54:35.600917
-No vulnerabilities found.
-
-
-jennyferpinto/Flask_Part_1
-https://github.com/jennyferpinto/Flask_Part_1
-Entry file: Flask_Part_1/tipsy.py
-Scanned: 2016-10-20 08:54:36.129343
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elboby/flask-test-template
-https://github.com/elboby/flask-test-template
-Entry file: None
-Scanned: 2016-10-20 08:54:44.613519
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template.
-
-isms/flask-phonebank-dashboard
-https://github.com/isms/flask-phonebank-dashboard
-Entry file: flask-phonebank-dashboard/app.py
-Scanned: 2016-10-20 08:55:00.134754
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-jpanganiban/flask-heroku-kickstart
-https://github.com/jpanganiban/flask-heroku-kickstart
-Entry file: None
-Scanned: 2016-10-20 08:55:01.638095
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jpanganiban/flask-heroku-kickstart.
-
-justinxreese/ajax-calculator-flask
-https://github.com/justinxreese/ajax-calculator-flask
-Entry file: None
-Scanned: 2016-10-20 08:55:03.150078
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chrismeono1022/movie-ratings
-https://github.com/chrismeono1022/movie-ratings
-Entry file: movie-ratings/judgement.py
-Scanned: 2016-10-20 08:55:03.681342
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-soniacs/cabinet
-https://github.com/soniacs/cabinet
-Entry file: cabinet/app/__init__.py
-Scanned: 2016-10-20 08:55:05.361288
-Vulnerability 1:
-File: cabinet/app/views/clients.py
- > User input at line 18, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: cabinet/app/views/clients.py
- > reaches line 21, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('clients/view.html',title=client.name, client=client, projects=projects, invoices=invoices)
-
-Vulnerability 2:
-File: cabinet/app/views/clients.py
- > User input at line 33, trigger word "form[":
- client = Client(name=request.form['name'], company=request.form['company'], website=request.form['website'], twitter=request.form['twitter'], email=request.form['email'], telephone=request.form['telephone'], skype=request.form['skype'], street=request.form['street'], street_2=request.form['street_2'], city=request.form['city'], state=request.form['state'], postcode=request.form['postcode'], country=request.form['country'], notes=request.form['notes'])
-File: cabinet/app/views/clients.py
- > reaches line 50, trigger word "flash(":
- flash('Client '%s' was added.' % client.name)
-
-Vulnerability 3:
-File: cabinet/app/views/clients.py
- > User input at line 60, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 78, trigger word "flash(":
- flash('Client '%s' has been updated.' % client.name)
-
-Vulnerability 4:
-File: cabinet/app/views/clients.py
- > User input at line 60, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('clients/edit.html',title='Edit %s' % client.name, client=client)
-
-Vulnerability 5:
-File: cabinet/app/views/clients.py
- > User input at line 89, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 93, trigger word "flash(":
- flash('Client '%s' has been deleted.' % client.name)
-
-Vulnerability 6:
-File: cabinet/app/views/clients.py
- > User input at line 89, trigger word "get(":
- client = Client.query.get(client_id)
-Reassigned in:
- File: cabinet/app/views/clients.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/clients.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients'))
-File: cabinet/app/views/clients.py
- > reaches line 95, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('clients/delete.html',title='Delete %s' % client.name, client=client)
-
-Vulnerability 7:
-File: cabinet/app/views/invoices.py
- > User input at line 18, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: cabinet/app/views/invoices.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('invoices/view.html',title=invoice.name, invoice=invoice)
-
-Vulnerability 8:
-File: cabinet/app/views/invoices.py
- > User input at line 31, trigger word "get(":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 9:
-File: cabinet/app/views/invoices.py
- > User input at line 31, trigger word "form[":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 10:
-File: cabinet/app/views/invoices.py
- > User input at line 32, trigger word "get(":
- project = Project.query.get(request.form['project'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 11:
-File: cabinet/app/views/invoices.py
- > User input at line 32, trigger word "form[":
- project = Project.query.get(request.form['project'])
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 12:
-File: cabinet/app/views/invoices.py
- > User input at line 33, trigger word "form[":
- invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project)
-File: cabinet/app/views/invoices.py
- > reaches line 47, trigger word "flash(":
- flash('Invoice '%s' was added.' % invoice.name)
-
-Vulnerability 13:
-File: cabinet/app/views/invoices.py
- > User input at line 59, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 78, trigger word "flash(":
- flash('Invoice '%s' has been updated.' % invoice.name)
-
-Vulnerability 14:
-File: cabinet/app/views/invoices.py
- > User input at line 59, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('invoices/edit.html',title='Edit Invoice %s' % invoice.name, invoice=invoice, clients=clients, projects=projects)
-
-Vulnerability 15:
-File: cabinet/app/views/invoices.py
- > User input at line 91, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 95, trigger word "flash(":
- flash('Invoice '%s' has been deleted.' % invoice.name)
-
-Vulnerability 16:
-File: cabinet/app/views/invoices.py
- > User input at line 91, trigger word "get(":
- invoice = Invoice.query.get(invoice_id)
-Reassigned in:
- File: cabinet/app/views/invoices.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/invoices.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices'))
-File: cabinet/app/views/invoices.py
- > reaches line 97, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('invoices/delete.html',title='Delete Invoice %s' % invoice.name, invoice=invoice)
-
-Vulnerability 17:
-File: cabinet/app/views/projects.py
- > User input at line 18, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: cabinet/app/views/projects.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('projects/view.html',title=project.name, project=project)
-
-Vulnerability 18:
-File: cabinet/app/views/projects.py
- > User input at line 30, trigger word "get(":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client)
-File: cabinet/app/views/projects.py
- > reaches line 43, trigger word "flash(":
- flash('Project '%s' was added.' % project.name)
-
-Vulnerability 19:
-File: cabinet/app/views/projects.py
- > User input at line 30, trigger word "form[":
- client = Client.query.get(request.form['client'])
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client)
-File: cabinet/app/views/projects.py
- > reaches line 43, trigger word "flash(":
- flash('Project '%s' was added.' % project.name)
-
-Vulnerability 20:
-File: cabinet/app/views/projects.py
- > User input at line 31, trigger word "form[":
- project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client)
-File: cabinet/app/views/projects.py
- > reaches line 43, trigger word "flash(":
- flash('Project '%s' was added.' % project.name)
-
-Vulnerability 21:
-File: cabinet/app/views/projects.py
- > User input at line 54, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 69, trigger word "flash(":
- flash('Project '%s' has been updated.' % project.name)
-
-Vulnerability 22:
-File: cabinet/app/views/projects.py
- > User input at line 54, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('projects/edit.html',title='Edit %s' % project.name, project=project, clients=clients)
-
-Vulnerability 23:
-File: cabinet/app/views/projects.py
- > User input at line 81, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 85, trigger word "flash(":
- flash('Project '%s' has been deleted.' % project.name)
-
-Vulnerability 24:
-File: cabinet/app/views/projects.py
- > User input at line 81, trigger word "get(":
- project = Project.query.get(project_id)
-Reassigned in:
- File: cabinet/app/views/projects.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: cabinet/app/views/projects.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects'))
-File: cabinet/app/views/projects.py
- > reaches line 87, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('projects/delete.html',title='Delete %s' % project.name, project=project)
-
-
-
-MattStockton/manpage
-https://github.com/MattStockton/manpage
-Entry file: manpage/app.py
-Scanned: 2016-10-20 08:55:05.903907
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-qzio/tododis
-https://github.com/qzio/tododis
-Entry file: tododis/app.py
-Scanned: 2016-10-20 08:55:06.439779
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ternup/caddisfly-heroku
-https://github.com/ternup/caddisfly-heroku
-Entry file: caddisfly-heroku/app.py
-Scanned: 2016-10-20 08:55:06.953730
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB
-Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
-Scanned: 2016-10-20 08:55:13.663557
-Vulnerability 1:
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > User input at line 34, trigger word "form[":
- imgdata = request.form['string']
-Reassigned in:
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 22: imgdata = row['imgdata']
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = resp
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html')
- File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = resp
-File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py
- > reaches line 24, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata)
-
-
-
-mmahnken/Flask-To-Do-List-with-updates-
-https://github.com/mmahnken/Flask-To-Do-List-with-updates-
-Entry file: Flask-To-Do-List-with-updates-/tipsy.py
-Scanned: 2016-10-20 08:55:17.056541
-No vulnerabilities found.
-
-
-samgclarke/sms_sender
-https://github.com/samgclarke/sms_sender
-Entry file: sms_sender/application.py
-Scanned: 2016-10-20 08:55:18.285943
-No vulnerabilities found.
-
-
-Liquix/microblog
-https://github.com/Liquix/microblog
-Entry file: None
-Scanned: 2016-10-20 08:55:18.790556
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-deegill/tipsytasklist
-https://github.com/deegill/tipsytasklist
-Entry file: tipsytasklist/tipsy.py
-Scanned: 2016-10-20 08:55:19.309993
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dnet/wsfacade
-https://github.com/dnet/wsfacade
-Entry file: wsfacade/wsfacade.py
-Scanned: 2016-10-20 08:55:19.805852
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mdjhny/OilPainter
-https://github.com/mdjhny/OilPainter
-Entry file: OilPainter/app/app.py
-Scanned: 2016-10-20 08:55:21.323042
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yeradis/sizing
-https://github.com/yeradis/sizing
-Entry file: sizing/sizing.py
-Scanned: 2016-10-20 08:55:26.831268
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattupstate/flask-social
-https://github.com/mattupstate/flask-social
-Entry file: flask-social/app.py
-Scanned: 2016-10-20 08:55:28.129491
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattupstate/flask-jsonschema
-https://github.com/mattupstate/flask-jsonschema
-Entry file: flask-jsonschema/tests.py
-Scanned: 2016-10-20 08:55:29.417148
-No vulnerabilities found.
-
-
-whtsky/Flask-WeRoBot
-https://github.com/whtsky/Flask-WeRoBot
-Entry file: Flask-WeRoBot/flask_werobot.py
-Scanned: 2016-10-20 08:55:31.087200
-No vulnerabilities found.
-
-
-OpenTechSchool/python-flask-code
-https://github.com/OpenTechSchool/python-flask-code
-Entry file: python-flask-code/core/files-templates/catseverywhere.py
-Scanned: 2016-10-20 08:55:32.341612
-No vulnerabilities found.
-
-
-rollbar/rollbar-flask-example
-https://github.com/rollbar/rollbar-flask-example
-Entry file: rollbar-flask-example/hello.py
-Scanned: 2016-10-20 08:55:32.866198
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lqez/flasky
-https://github.com/lqez/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 08:55:33.380101
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Jd007/flask-rest
-https://github.com/Jd007/flask-rest
-Entry file: flask-rest/haystack/core.py
-Scanned: 2016-10-20 08:55:34.879226
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-simonvc/rover-wasd-server
-https://github.com/simonvc/rover-wasd-server
-Entry file: rover-wasd-server/wasd_server.py
-Scanned: 2016-10-20 08:55:38.494605
-No vulnerabilities found.
-
-
-microamp/flaskel
-https://github.com/microamp/flaskel
-Entry file: flaskel/flaskel.py
-Scanned: 2016-10-20 08:55:40.493488
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-aerialdomo/flaskblog
-https://github.com/aerialdomo/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 08:55:42.037645
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-pinoytech/flaskapp
-https://github.com/pinoytech/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:55:45.534265
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pinoytech/flaskapp.
-
-aahluwal/flaskagain
-https://github.com/aahluwal/flaskagain
-Entry file: flaskagain/judgement.py
-Scanned: 2016-10-20 08:56:01.172275
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskagain/renv/lib/python2.7/genericpath.py
-
-landakram/squeak
-https://github.com/landakram/squeak
-Entry file: squeak/app.py
-Scanned: 2016-10-20 08:56:02.732380
-Vulnerability 1:
-File: squeak/app.py
- > User input at line 73, trigger word "form[":
- search_term = request.form['term']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 2:
-File: squeak/app.py
- > User input at line 74, trigger word "form[":
- location = request.form['location']
-Reassigned in:
- File: squeak/app.py
- > Line 76: data = 'term''location'search_termlocation
- File: squeak/app.py
- > Line 80: query_string = urllib.urlencode(data)
- File: squeak/app.py
- > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string)
- File: squeak/app.py
- > Line 82: signed_url = sign_url(https://github.com/api_url)
- File: squeak/app.py
- > Line 83: response = requests.get(signed_url)
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-Vulnerability 3:
-File: squeak/app.py
- > User input at line 83, trigger word "get(":
- response = requests.get(signed_url)
-Reassigned in:
- File: squeak/app.py
- > Line 84: json_response = json.loads(response.text)
-File: squeak/app.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses'])
-
-
-
-y2bishop2y/vagrant.flask
-https://github.com/y2bishop2y/vagrant.flask
-Entry file: None
-Scanned: 2016-10-20 08:56:03.251747
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-markchadwick/flask-empty
-https://github.com/markchadwick/flask-empty
-Entry file: flask-empty/main.py
-Scanned: 2016-10-20 08:56:04.458412
-No vulnerabilities found.
-
-
-Hardtack/Flask-Router
-https://github.com/Hardtack/Flask-Router
-Entry file: Flask-Router/flask_router/tests.py
-Scanned: 2016-10-20 08:56:07.233293
-No vulnerabilities found.
-
-
-mwmeyer/minimal-flask-socketserver
-https://github.com/mwmeyer/minimal-flask-socketserver
-Entry file: minimal-flask-socketserver/flash_socket.py
-Scanned: 2016-10-20 08:56:08.704892
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elboby/flask-test-template
-https://github.com/elboby/flask-test-template
-Entry file: None
-Scanned: 2016-10-20 08:56:13.197781
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template.
-
-ndrwdn/flat_flask_layout
-https://github.com/ndrwdn/flat_flask_layout
-Entry file: flat_flask_layout/sitebuilder.py
-Scanned: 2016-10-20 08:56:17.429548
-No vulnerabilities found.
-
-
-emi1337/movie_rater
-https://github.com/emi1337/movie_rater
-Entry file: movie_rater/judgement.py
-Scanned: 2016-10-20 08:56:18.186954
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chrismeono1022/movie-ratings
-https://github.com/chrismeono1022/movie-ratings
-Entry file: movie-ratings/judgement.py
-Scanned: 2016-10-20 08:56:19.682154
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ternup/caddisfly-heroku
-https://github.com/ternup/caddisfly-heroku
-Entry file: caddisfly-heroku/app.py
-Scanned: 2016-10-20 08:56:20.174558
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thrisp/flacro
-https://github.com/thrisp/flacro
-Entry file: flacro/tests/conftest.py
-Scanned: 2016-10-20 08:56:20.712271
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-aksiksi/aflam
-https://github.com/aksiksi/aflam
-Entry file: aflam/views.py
-Scanned: 2016-10-20 08:56:22.241070
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kjudd/ratings_app
-https://github.com/kjudd/ratings_app
-Entry file: ratings_app/judgement.py
-Scanned: 2016-10-20 08:56:27.859120
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: ratings_app/env/lib/python2.7/genericpath.py
-
-samgclarke/sms_sender
-https://github.com/samgclarke/sms_sender
-Entry file: sms_sender/application.py
-Scanned: 2016-10-20 08:56:29.106256
-No vulnerabilities found.
-
-
-Max00355/FileUpload
-https://github.com/Max00355/FileUpload
-Entry file: FileUpload/main.py
-Scanned: 2016-10-20 08:56:30.658463
-No vulnerabilities found.
-
-
-joel-briggs/microblog
-https://github.com/joel-briggs/microblog
-Entry file: None
-Scanned: 2016-10-20 08:56:31.219925
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gonewandering/TwitterLogin
-https://github.com/gonewandering/TwitterLogin
-Entry file: TwitterLogin/app.py
-Scanned: 2016-10-20 08:56:32.460938
-No vulnerabilities found.
-
-
-flebel/yt-redirector
-https://github.com/flebel/yt-redirector
-Entry file: yt-redirector/yt-redirector.py
-Scanned: 2016-10-20 08:56:33.784116
-Vulnerability 1:
-File: yt-redirector/yt-redirector.py
- > User input at line 17, trigger word "get(":
- video_id = requests.get(video_url).json()['items'][0]['id']['videoId']
-Reassigned in:
- File: yt-redirector/yt-redirector.py
- > Line 18: player_url = 'https://www.youtube.com/watch?v=%s' % (video_id)
-File: yt-redirector/yt-redirector.py
- > reaches line 19, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(player_url, 301)
-
-
-
-mattupstate/flask-jsonschema
-https://github.com/mattupstate/flask-jsonschema
-Entry file: flask-jsonschema/tests.py
-Scanned: 2016-10-20 08:56:36.338889
-No vulnerabilities found.
-
-
-mharrys/flask-blog
-https://github.com/mharrys/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 08:56:36.890216
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-kienpham2000/airbrake-flask
-https://github.com/kienpham2000/airbrake-flask
-Entry file: airbrake-flask/setup.py
-Scanned: 2016-10-20 08:56:39.390321
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-florapdx/My-Blog
-https://github.com/florapdx/My-Blog
-Entry file: My-Blog/sitebuilder.py
-Scanned: 2016-10-20 08:56:49.290262
-No vulnerabilities found.
-
-
-zeuxisoo/python-flask-social-oauth-facebook
-https://github.com/zeuxisoo/python-flask-social-oauth-facebook
-Entry file: None
-Scanned: 2016-10-20 08:56:49.801346
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeuxisoo/python-flask-social-oauth-facebook.
-
-lpolepeddi/sightings
-https://github.com/lpolepeddi/sightings
-Entry file: sightings/routes.py
-Scanned: 2016-10-20 08:57:12.309412
-No vulnerabilities found.
-
-
-sholsapp/flask-skeleton
-https://github.com/sholsapp/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 08:57:13.326720
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sholsapp/flask-skeleton.
-
-adatlabor/soa-demo
-https://github.com/adatlabor/soa-demo
-Entry file: soa-demo/service.py
-Scanned: 2016-10-20 08:57:14.679916
-No vulnerabilities found.
-
-
-speakingcode/pres-soa-flask-backbone
-https://github.com/speakingcode/pres-soa-flask-backbone
-Entry file: pres-soa-flask-backbone/notes.py
-Scanned: 2016-10-20 08:57:18.457273
-No vulnerabilities found.
-
-
-kirang89/flask-boiler
-https://github.com/kirang89/flask-boiler
-Entry file: None
-Scanned: 2016-10-20 08:57:18.964284
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-microamp/flaskel
-https://github.com/microamp/flaskel
-Entry file: flaskel/flaskel.py
-Scanned: 2016-10-20 08:57:19.979124
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-a2lin/flaskapp
-https://github.com/a2lin/flaskapp
-Entry file: None
-Scanned: 2016-10-20 08:57:20.508271
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/a2lin/flaskapp.
-
-MrFichter/flask1
-https://github.com/MrFichter/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 08:57:21.140160
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-Bob-Thomas/webshopFlask
-https://github.com/Bob-Thomas/webshopFlask
-Entry file: webshopFlask/webshop.py
-Scanned: 2016-10-20 08:57:21.728656
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-smdmustaffa/PythonFlask
-https://github.com/smdmustaffa/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 08:57:27.588163
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-bogavante/mitsuhiko-flask
-https://github.com/bogavante/mitsuhiko-flask
-Entry file: mitsuhiko-flask/setup.py
-Scanned: 2016-10-20 08:57:28.164945
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stephanienkram/Flask-Log-Tracker
-https://github.com/stephanienkram/Flask-Log-Tracker
-Entry file: Flask-Log-Tracker/main.py
-Scanned: 2016-10-20 08:57:29.820975
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dylanvee/flask-hello-world
-https://github.com/dylanvee/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 08:57:30.363988
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ndrwdn/flat_flask_layout
-https://github.com/ndrwdn/flat_flask_layout
-Entry file: flat_flask_layout/sitebuilder.py
-Scanned: 2016-10-20 08:57:31.851154
-No vulnerabilities found.
-
-
-akshar-raaj/flaks
-https://github.com/akshar-raaj/flaks
-Entry file: flaks/hello.py
-Scanned: 2016-10-20 08:57:33.150548
-No vulnerabilities found.
-
-
-ajith-herga/searchflask
-https://github.com/ajith-herga/searchflask
-Entry file: searchflask/new_world.py
-Scanned: 2016-10-20 08:57:33.694162
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-willmcmain/blag
-https://github.com/willmcmain/blag
-Entry file: blag/blag/__init__.py
-Scanned: 2016-10-20 08:57:34.964357
-No vulnerabilities found.
-
-
-mihneasim/iphy
-https://github.com/mihneasim/iphy
-Entry file: None
-Scanned: 2016-10-20 08:57:35.488055
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mihneasim/iphy.
-
-dnajd/pyrest
-https://github.com/dnajd/pyrest
-Entry file: pyrest/src/main/rest_test.py
-Scanned: 2016-10-20 08:57:36.008818
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MinnPost/jsonproxy
-https://github.com/MinnPost/jsonproxy
-Entry file: jsonproxy/app.py
-Scanned: 2016-10-20 08:57:36.535666
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BigBlueHat/recshackday
-https://github.com/BigBlueHat/recshackday
-Entry file: recshackday/app.py
-Scanned: 2016-10-20 08:57:37.811918
-No vulnerabilities found.
-
-
-capellayee/remake
-https://github.com/capellayee/remake
-Entry file: remake/Flasktest/__init__.py
-Scanned: 2016-10-20 08:57:40.332539
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-corydolphin/ifighthunger
-https://github.com/corydolphin/ifighthunger
-Entry file: ifighthunger/ifighthunger/__init__.py
-Scanned: 2016-10-20 08:57:41.853190
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zoowii/VerySimpleBlog
-https://github.com/zoowii/VerySimpleBlog
-Entry file: VerySimpleBlog/main.py
-Scanned: 2016-10-20 08:57:44.138995
-No vulnerabilities found.
-
-
-lxchavez/CSULB-Confessions
-https://github.com/lxchavez/CSULB-Confessions
-Entry file: CSULB-Confessions/confessions_app/__init__.py
-Scanned: 2016-10-20 08:57:55.789336
-No vulnerabilities found.
-
-
-ashcrow/flask-track-usage
-https://github.com/ashcrow/flask-track-usage
-Entry file: flask-track-usage/test/__init__.py
-Scanned: 2016-10-20 08:58:13.670676
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lepture/flask-shorturl
-https://github.com/lepture/flask-shorturl
-Entry file: flask-shorturl/test_shorturl.py
-Scanned: 2016-10-20 08:58:15.062283
-No vulnerabilities found.
-
-
-mharrys/flask-blog
-https://github.com/mharrys/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 08:58:15.600129
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-btomashvili/flasb
-https://github.com/btomashvili/flasb
-Entry file: None
-Scanned: 2016-10-20 08:58:19.602585
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb.
-
-krushton/flask-api-example
-https://github.com/krushton/flask-api-example
-Entry file: flask-api-example/app.py
-Scanned: 2016-10-20 08:58:20.984316
-No vulnerabilities found.
-
-
-jph98/flaskdmg
-https://github.com/jph98/flaskdmg
-Entry file: flaskdmg/flaskexample.py
-Scanned: 2016-10-20 08:58:22.293729
-No vulnerabilities found.
-
-
-roshow/flasktutorial
-https://github.com/roshow/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 08:58:22.865929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-akshar-raaj/flaskr
-https://github.com/akshar-raaj/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 08:58:23.370886
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-codergirl/flaskbabar
-https://github.com/codergirl/flaskbabar
-Entry file: flaskbabar/hello.py
-Scanned: 2016-10-20 08:58:24.766295
-Vulnerability 1:
-File: flaskbabar/hello.py
- > User input at line 44, trigger word "get(":
- new_user = BabarUser(request.args.get('username'), request.args.get('email'))
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 47: json = new_user.id'username''email'new_user.namenew_user.email
-File: flaskbabar/hello.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 2:
-File: flaskbabar/hello.py
- > User input at line 61, trigger word "get(":
- the_user = db.session.query(BabarUser).filter_by(id=request.args.get('user_id')).first()
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 3:
-File: flaskbabar/hello.py
- > User input at line 62, trigger word "get(":
- task_name = request.args.get('name')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 4:
-File: flaskbabar/hello.py
- > User input at line 63, trigger word "get(":
- task_description = request.args.get('description')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 5:
-File: flaskbabar/hello.py
- > User input at line 64, trigger word "get(":
- dismissable = request.args.get('dismissable')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 66: dismissable = True
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-Vulnerability 6:
-File: flaskbabar/hello.py
- > User input at line 67, trigger word "get(":
- due_date = request.args.get('due_date')
-Reassigned in:
- File: flaskbabar/hello.py
- > Line 69: due_date = datetime.datetime.fromtimestamp(float(due_date))
- File: flaskbabar/hello.py
- > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True)
- File: flaskbabar/hello.py
- > Line 73: json = new_task.idget_task_view(new_task)
-File: flaskbabar/hello.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(json)
-
-
-
-rajendrakrp/GAE-Flask-OpenID
-https://github.com/rajendrakrp/GAE-Flask-OpenID
-Entry file: GAE-Flask-OpenID/flask/sessions.py
-Scanned: 2016-10-20 08:58:25.335857
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Bob-Thomas/webshopFlask
-https://github.com/Bob-Thomas/webshopFlask
-Entry file: webshopFlask/webshop.py
-Scanned: 2016-10-20 08:58:28.959521
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-haburibe/flask-myapps
-https://github.com/haburibe/flask-myapps
-Entry file: flask-myapps/todos/todos.py
-Scanned: 2016-10-20 08:58:30.702175
-No vulnerabilities found.
-
-
-mykolasmith/flask-leaderboard
-https://github.com/mykolasmith/flask-leaderboard
-Entry file: flask-leaderboard/leaderboard/__init__.py
-Scanned: 2016-10-20 08:58:33.263218
-Vulnerability 1:
-File: flask-leaderboard/leaderboard/endpoints/login.py
- > User input at line 13, trigger word "form[":
- user = User.query.filter(User.name == request.form['username']).first()
-Reassigned in:
- File: flask-leaderboard/leaderboard/endpoints/login.py
- > Line 19: session['user_id'] = user.id
-File: flask-leaderboard/leaderboard/endpoints/login.py
- > reaches line 13, trigger word "filter(":
- user = User.query.filter(User.name == request.form['username']).first()
-
-
-
-betobaz/app_flask
-https://github.com/betobaz/app_flask
-Entry file: app_flask/app/routes.py
-Scanned: 2016-10-20 08:58:34.550354
-No vulnerabilities found.
-
-
-elimgoodman/Personnel-Flask
-https://github.com/elimgoodman/Personnel-Flask
-Entry file: Personnel-Flask/app/__init__.py
-Scanned: 2016-10-20 08:58:37.089685
-Vulnerability 1:
-File: Personnel-Flask/app/users/views.py
- > User input at line 68, trigger word "get(":
- salt = app.config.get('PW_SALT')
-Reassigned in:
- File: Personnel-Flask/app/users/views.py
- > Line 69: password_hash = bcrypt.hashpw(form.password.data, salt)
- File: Personnel-Flask/app/users/views.py
- > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash)
-File: Personnel-Flask/app/users/views.py
- > reaches line 74, trigger word "filter(":
- user = User.query.filter(clause).one()
-
-Vulnerability 2:
-File: Personnel-Flask/app/users/views.py
- > User input at line 69, trigger word ".data":
- password_hash = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: Personnel-Flask/app/users/views.py
- > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash)
-File: Personnel-Flask/app/users/views.py
- > reaches line 74, trigger word "filter(":
- user = User.query.filter(clause).one()
-
-Vulnerability 3:
-File: Personnel-Flask/app/users/views.py
- > User input at line 71, trigger word ".data":
- clause = and_(User.email == form.email.data, User.password_hash == password_hash)
-File: Personnel-Flask/app/users/views.py
- > reaches line 74, trigger word "filter(":
- user = User.query.filter(clause).one()
-
-
-
-erikgrueter/flask_app
-https://github.com/erikgrueter/flask_app
-Entry file: None
-Scanned: 2016-10-20 08:58:38.108384
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app.
-
-Duelist/ianb-flask
-https://github.com/Duelist/ianb-flask
-Entry file: ianb-flask/ianb/__init__.py
-Scanned: 2016-10-20 08:58:39.498942
-No vulnerabilities found.
-
-
-jonascj/flask_logger_test
-https://github.com/jonascj/flask_logger_test
-Entry file: flask_logger_test/flask_logger_test.py
-Scanned: 2016-10-20 08:58:41.267859
-No vulnerabilities found.
-
-
-stephanienkram/Flask-Money-Tracker
-https://github.com/stephanienkram/Flask-Money-Tracker
-Entry file: Flask-Money-Tracker/main.py
-Scanned: 2016-10-20 08:58:41.858633
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cismet/sqlparse-flask-webservice
-https://github.com/cismet/sqlparse-flask-webservice
-Entry file: sqlparse-flask-webservice/sqlparse_webservice.py
-Scanned: 2016-10-20 08:58:42.374225
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-luckypool/flask-blueprints-template
-https://github.com/luckypool/flask-blueprints-template
-Entry file: flask-blueprints-template/hello/__init__.py
-Scanned: 2016-10-20 08:58:43.653505
-No vulnerabilities found.
-
-
-dylanvee/flask-hello-world
-https://github.com/dylanvee/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 08:58:44.174711
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-adamjmarkham/flask-micro-blog
-https://github.com/adamjmarkham/flask-micro-blog
-Entry file: flask-micro-blog/micro_blog_flask.py
-Scanned: 2016-10-20 08:58:45.541556
-No vulnerabilities found.
-
-
-chrismeono1022/microblog_flask_tutorial
-https://github.com/chrismeono1022/microblog_flask_tutorial
-Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 08:58:52.866998
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jsutterfield/flaskr-buildout
-https://github.com/jsutterfield/flaskr-buildout
-Entry file: flaskr-buildout/src/flaskr/flaskr.py
-Scanned: 2016-10-20 08:59:07.715110
-No vulnerabilities found.
-
-
-corydolphin/boilerflask-facebook
-https://github.com/corydolphin/boilerflask-facebook
-Entry file: boilerflask-facebook/boilerflask/__init__.py
-Scanned: 2016-10-20 08:59:13.261551
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-subdesign/temp_Flaskblog
-https://github.com/subdesign/temp_Flaskblog
-Entry file: temp_Flaskblog/app.py
-Scanned: 2016-10-20 08:59:14.839433
-Vulnerability 1:
-File: temp_Flaskblog/app.py
- > User input at line 107, trigger word ".data":
- cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d])
-File: temp_Flaskblog/app.py
- > reaches line 107, trigger word "execute(":
- cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d])
-
-Vulnerability 2:
-File: temp_Flaskblog/app.py
- > User input at line 129, trigger word ".data":
- cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id))
-File: temp_Flaskblog/app.py
- > reaches line 129, trigger word "execute(":
- cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id))
-
-
-
-farresmoidu/weather
-https://github.com/farresmoidu/weather
-Entry file: weather/weather.py
-Scanned: 2016-10-20 08:59:15.355989
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thensgens/vvs
-https://github.com/thensgens/vvs
-Entry file: vvs/src/flask/sessions.py
-Scanned: 2016-10-20 08:59:15.887712
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mwieler/soccer
-https://github.com/mwieler/soccer
-Entry file: soccer/soccer/main.py
-Scanned: 2016-10-20 08:59:19.398668
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shiroyuki/tori-sample-blog
-https://github.com/shiroyuki/tori-sample-blog
-Entry file: tori-sample-blog/main.py
-Scanned: 2016-10-20 08:59:20.666950
-No vulnerabilities found.
-
-
-jackvnimble/jackvnimble
-https://github.com/jackvnimble/jackvnimble
-Entry file: jackvnimble/flaskblog.py
-Scanned: 2016-10-20 08:59:23.940236
-No vulnerabilities found.
-
-
-micahwalter/hello-mysql
-https://github.com/micahwalter/hello-mysql
-Entry file: hello-mysql/hello-mysql.py
-Scanned: 2016-10-20 08:59:25.675035
-No vulnerabilities found.
-
-
-itsme300/assignment
-https://github.com/itsme300/assignment
-Entry file: assignment/iptables.py
-Scanned: 2016-10-20 08:59:26.201575
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yhyap/lipsum
-https://github.com/yhyap/lipsum
-Entry file: lipsum/flask/app.py
-Scanned: 2016-10-20 08:59:29.769243
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lxchavez/CSULB-Confessions
-https://github.com/lxchavez/CSULB-Confessions
-Entry file: CSULB-Confessions/confessions_app/__init__.py
-Scanned: 2016-10-20 08:59:36.810532
-No vulnerabilities found.
-
-
-tornado-utils/tornado-restless
-https://github.com/tornado-utils/tornado-restless
-Entry file: tornado-restless/tests/base.py
-Scanned: 2016-10-20 08:59:41.362339
-No vulnerabilities found.
-
-
-btomashvili/flasb
-https://github.com/btomashvili/flasb
-Entry file: None
-Scanned: 2016-10-20 08:59:41.859801
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb.
-
-maxcountryman/flask-simpleoauth
-https://github.com/maxcountryman/flask-simpleoauth
-Entry file: flask-simpleoauth/flask_simpleoauth/app.py
-Scanned: 2016-10-20 08:59:43.207447
-Vulnerability 1:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 30, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.index'))
-Reassigned in:
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 30, trigger word "url_for(":
- next_url = request.args.get('next_url', url_for('.index'))
-
-Vulnerability 2:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 30, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.index'))
-Reassigned in:
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 3:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 42, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.login'))
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 42, trigger word "url_for(":
- next_url = request.args.get('next_url', url_for('.login'))
-
-Vulnerability 4:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 42, trigger word "get(":
- next_url = request.args.get('next_url', url_for('.login'))
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 44, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 5:
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > User input at line 53, trigger word ".data":
- consumer = Consumer(name=form.name.data, callback_uri=form.callback_uri.data)
-Reassigned in:
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 58: args = 'key''secret'consumer.keyconsumer.secret
- File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > Line 62: consumer = Consumer.objects.with_id(consumer_id)
-File: flask-simpleoauth/flask_simpleoauth/frontend.py
- > reaches line 59, trigger word "flash(":
- flash('Consumer created. Key {key} Secret {secret}'.format(args))
-
-
-
-bayazee/flask-mosession
-https://github.com/bayazee/flask-mosession
-Entry file: flask-mosession/example/example.py
-Scanned: 2016-10-20 08:59:44.558642
-No vulnerabilities found.
-
-
-fabin/Flaskr
-https://github.com/fabin/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 08:59:45.056202
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dorajistyle/proposal_center_python_flask_sqlalchemy_jade
-https://github.com/dorajistyle/proposal_center_python_flask_sqlalchemy_jade
-Entry file: proposal_center_python_flask_sqlalchemy_jade/application/__init__.py
-Scanned: 2016-10-20 08:59:47.148735
-Vulnerability 1:
-File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py
- > User input at line 58, trigger word "get(":
- feedback = Feedback.query.get(feedback_id)
-File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py
- > reaches line 59, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(feedback_id=feedback_id, vote_count=feedback.vote_count())
-
-
-
-fabin/Flask-Upload
-https://github.com/fabin/Flask-Upload
-Entry file: Flask-Upload/upload/__init__.py
-Scanned: 2016-10-20 08:59:48.478760
-Vulnerability 1:
-File: Flask-Upload/upload/__init__.py
- > User input at line 24, trigger word "files[":
- uploadedFile = request.files['file']
-Reassigned in:
- File: Flask-Upload/upload/__init__.py
- > Line 26: filename = uploadedFile.filename
- File: Flask-Upload/upload/__init__.py
- > Line 36: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File (in package)
-
- '
-File: Flask-Upload/upload/__init__.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob))
-
-
-
-gabrielengel/learn-flask
-https://github.com/gabrielengel/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 08:59:49.205014
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mutaku/alfred_flask
-https://github.com/mutaku/alfred_flask
-Entry file: alfred_flask/alfred.py
-Scanned: 2016-10-20 08:59:49.737468
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-erikgrueter/flask_app
-https://github.com/erikgrueter/flask_app
-Entry file: None
-Scanned: 2016-10-20 08:59:50.226379
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app.
-
-marksteve/flask-nsq
-https://github.com/marksteve/flask-nsq
-Entry file: flask-nsq/test.py
-Scanned: 2016-10-20 08:59:51.753391
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-luxuia/gene_designer
-https://github.com/luxuia/gene_designer
-Entry file: gene_designer/geneDesigne.py
-Scanned: 2016-10-20 09:00:13.768626
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rubinovitz/flask-gevent-boiler
-https://github.com/rubinovitz/flask-gevent-boiler
-Entry file: flask-gevent-boiler/app.py
-Scanned: 2016-10-20 09:00:14.269785
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andyhmltn/stripe-flask-test
-https://github.com/andyhmltn/stripe-flask-test
-Entry file: stripe-flask-test/main.py
-Scanned: 2016-10-20 09:00:15.781765
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-manuclementz/shrt
-https://github.com/manuclementz/shrt
-Entry file: shrt/app.py
-Scanned: 2016-10-20 09:00:17.174104
-Vulnerability 1:
-File: shrt/app.py
- > User input at line 46, trigger word "form[":
- link = ShortLink(request.form['url'])
-Reassigned in:
- File: shrt/app.py
- > Line 49: link.encoded_id = encode_id(link.id)
- File: shrt/app.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
-File: shrt/app.py
- > reaches line 52, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id))
-
-Vulnerability 2:
-File: shrt/app.py
- > User input at line 46, trigger word "form[":
- link = ShortLink(request.form['url'])
-Reassigned in:
- File: shrt/app.py
- > Line 49: link.encoded_id = encode_id(link.id)
- File: shrt/app.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
-File: shrt/app.py
- > reaches line 52, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id))
-
-
-
-liontree/lemonbook
-https://github.com/liontree/lemonbook
-Entry file: lemonbook/__init__.py
-Scanned: 2016-10-20 09:00:25.036200
-Vulnerability 1:
-File: lemonbook/common/flask_login.py
- > User input at line 227, trigger word "get(":
- cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME)
-File: lemonbook/common/flask_login.py
- > reaches line 237, trigger word "set_cookie(":
- response.set_cookie(cookie_name, data,expires=expires, domain=domain)
-
-Vulnerability 2:
-File: lemonbook/common/flask_login.py
- > User input at line 228, trigger word "get(":
- duration = config.get('REMEMBER_COOKIE_DURATION', COOKIE_DURATION)
-Reassigned in:
- File: lemonbook/common/flask_login.py
- > Line 235: expires = datetime.utcnow() + duration
-File: lemonbook/common/flask_login.py
- > reaches line 237, trigger word "set_cookie(":
- response.set_cookie(cookie_name, data,expires=expires, domain=domain)
-
-Vulnerability 3:
-File: lemonbook/common/flask_login.py
- > User input at line 229, trigger word "get(":
- domain = config.get('REMEMBER_COOKIE_DOMAIN', None)
-File: lemonbook/common/flask_login.py
- > reaches line 237, trigger word "set_cookie(":
- response.set_cookie(cookie_name, data,expires=expires, domain=domain)
-
-Vulnerability 4:
-File: lemonbook/views/notes.py
- > User input at line 50, trigger word "form[":
- date = request.form['date'].strip()
-Reassigned in:
- File: lemonbook/views/notes.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents)
- File: lemonbook/views/notes.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest'))
-File: lemonbook/views/notes.py
- > reaches line 55, trigger word "replace(":
- date = date.replace('/', '')
-
-Vulnerability 5:
-File: lemonbook/views/notes.py
- > User input at line 50, trigger word "form[":
- date = request.form['date'].strip()
-Reassigned in:
- File: lemonbook/views/notes.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents)
- File: lemonbook/views/notes.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest'))
-File: lemonbook/views/notes.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date))
-
-
-
-willkg/fredrik
-https://github.com/willkg/fredrik
-Entry file: fredrik/fredrik/project-template/PROJECTMODULE/main.py
-Scanned: 2016-10-20 09:00:25.538473
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scotfu/gae-twitter
-https://github.com/scotfu/gae-twitter
-Entry file: gae-twitter/lib/flask/sessions.py
-Scanned: 2016-10-20 09:00:26.534716
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-richardmonette/webremote
-https://github.com/richardmonette/webremote
-Entry file: webremote/app.py
-Scanned: 2016-10-20 09:00:27.532709
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-micahwalter/hello-mysql
-https://github.com/micahwalter/hello-mysql
-Entry file: hello-mysql/hello-mysql.py
-Scanned: 2016-10-20 09:00:28.785003
-No vulnerabilities found.
-
-
-joshsee/GAE-Online-Apparel-Survey-Form
-https://github.com/joshsee/GAE-Online-Apparel-Survey-Form
-Entry file: GAE-Online-Apparel-Survey-Form/flask/sessions.py
-Scanned: 2016-10-20 09:00:30.329360
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-samsolariusleo/Flask
-https://github.com/samsolariusleo/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 09:00:38.045975
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adamgreenhall/flask-haml-sass-coffee-template
-https://github.com/adamgreenhall/flask-haml-sass-coffee-template
-Entry file: flask-haml-sass-coffee-template/app.py
-Scanned: 2016-10-20 09:00:39.801311
-No vulnerabilities found.
-
-
-prakhar1989/flask-tuts
-https://github.com/prakhar1989/flask-tuts
-Entry file: flask-tuts/lesson-2/blogs/__init__.py
-Scanned: 2016-10-20 09:00:43.755590
-No vulnerabilities found.
-
-
-damour/flaskr
-https://github.com/damour/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 09:00:44.736072
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fabin/Flaskr
-https://github.com/fabin/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 09:00:45.234308
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Aussiroth/FlaskPractical
-https://github.com/Aussiroth/FlaskPractical
-Entry file: FlaskPractical/flask/routes.py
-Scanned: 2016-10-20 09:00:46.031165
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-fabin/Flask-Upload
-https://github.com/fabin/Flask-Upload
-Entry file: Flask-Upload/upload/__init__.py
-Scanned: 2016-10-20 09:00:49.277374
-Vulnerability 1:
-File: Flask-Upload/upload/__init__.py
- > User input at line 24, trigger word "files[":
- uploadedFile = request.files['file']
-Reassigned in:
- File: Flask-Upload/upload/__init__.py
- > Line 26: filename = uploadedFile.filename
- File: Flask-Upload/upload/__init__.py
- > Line 36: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File (in package)
-
- '
-File: Flask-Upload/upload/__init__.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob))
-
-
-
-lachezar/tada_backend
-https://github.com/lachezar/tada_backend
-Entry file: tada_backend/todo.py
-Scanned: 2016-10-20 09:00:51.567788
-No vulnerabilities found.
-
-
-krushton/flask-location-example
-https://github.com/krushton/flask-location-example
-Entry file: flask-location-example/app.py
-Scanned: 2016-10-20 09:00:53.282269
-No vulnerabilities found.
-
-
-david-torres/flask-rest-quickstart
-https://github.com/david-torres/flask-rest-quickstart
-Entry file: flask-rest-quickstart/application/__init__.py
-Scanned: 2016-10-20 09:01:04.543134
-No vulnerabilities found.
-
-
-Syerram/maintenance-server
-https://github.com/Syerram/maintenance-server
-Entry file: maintenance-server/run.py
-Scanned: 2016-10-20 09:01:14.053499
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bettertest-org/flask_app_skeleton_on_gae
-https://github.com/bettertest-org/flask_app_skeleton_on_gae
-Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py
-Scanned: 2016-10-20 09:01:14.806865
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-abhiomkar/contacts-rest
-https://github.com/abhiomkar/contacts-rest
-Entry file: contacts-rest/contacts.py
-Scanned: 2016-10-20 09:01:16.312680
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Giorgix/thor
-https://github.com/Giorgix/thor
-Entry file: thor/thor.py
-Scanned: 2016-10-20 09:01:17.554587
-No vulnerabilities found.
-
-
-dyim42/wiki
-https://github.com/dyim42/wiki
-Entry file: None
-Scanned: 2016-10-20 09:01:20.549371
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aromanovich/flask-webtest
-https://github.com/aromanovich/flask-webtest
-Entry file: flask-webtest/tests/core.py
-Scanned: 2016-10-20 09:01:29.227628
-No vulnerabilities found.
-
-
-sintezcs/flask
-https://github.com/sintezcs/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 09:01:30.285993
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wangzexin/flask
-https://github.com/wangzexin/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 09:01:30.843059
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Treeki/bitBoard
-https://github.com/Treeki/bitBoard
-Entry file: bitBoard/bitBoard/__init__.py
-Scanned: 2016-10-20 09:01:33.249825
-Vulnerability 1:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 173, trigger word "get(":
- pagenum = int(request.args.get('page', 1))
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 175: pagination = query.paginate(pagenum, THREADS_PER_PAGE,error_out=False)
- File: bitBoard/bitBoard/views/board.py
- > Line 180: pagination.items = add_null_entities(pagination.items)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 183, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('thread_list.html',mode='forum', forum=forum, stickies=stickies, threads=pagination.items, pagination=pagination)
-
-Vulnerability 2:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 210, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 219: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 218, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301)
-
-Vulnerability 3:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 224, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 233: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 232, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301)
-
-Vulnerability 4:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 239, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303)
- File: bitBoard/bitBoard/views/board.py
- > Line 291: user = post.creator
- File: bitBoard/bitBoard/views/board.py
- > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 250, trigger word "filter(":
- post = Post.query.filter(Post.thread == thread, Post.created_at > timestamp).order_by(db.asc(Post.created_at)).first()
-
-Vulnerability 5:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 239, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303)
- File: bitBoard/bitBoard/views/board.py
- > Line 291: user = post.creator
- File: bitBoard/bitBoard/views/board.py
- > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 255, trigger word "filter(":
- post = Post.query.filter(Post.thread == thread).order_by(db.asc(Post.created_at)).first()
-
-Vulnerability 6:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 286, trigger word "get(":
- pagenum = int(request.args.get('page', 1))
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 287: pagination = query.paginate(pagenum, POSTS_PER_PAGE,error_out=False)
- File: bitBoard/bitBoard/views/board.py
- > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post)
- File: bitBoard/bitBoard/views/board.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 296, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply)
-
-Vulnerability 7:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 366, trigger word ".data":
- thread = Thread(title=form.title.data, subtitle=form.subtitle.data, forum=forum, creator=g.user, type=is_privateThread.PRIVATEThread.BASIC_THREAD, post_count=1)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 382: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 400: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 407: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 412: notify = Notification(thread=thread, recipient=user, type=Notification.NEW_PRIVATE_THREAD)
- File: bitBoard/bitBoard/views/board.py
- > Line 422: ret_MAYBE_FUNCTION_NAME = render_template('post.html',is_thread=True, is_private=is_private, recipient_errors=recipient_errors, form=form, forum=forum, pm_recipient_limit=PM_RECIPIENT_LIMIT, url=url)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 420, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303)
-
-Vulnerability 8:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 459, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.reply_url,code=301)
-
-Vulnerability 9:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 504, trigger word "filter(":
- notify_which = db.session.query(u_table.c.user_id, Notification.id).filter(u_table.c.thread_id == thread.id).filter(u_table.c.user_id != g.user.id).outerjoin(Notification, notify_join)
-
-Vulnerability 10:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 534, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-
-Vulnerability 11:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 536, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post))
-
-Vulnerability 12:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 536, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post))
-
-Vulnerability 13:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 443, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number)
- File: bitBoard/bitBoard/views/board.py
- > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 487: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form))
-File: bitBoard/bitBoard/views/board.py
- > reaches line 546, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, thread=thread, forum=thread.forum, url=thread.reply_url)
-
-Vulnerability 14:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 577, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301)
-
-Vulnerability 15:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 579, trigger word "filter(":
- posts_before = Post.query.filter(Post.thread == thread, Post.id < post.id).count()
-
-Vulnerability 16:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 595, trigger word "render_template(":
- html = render_template('inline_edit.html',post=post, is_thread=edits_thread, form=form, url=post.edit_url)
-
-Vulnerability 17:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 627, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-
-Vulnerability 18:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 629, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content)))
-
-Vulnerability 19:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 604, trigger word ".data":
- version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 635: ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url)
- File: bitBoard/bitBoard/views/board.py
- > Line 643: ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form))
- File: bitBoard/bitBoard/views/board.py
- > Line 577: ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 627: ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 629, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content)))
-
-Vulnerability 20:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 635, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url)
-
-Vulnerability 21:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 564, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 568: thread = post.thread
- File: bitBoard/bitBoard/views/board.py
- > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0
- File: bitBoard/bitBoard/views/board.py
- > Line 587: cur_version = post.current_version
- File: bitBoard/bitBoard/views/board.py
- > Line 588: form_cls = edits_threadThreadFormPostForm
- File: bitBoard/bitBoard/views/board.py
- > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle)
- File: bitBoard/bitBoard/views/board.py
- > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html)
- File: bitBoard/bitBoard/views/board.py
- > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr)
- File: bitBoard/bitBoard/views/board.py
- > Line 613: post.current_version = version
- File: bitBoard/bitBoard/views/board.py
- > Line 616: version = cur_version
- File: bitBoard/bitBoard/views/board.py
- > Line 619: thread.title = form.title.data
- File: bitBoard/bitBoard/views/board.py
- > Line 620: thread.subtitle = form.subtitle.data
- File: bitBoard/bitBoard/views/board.py
- > Line 621: thread.slug = slugify(thread.title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 643, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form))
-
-Vulnerability 22:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 669, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.delete_url,code=301)
-
-Vulnerability 23:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 679, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303)
-
-Vulnerability 24:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 681, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post))
-
-Vulnerability 25:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 681, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post))
-
-Vulnerability 26:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 656, trigger word "get(":
- post = Post.query.get(post_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 660: thread = post.thread
-File: bitBoard/bitBoard/views/board.py
- > reaches line 686, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirm_post_delete.html',post=post, thread=post.thread, forum=post.thread.forum, url=post.delete_url)
-
-Vulnerability 27:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 696, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 703: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 704: url = thread.move_url
- File: bitBoard/bitBoard/views/board.py
- > Line 730: form = MoveThreadForm(destforum=thread.forum_id)
- File: bitBoard/bitBoard/views/board.py
- > Line 734: new_forum_id = form.destforum.data
- File: bitBoard/bitBoard/views/board.py
- > Line 741: old_forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 743: old_forum.post_count -= thread.post_count
- File: bitBoard/bitBoard/views/board.py
- > Line 745: thread.forum_id = new_forum_id
- File: bitBoard/bitBoard/views/board.py
- > Line 749: new_forum.post_count += thread.post_count
-File: bitBoard/bitBoard/views/board.py
- > reaches line 710, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url,code=301)
-
-Vulnerability 28:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 696, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 703: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 704: url = thread.move_url
- File: bitBoard/bitBoard/views/board.py
- > Line 730: form = MoveThreadForm(destforum=thread.forum_id)
- File: bitBoard/bitBoard/views/board.py
- > Line 734: new_forum_id = form.destforum.data
- File: bitBoard/bitBoard/views/board.py
- > Line 741: old_forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 743: old_forum.post_count -= thread.post_count
- File: bitBoard/bitBoard/views/board.py
- > Line 745: thread.forum_id = new_forum_id
- File: bitBoard/bitBoard/views/board.py
- > Line 749: new_forum.post_count += thread.post_count
-File: bitBoard/bitBoard/views/board.py
- > reaches line 757, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303)
-
-Vulnerability 29:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 696, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 703: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 704: url = thread.move_url
- File: bitBoard/bitBoard/views/board.py
- > Line 730: form = MoveThreadForm(destforum=thread.forum_id)
- File: bitBoard/bitBoard/views/board.py
- > Line 734: new_forum_id = form.destforum.data
- File: bitBoard/bitBoard/views/board.py
- > Line 741: old_forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 743: old_forum.post_count -= thread.post_count
- File: bitBoard/bitBoard/views/board.py
- > Line 745: thread.forum_id = new_forum_id
- File: bitBoard/bitBoard/views/board.py
- > Line 749: new_forum.post_count += thread.post_count
-File: bitBoard/bitBoard/views/board.py
- > reaches line 760, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('move_thread.html',form=form, forum=forum, thread=thread, url=url)
-
-Vulnerability 30:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 775, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 782: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 785: url = thread.sticky_url
- File: bitBoard/bitBoard/views/board.py
- > Line 787: url = thread.lock_url
- File: bitBoard/bitBoard/views/board.py
- > Line 791: url = thread.follow_url
- File: bitBoard/bitBoard/views/board.py
- > Line 808: old_value = thread.is_stickied
- File: bitBoard/bitBoard/views/board.py
- > Line 822: old_value = thread.is_locked
- File: bitBoard/bitBoard/views/board.py
- > Line 836: old_value = thread.is_followed_by(g.user)
- File: bitBoard/bitBoard/views/board.py
- > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 802, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url,code=301)
-
-Vulnerability 31:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 775, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 782: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 785: url = thread.sticky_url
- File: bitBoard/bitBoard/views/board.py
- > Line 787: url = thread.lock_url
- File: bitBoard/bitBoard/views/board.py
- > Line 791: url = thread.follow_url
- File: bitBoard/bitBoard/views/board.py
- > Line 808: old_value = thread.is_stickied
- File: bitBoard/bitBoard/views/board.py
- > Line 822: old_value = thread.is_locked
- File: bitBoard/bitBoard/views/board.py
- > Line 836: old_value = thread.is_followed_by(g.user)
- File: bitBoard/bitBoard/views/board.py
- > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 869, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = form.redirect(url=thread.url)
-
-Vulnerability 32:
-File: bitBoard/bitBoard/views/board.py
- > User input at line 775, trigger word "get(":
- thread = Thread.query.get(thread_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/board.py
- > Line 782: forum = thread.forum
- File: bitBoard/bitBoard/views/board.py
- > Line 785: url = thread.sticky_url
- File: bitBoard/bitBoard/views/board.py
- > Line 787: url = thread.lock_url
- File: bitBoard/bitBoard/views/board.py
- > Line 791: url = thread.follow_url
- File: bitBoard/bitBoard/views/board.py
- > Line 808: old_value = thread.is_stickied
- File: bitBoard/bitBoard/views/board.py
- > Line 822: old_value = thread.is_locked
- File: bitBoard/bitBoard/views/board.py
- > Line 836: old_value = thread.is_followed_by(g.user)
- File: bitBoard/bitBoard/views/board.py
- > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title)
-File: bitBoard/bitBoard/views/board.py
- > reaches line 871, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirm.html',form=form, crumbs_type='thread', forum=forum, thread=thread, final_crumb='%s Thread' % cap_verb, message=message, url=url)
-
-Vulnerability 33:
-File: bitBoard/bitBoard/views/base.py
- > User input at line 49, trigger word "get(":
- target = get_redirect_target() or url
-Reassigned in:
- File: bitBoard/bitBoard/views/base.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data)
-File: bitBoard/bitBoard/views/base.py
- > reaches line 50, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303)
-
-Vulnerability 34:
-File: bitBoard/bitBoard/views/base.py
- > User input at line 49, trigger word "get(":
- target = get_redirect_target() or url
-Reassigned in:
- File: bitBoard/bitBoard/views/base.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data)
-File: bitBoard/bitBoard/views/base.py
- > reaches line 50, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303)
-
-Vulnerability 35:
-File: bitBoard/bitBoard/views/wiki.py
- > User input at line 31, trigger word "get(":
- revision = WikiRevision.query.get(revision_id)
-Reassigned in:
- File: bitBoard/bitBoard/views/wiki.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(page.url,code=303)
-File: bitBoard/bitBoard/views/wiki.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('wiki_page.html',is_old_revision=True, page=page, revision=revision)
-
-Vulnerability 36:
-File: bitBoard/bitBoard/views/user.py
- > User input at line 36, trigger word ".data":
- user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first()
-Reassigned in:
- File: bitBoard/bitBoard/views/user.py
- > Line 44: self.user = user
-File: bitBoard/bitBoard/views/user.py
- > reaches line 36, trigger word "filter(":
- user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first()
-
-Vulnerability 37:
-File: bitBoard/bitBoard/views/user.py
- > User input at line 124, trigger word "get(":
- user = User.query.get(id)
-File: bitBoard/bitBoard/views/user.py
- > reaches line 128, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(user.url,code=301)
-
-Vulnerability 38:
-File: bitBoard/bitBoard/views/user.py
- > User input at line 124, trigger word "get(":
- user = User.query.get(id)
-File: bitBoard/bitBoard/views/user.py
- > reaches line 129, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('profile.html',user=user)
-
-
-
-byu-osl/familytree-sample-app
-https://github.com/byu-osl/familytree-sample-app
-Entry file: familytree-sample-app/app.py
-Scanned: 2016-10-20 09:01:33.767461
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kmiasko/flask-barcode
-https://github.com/kmiasko/flask-barcode
-Entry file: flask-barcode/wsgi.py
-Scanned: 2016-10-20 09:01:35.260714
-No vulnerabilities found.
-
-
-jayzcode/helloflask
-https://github.com/jayzcode/helloflask
-Entry file: helloflask/hello.py
-Scanned: 2016-10-20 09:01:38.785491
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py
-
-bootandy/flask-sample
-https://github.com/bootandy/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 09:01:39.276175
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lee814/flaskr
-https://github.com/lee814/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 09:01:39.777898
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JLtheking/FlaskExample
-https://github.com/JLtheking/FlaskExample
-Entry file: FlaskExample/routes.py
-Scanned: 2016-10-20 09:01:41.299086
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-redfive/python-flask
-https://github.com/redfive/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 09:01:44.317486
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-atbaker/flask-tutorial
-https://github.com/atbaker/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 09:01:45.321600
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bradmerlin/porty_flask
-https://github.com/bradmerlin/porty_flask
-Entry file: porty_flask/app.py
-Scanned: 2016-10-20 09:01:45.853882
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marcilioleite/flask-saude
-https://github.com/marcilioleite/flask-saude
-Entry file: flask-saude/app/__init__.py
-Scanned: 2016-10-20 09:01:52.424237
-Vulnerability 1:
-File: flask-saude/app/views.py
- > User input at line 11, trigger word "get(":
- m = Medico.query.get(1)
-File: flask-saude/app/views.py
- > reaches line 12, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('medico.html',medico=m)
-
-
-
-asap/watchman.flask
-https://github.com/asap/watchman.flask
-Entry file: None
-Scanned: 2016-10-20 09:01:52.947430
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bradmerlin/mxit-spock_flask
-https://github.com/bradmerlin/mxit-spock_flask
-Entry file: mxit-spock_flask/app.py
-Scanned: 2016-10-20 09:01:53.454498
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rartavia/flask-babel-example
-https://github.com/rartavia/flask-babel-example
-Entry file: flask-babel-example/flask-babel-example.py
-Scanned: 2016-10-20 09:01:54.748600
-No vulnerabilities found.
-
-
-elidickinson/flask-proxy-demo
-https://github.com/elidickinson/flask-proxy-demo
-Entry file: flask-proxy-demo/hello.py
-Scanned: 2016-10-20 09:02:04.993893
-No vulnerabilities found.
-
-
-bradmerlin/mxit-blackjack_flask
-https://github.com/bradmerlin/mxit-blackjack_flask
-Entry file: mxit-blackjack_flask/app.py
-Scanned: 2016-10-20 09:02:15.037901
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-geunieve/ratemyfirefart
-https://github.com/geunieve/ratemyfirefart
-Entry file: ratemyfirefart/views.py
-Scanned: 2016-10-20 09:02:17.322723
-No vulnerabilities found.
-
-
-wangxiaoxiao88/python-bookmanager
-https://github.com/wangxiaoxiao88/python-bookmanager
-Entry file: python-bookmanager/app.py
-Scanned: 2016-10-20 09:02:18.696106
-No vulnerabilities found.
-
-
-bettertest-org/flask_app_skeleton_on_gae
-https://github.com/bettertest-org/flask_app_skeleton_on_gae
-Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py
-Scanned: 2016-10-20 09:02:20.265786
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChannelIQ/redis-explorer
-https://github.com/ChannelIQ/redis-explorer
-Entry file: redis-explorer/redis_explorer/__init__.py
-Scanned: 2016-10-20 09:02:20.786498
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-dougdragon/fuckyeanouns.com
-https://github.com/dougdragon/fuckyeanouns.com
-Entry file: None
-Scanned: 2016-10-20 09:02:26.296281
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-brocksamson/minesweeper
-https://github.com/brocksamson/minesweeper
-Entry file: minesweeper/minesweeper/__init__.py
-Scanned: 2016-10-20 09:02:27.532099
-No vulnerabilities found.
-
-
-Sadhanandh/Chat-thumbnailer
-https://github.com/Sadhanandh/Chat-thumbnailer
-Entry file: Chat-thumbnailer/urllib2-enabled/flask_app.py
-Scanned: 2016-10-20 09:02:28.029803
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-znewman01/creepy
-https://github.com/znewman01/creepy
-Entry file: creepy/creepy/app.py
-Scanned: 2016-10-20 09:02:30.528388
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aliismayilov/microblog
-https://github.com/aliismayilov/microblog
-Entry file: None
-Scanned: 2016-10-20 09:02:31.058045
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-konrad/annotation_helper_web_app
-https://github.com/konrad/annotation_helper_web_app
-Entry file: annotation_helper_web_app/annotate.py
-Scanned: 2016-10-20 09:02:32.425187
-No vulnerabilities found.
-
-
-smerritt/tempurl-signer
-https://github.com/smerritt/tempurl-signer
-Entry file: tempurl-signer/app.py
-Scanned: 2016-10-20 09:02:33.687137
-No vulnerabilities found.
-
-
-laiqing/crossFireWall-Search
-https://github.com/laiqing/crossFireWall-Search
-Entry file: crossFireWall-Search/google-enchance.py
-Scanned: 2016-10-20 09:02:35.260947
-No vulnerabilities found.
-
-
-lepture/flask-oauthlib
-https://github.com/lepture/flask-oauthlib
-Entry file: flask-oauthlib/flask_oauthlib/provider/oauth1.py
-Scanned: 2016-10-20 09:02:43.121433
-Vulnerability 1:
-File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > User input at line 87, trigger word "get(":
- error_endpoint = self.app.config.get('OAUTH1_PROVIDER_ERROR_ENDPOINT')
-Reassigned in:
- File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = '/oauth/errors'
- File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = error_uri
-File: flask-oauthlib/flask_oauthlib/provider/oauth1.py
- > reaches line 89, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint)
-
-Vulnerability 2:
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > User input at line 104, trigger word "get(":
- error_endpoint = self.app.config.get('OAUTH2_PROVIDER_ERROR_ENDPOINT')
-Reassigned in:
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 107: ret_MAYBE_FUNCTION_NAME = '/oauth/errors'
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = error_uri
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > reaches line 106, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint)
-
-Vulnerability 3:
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > User input at line 447, trigger word "get(":
- redirect_uri = credentials.get('redirect_uri')
-Reassigned in:
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 464: ret_MAYBE_FUNCTION_NAME = redirect(add_params_to_uri(self.error_uri, 'error'str(e)))
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 455: ret_MAYBE_FUNCTION_NAME = create_response(ret)
- File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > Line 458: ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(self.error_uri))
-File: flask-oauthlib/flask_oauthlib/provider/oauth2.py
- > reaches line 461, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(redirect_uri or self.error_uri))
-
-
-
-miguelgrinberg/Flask-HTTPAuth
-https://github.com/miguelgrinberg/Flask-HTTPAuth
-Entry file: Flask-HTTPAuth/examples/basic_auth.py
-Scanned: 2016-10-20 09:02:45.031833
-No vulnerabilities found.
-
-
-plastboks/Flaskmarks
-https://github.com/plastboks/Flaskmarks
-Entry file: Flaskmarks/flaskmarks/__init__.py
-Scanned: 2016-10-20 09:02:49.648228
-Vulnerability 1:
-File: Flaskmarks/flaskmarks/views/marks.py
- > User input at line 92, trigger word "get(":
- q = request.args.get('q')
-Reassigned in:
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 98: m = g.user.q_marks_by_string(page, q, t)
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks'))
-File: Flaskmarks/flaskmarks/views/marks.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m)
-
-Vulnerability 2:
-File: Flaskmarks/flaskmarks/views/marks.py
- > User input at line 93, trigger word "get(":
- t = request.args.get('type')
-Reassigned in:
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 98: m = g.user.q_marks_by_string(page, q, t)
- File: Flaskmarks/flaskmarks/views/marks.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks'))
-File: Flaskmarks/flaskmarks/views/marks.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m)
-
-Vulnerability 3:
-File: Flaskmarks/flaskmarks/views/auth.py
- > User input at line 33, trigger word ".data":
- u = User.by_uname_or_email(form.username.data)
-File: Flaskmarks/flaskmarks/views/auth.py
- > reaches line 38, trigger word "flash(":
- flash('Welcome %s.' % u.username,category='success')
-
-
-
-sintezcs/flask
-https://github.com/sintezcs/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 09:02:50.208050
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-klen/mixer
-https://github.com/klen/mixer
-Entry file: mixer/tests/test_flask.py
-Scanned: 2016-10-20 09:02:54.381461
-No vulnerabilities found.
-
-
-fedenusy/flaskr
-https://github.com/fedenusy/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 09:02:55.359682
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lee814/flaskr
-https://github.com/lee814/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 09:02:55.854231
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paraboul/FlaskPress
-https://github.com/paraboul/FlaskPress
-Entry file: None
-Scanned: 2016-10-20 09:02:56.366792
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/paraboul/FlaskPress.
-
-AlexeyMK/gglto_flask
-https://github.com/AlexeyMK/gglto_flask
-Entry file: gglto_flask/gglto.py
-Scanned: 2016-10-20 09:02:57.583570
-Vulnerability 1:
-File: gglto_flask/gglto.py
- > User input at line 27, trigger word "get(":
- base_path = domain_to_redirect_url.get(request.headers['Host'], 'http://google.com/search?q={}')
-File: gglto_flask/gglto.py
- > reaches line 30, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(base_path.format(query_escaped))
-
-
-
-DamnedFacts/flask-contact
-https://github.com/DamnedFacts/flask-contact
-Entry file: flask-contact/main.py
-Scanned: 2016-10-20 09:02:58.087657
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-maxbucknell/vanilla_flask
-https://github.com/maxbucknell/vanilla_flask
-Entry file: vanilla_flask/vanilla/__init__.py
-Scanned: 2016-10-20 09:02:59.978826
-No vulnerabilities found.
-
-
-sammyrulez/flask-grolla
-https://github.com/sammyrulez/flask-grolla
-Entry file: flask-grolla/tests.py
-Scanned: 2016-10-20 09:03:02.747870
-Vulnerability 1:
-File: flask-grolla/flask_grolla.py
- > User input at line 22, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: flask-grolla/flask_grolla.py
- > reaches line 22, trigger word "url_for(":
- next_url = request.args.get('next') or url_for('index')
-
-Vulnerability 2:
-File: flask-grolla/flask_grolla.py
- > User input at line 22, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: flask-grolla/flask_grolla.py
- > reaches line 25, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-Vulnerability 3:
-File: flask-grolla/flask_grolla.py
- > User input at line 22, trigger word "get(":
- next_url = request.args.get('next') or url_for('index')
-File: flask-grolla/flask_grolla.py
- > reaches line 32, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url)
-
-
-
-duffy25/sample_flask
-https://github.com/duffy25/sample_flask
-Entry file: sample_flask/sample_flask.py
-Scanned: 2016-10-20 09:03:05.255718
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Joinhack/agent
-https://github.com/Joinhack/agent
-Entry file: agent/flask_sqlalchemy.py
-Scanned: 2016-10-20 09:03:16.580430
-Vulnerability 1:
-File: agent/agent/views/user.py
- > User input at line 14, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/user.py
- > Line 17: user = um.getByLoginId(loginid)
- File: agent/agent/views/user.py
- > Line 18: company = um.getUserCompany(user)
- File: agent/agent/views/user.py
- > Line 19: region = user.department.region
- File: agent/agent/views/user.py
- > Line 20: cities = dm.getCitiesOfCompany(company)
-File: agent/agent/views/user.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=user, company=company, region=region, cities=cities)
-
-Vulnerability 2:
-File: agent/agent/views/user.py
- > User input at line 44, trigger word "form[":
- area = request.form['area']
-Reassigned in:
- File: agent/agent/views/user.py
- > Line 46: reg = Region(type=3, name=name, parent_id=area)
- File: agent/agent/views/user.py
- > Line 49: data = 'value''content''selected'reg.idreg.nameTrue
-File: agent/agent/views/user.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data)
-
-Vulnerability 3:
-File: agent/agent/views/user.py
- > User input at line 45, trigger word "form[":
- name = request.form['section']
-Reassigned in:
- File: agent/agent/views/user.py
- > Line 46: reg = Region(type=3, name=name, parent_id=area)
- File: agent/agent/views/user.py
- > Line 49: data = 'value''content''selected'reg.idreg.nameTrue
-File: agent/agent/views/user.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data)
-
-Vulnerability 4:
-File: agent/agent/views/house.py
- > User input at line 12, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 15: user = um.getByLoginId(loginid)
- File: agent/agent/views/house.py
- > Line 16: company = um.getUserCompany(user)
- File: agent/agent/views/house.py
- > Line 17: cities = dm.getCitiesOfCompany(company)
-File: agent/agent/views/house.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities))
-
-Vulnerability 5:
-File: agent/agent/views/house.py
- > User input at line 12, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 15: user = um.getByLoginId(loginid)
- File: agent/agent/views/house.py
- > Line 16: company = um.getUserCompany(user)
- File: agent/agent/views/house.py
- > Line 17: cities = dm.getCitiesOfCompany(company)
-File: agent/agent/views/house.py
- > reaches line 18, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities))
-
-Vulnerability 6:
-File: agent/agent/views/house.py
- > User input at line 34, trigger word "get(":
- loginid = session.get(LOGINID)
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 36: user = um.getByLoginId(loginid)
- File: agent/agent/views/house.py
- > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q)
- File: agent/agent/views/house.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query')
-File: agent/agent/views/house.py
- > reaches line 39, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data))
-
-Vulnerability 7:
-File: agent/agent/views/house.py
- > User input at line 45, trigger word "form[":
- community_name = request.form['community']
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 55: community = Community(name=community_name, location=location)
-File: agent/agent/views/house.py
- > reaches line 67, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name)
-
-Vulnerability 8:
-File: agent/agent/views/house.py
- > User input at line 46, trigger word "form[":
- location = request.form['location']
-Reassigned in:
- File: agent/agent/views/house.py
- > Line 55: community = Community(name=community_name, location=location)
-File: agent/agent/views/house.py
- > reaches line 67, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name)
-
-
-
-vasnake/mapfeatureserver
-https://github.com/vasnake/mapfeatureserver
-Entry file: None
-Scanned: 2016-10-20 09:03:17.102371
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vasnake/mapfeatureserver.
-
-cldershem/WebFlask-CleanTemplate
-https://github.com/cldershem/WebFlask-CleanTemplate
-Entry file: None
-Scanned: 2016-10-20 09:03:17.643554
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tonilxm/1stFlask
-https://github.com/tonilxm/1stFlask
-Entry file: 1stFlask/src/lib/flask/sessions.py
-Scanned: 2016-10-20 09:03:18.167505
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brooks/python-flask-sample
-https://github.com/brooks/python-flask-sample
-Entry file: python-flask-sample/hello.py
-Scanned: 2016-10-20 09:03:20.764503
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py
-
-palei/Just-Another-Flask-App
-https://github.com/palei/Just-Another-Flask-App
-Entry file: Just-Another-Flask-App/app/__init__.py
-Scanned: 2016-10-20 09:03:21.275967
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-FriendCode/python-flask-sample
-https://github.com/FriendCode/python-flask-sample
-Entry file: python-flask-sample/hello.py
-Scanned: 2016-10-20 09:03:26.802653
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py
-
-thrisp/flarf
-https://github.com/thrisp/flarf
-Entry file: flarf/examples/example.py
-Scanned: 2016-10-20 09:03:29.857642
-No vulnerabilities found.
-
-
-geunieve/ratemyfirefart
-https://github.com/geunieve/ratemyfirefart
-Entry file: ratemyfirefart/views.py
-Scanned: 2016-10-20 09:03:32.175274
-No vulnerabilities found.
-
-
-lhr530124/nozomiServer
-https://github.com/lhr530124/nozomiServer
-Entry file: None
-Scanned: 2016-10-20 09:13:35.307126
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ChannelIQ/redis-explorer
-https://github.com/ChannelIQ/redis-explorer
-Entry file: redis-explorer/redis_explorer/__init__.py
-Scanned: 2016-10-20 09:13:35.859960
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sangallimarco/arduino_raspberry_garden_ui
-https://github.com/sangallimarco/arduino_raspberry_garden_ui
-Entry file: arduino_raspberry_garden_ui/main.py
-Scanned: 2016-10-20 09:13:36.402188
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-carlosvin/cmsflask
-https://github.com/carlosvin/cmsflask
-Entry file: None
-Scanned: 2016-10-20 09:15:44.201132
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lpolepeddi/intro-to-flask
-https://github.com/lpolepeddi/intro-to-flask
-Entry file: intro-to-flask/intro_to_flask/__init__.py
-Scanned: 2016-10-20 09:44:07.174301
-No vulnerabilities found.
-
-
-saltycrane/flask-jquery-ajax-example
-https://github.com/saltycrane/flask-jquery-ajax-example
-Entry file: None
-Scanned: 2016-10-20 09:44:07.670867
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example.
-
-bh45k4r/flask
-https://github.com/bh45k4r/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 10:55:49.015185
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-gd452/flask
-https://github.com/gd452/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 10:55:49.570463
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-llh335/flask
-https://github.com/llh335/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 10:55:50.153913
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-paulmin55/flask
-https://github.com/paulmin55/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 10:55:50.694965
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-CarlEkerot/flask-orm
-https://github.com/CarlEkerot/flask-orm
-Entry file: flask-orm/webapp/__init__.py
-Scanned: 2016-10-20 10:55:52.080810
-No vulnerabilities found.
-
-
-ibininja/upload_file_python
-https://github.com/ibininja/upload_file_python
-Entry file: upload_file_python/src/app.py
-Scanned: 2016-10-20 10:55:53.354691
-No vulnerabilities found.
-
-
-fraoustin/flaskserver
-https://github.com/fraoustin/flaskserver
-Entry file: None
-Scanned: 2016-10-20 10:55:53.872570
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver.
-
-ecerami/hello_flask
-https://github.com/ecerami/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-20 10:55:54.747922
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-milinbhakta/flaskmaterialdesign
-https://github.com/milinbhakta/flaskmaterialdesign
-Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-20 10:56:03.323562
-No vulnerabilities found.
-
-
-Hellemos/flaskapp
-https://github.com/Hellemos/flaskapp
-Entry file: None
-Scanned: 2016-10-20 10:56:04.396691
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Hellemos/flaskapp.
-
-ssssergey/flaskengine
-https://github.com/ssssergey/flaskengine
-Entry file: flaskengine/flaskengine/__init__.py
-Scanned: 2016-10-20 10:56:04.913875
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kai1/flasktest
-https://github.com/kai1/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 10:56:05.428965
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-willianribeiro/flaskr
-https://github.com/willianribeiro/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 10:56:05.954757
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-StuartChristie/Flasky
-https://github.com/StuartChristie/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 10:56:06.462159
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-milinbhakta/flaskjinja
-https://github.com/milinbhakta/flaskjinja
-Entry file: flaskjinja/hello.py
-Scanned: 2016-10-20 10:56:10.521454
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-saucecode/flaskcat
-https://github.com/saucecode/flaskcat
-Entry file: flaskcat/flaskcat.py
-Scanned: 2016-10-20 10:56:11.033738
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wiggitywalt/flasktaskr
-https://github.com/wiggitywalt/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 10:56:11.545912
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ashishkx/Flaskr
-https://github.com/ashishkx/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 10:56:12.057025
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jward1/flasktaskr
-https://github.com/jward1/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 10:56:12.549536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-schoolofcode-me/web_blog
-https://github.com/schoolofcode-me/web_blog
-Entry file: web_blog/src/app.py
-Scanned: 2016-10-20 10:56:14.281493
-No vulnerabilities found.
-
-
-iKalin/flask1
-https://github.com/iKalin/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 10:56:15.069575
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-iamrajhans/FlaskPYDemo
-https://github.com/iamrajhans/FlaskPYDemo
-Entry file: None
-Scanned: 2016-10-20 10:56:15.583376
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/iamrajhans/FlaskPYDemo.
-
-arpm/FlaskTaskr
-https://github.com/arpm/FlaskTaskr
-Entry file: FlaskTaskr/views.py
-Scanned: 2016-10-20 10:56:16.269829
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py
-
-MortalCatalyst/flaskTR
-https://github.com/MortalCatalyst/flaskTR
-Entry file: flaskTR/flasktaskr/views.py
-Scanned: 2016-10-20 10:56:16.793705
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-QuadPiece/Quad-Devices-Two
-https://github.com/QuadPiece/Quad-Devices-Two
-Entry file: Quad-Devices-Two/run.py
-Scanned: 2016-10-20 10:56:18.079191
-No vulnerabilities found.
-
-
-dbunker/Flask-Tread
-https://github.com/dbunker/Flask-Tread
-Entry file: Flask-Tread/examples/blog/app/mainapp/__init__.py
-Scanned: 2016-10-20 10:56:18.591907
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-martincalvert/GAE-Flask
-https://github.com/martincalvert/GAE-Flask
-Entry file: GAE-Flask/routes.py
-Scanned: 2016-10-20 10:56:19.906197
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-fergyfresh/flask-staysafe
-https://github.com/fergyfresh/flask-staysafe
-Entry file: None
-Scanned: 2016-10-20 10:56:48.471433
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arvelt/hello-flask
-https://github.com/arvelt/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 10:56:49.056844
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-andrewheekin/flask-metatag
-https://github.com/andrewheekin/flask-metatag
-Entry file: flask-metatag/app.py
-Scanned: 2016-10-20 10:56:50.332891
-No vulnerabilities found.
-
-
-Seneckiy/workwithFlask
-https://github.com/Seneckiy/workwithFlask
-Entry file: workwithFlask/hello.py
-Scanned: 2016-10-20 10:56:52.503267
-No vulnerabilities found.
-
-
-xuefeng-huang/flask_task
-https://github.com/xuefeng-huang/flask_task
-Entry file: flask_task/__init__.py
-Scanned: 2016-10-20 10:56:53.744348
-No vulnerabilities found.
-
-
-ichy-wayland/flask-temp
-https://github.com/ichy-wayland/flask-temp
-Entry file: flask-temp/main.py
-Scanned: 2016-10-20 10:56:54.984922
-No vulnerabilities found.
-
-
-RodrigoVillatoro/flask_blog
-https://github.com/RodrigoVillatoro/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 10:56:55.507052
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-patrickyoung/simple-flask
-https://github.com/patrickyoung/simple-flask
-Entry file: simple-flask/hello.py
-Scanned: 2016-10-20 10:56:56.730523
-No vulnerabilities found.
-
-
-sancarbar/flask-auth
-https://github.com/sancarbar/flask-auth
-Entry file: flask-auth/example.py
-Scanned: 2016-10-20 10:56:57.271162
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lifayi2008/my_flask
-https://github.com/lifayi2008/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 10:57:04.904797
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-staticor/learnFlask
-https://github.com/staticor/learnFlask
-Entry file: None
-Scanned: 2016-10-20 10:57:05.392341
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/staticor/learnFlask.
-
-mehmettaskiner/flask-skeleton
-https://github.com/mehmettaskiner/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 10:57:05.899871
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mehmettaskiner/flask-skeleton.
-
-robin-lee/flask-tutorial
-https://github.com/robin-lee/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 10:57:06.419845
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zonzpoo/blog-flask
-https://github.com/zonzpoo/blog-flask
-Entry file: blog-flask/project/views.py
-Scanned: 2016-10-20 10:57:07.108245
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arpm/flask-blog
-https://github.com/arpm/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 10:57:07.694027
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-raejoon/lype-flask
-https://github.com/raejoon/lype-flask
-Entry file: lype-flask/lyre.py
-Scanned: 2016-10-20 10:57:09.060936
-Vulnerability 1:
-File: lype-flask/lyre.py
- > User input at line 239, trigger word "get(":
- splid = request.args.get('spl', None)
-Reassigned in:
- File: lype-flask/lyre.py
- > Line 252: plid = splid
- File: lype-flask/lyre.py
- > Line 256: videos = serv.get_videos(youtube, plid)
- File: lype-flask/lyre.py
- > Line 257: session['playq'] = videos
- File: lype-flask/lyre.py
- > Line 258: session['nowplaying'] = -1
- File: lype-flask/lyre.py
- > Line 267: title = serv.get_title_from_plid(playlists, plid)
- File: lype-flask/lyre.py
- > Line 269: title = serv.get_title_from_plid(searched_playlists, plid)
- File: lype-flask/lyre.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 240: plid = request.args.get('pl', None)
- File: lype-flask/lyre.py
- > Line 244: videos = None
- File: lype-flask/lyre.py
- > Line 246: session['shuffle'] = False
- File: lype-flask/lyre.py
- > Line 249: session['nowplaying'] = -1
-File: lype-flask/lyre.py
- > reaches line 271, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos)
-
-Vulnerability 2:
-File: lype-flask/lyre.py
- > User input at line 240, trigger word "get(":
- plid = request.args.get('pl', None)
-Reassigned in:
- File: lype-flask/lyre.py
- > Line 252: plid = splid
- File: lype-flask/lyre.py
- > Line 256: videos = serv.get_videos(youtube, plid)
- File: lype-flask/lyre.py
- > Line 257: session['playq'] = videos
- File: lype-flask/lyre.py
- > Line 258: session['nowplaying'] = -1
- File: lype-flask/lyre.py
- > Line 267: title = serv.get_title_from_plid(playlists, plid)
- File: lype-flask/lyre.py
- > Line 269: title = serv.get_title_from_plid(searched_playlists, plid)
- File: lype-flask/lyre.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 244: videos = None
- File: lype-flask/lyre.py
- > Line 246: session['shuffle'] = False
- File: lype-flask/lyre.py
- > Line 249: session['nowplaying'] = -1
-File: lype-flask/lyre.py
- > reaches line 271, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos)
-
-
-
-ayusharma/flask-mysql
-https://github.com/ayusharma/flask-mysql
-Entry file: flask-mysql/app.py
-Scanned: 2016-10-20 10:57:11.681919
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/genericpath.py
-
-zolaneta/hello_flask
-https://github.com/zolaneta/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-20 10:57:12.198768
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrasband/flask-seed
-https://github.com/mrasband/flask-seed
-Entry file: None
-Scanned: 2016-10-20 10:57:12.705770
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed.
-
-zhaojf85/docker-flask
-https://github.com/zhaojf85/docker-flask
-Entry file: docker-flask/hello-flask/app.py
-Scanned: 2016-10-20 10:57:13.907090
-No vulnerabilities found.
-
-
-higoreduardo/flask-blog
-https://github.com/higoreduardo/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 10:57:14.442018
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-sholsapp/flask-science
-https://github.com/sholsapp/flask-science
-Entry file: flask-science/flaskscience/__init__.py
-Scanned: 2016-10-20 10:57:15.670472
-No vulnerabilities found.
-
-
-luoluohang/flask_blog
-https://github.com/luoluohang/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 10:57:16.160029
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mnzr/MegaFlask
-https://github.com/mnzr/MegaFlask
-Entry file: MegaFlask/app/__init__.py
-Scanned: 2016-10-20 10:57:17.517410
-No vulnerabilities found.
-
-
-rchibana/MicroBlog
-https://github.com/rchibana/MicroBlog
-Entry file: None
-Scanned: 2016-10-20 10:57:18.021064
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-damstrom/flask-hello-world
-https://github.com/damstrom/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 10:57:18.574565
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-atf1999/Flask-Mega-Tutorial
-https://github.com/atf1999/Flask-Mega-Tutorial
-Entry file: Flask-Mega-Tutorial/app/__init__.py
-Scanned: 2016-10-20 10:57:19.071686
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ThukralAman/flaskApp2
-https://github.com/ThukralAman/flaskApp2
-Entry file: flaskApp2/app.py
-Scanned: 2016-10-20 10:57:20.394033
-No vulnerabilities found.
-
-
-apeete/flaskHelloWorld
-https://github.com/apeete/flaskHelloWorld
-Entry file: flaskHelloWorld/app.py
-Scanned: 2016-10-20 10:57:49.021814
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lucidfrontier45/FlaskRethinkDBProject
-https://github.com/lucidfrontier45/FlaskRethinkDBProject
-Entry file: FlaskRethinkDBProject/webapp/factory.py
-Scanned: 2016-10-20 10:57:50.324977
-No vulnerabilities found.
-
-
-jwnwilson/flask_gae_example
-https://github.com/jwnwilson/flask_gae_example
-Entry file: flask_gae_example/hello_world.py
-Scanned: 2016-10-20 10:57:51.966468
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-saichandra286/BlogSpot-using-flask
-https://github.com/saichandra286/BlogSpot-using-flask
-Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py
-Scanned: 2016-10-20 10:57:53.443771
-No vulnerabilities found.
-
-
-Hyvjan/flask-hello-world
-https://github.com/Hyvjan/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 10:57:54.045921
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-auslander70/flask_hello_world
-https://github.com/auslander70/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 10:57:54.567598
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/auslander70/flask_hello_world.
-
-BugisDev/AppSurvey-Flask
-https://github.com/BugisDev/AppSurvey-Flask
-Entry file: AppSurvey-Flask/app.py
-Scanned: 2016-10-20 10:57:55.925873
-No vulnerabilities found.
-
-
-purpleP/flask_alchemy_rest
-https://github.com/purpleP/flask_alchemy_rest
-Entry file: flask_alchemy_rest/tests/test_endpoints.py
-Scanned: 2016-10-20 10:57:58.175913
-No vulnerabilities found.
-
-
-yueyehm/flask_hello_world
-https://github.com/yueyehm/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 10:57:58.665885
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yueyehm/flask_hello_world.
-
-lhr0916/flask_redis_task_q
-https://github.com/lhr0916/flask_redis_task_q
-Entry file: flask_redis_task_q/web/app.py
-Scanned: 2016-10-20 10:57:59.905967
-No vulnerabilities found.
-
-
-PrettyPrinted/flask-request-decorators
-https://github.com/PrettyPrinted/flask-request-decorators
-Entry file: flask-request-decorators/request_decorators.py
-Scanned: 2016-10-20 10:58:01.125636
-No vulnerabilities found.
-
-
-ics/Flask-GnuPG
-https://github.com/ics/Flask-GnuPG
-Entry file: Flask-GnuPG/test_flask_gnupg.py
-Scanned: 2016-10-20 10:58:06.351273
-No vulnerabilities found.
-
-
-johnkabler/flask_dash_learn
-https://github.com/johnkabler/flask_dash_learn
-Entry file: flask_dash_learn/first_app.py
-Scanned: 2016-10-20 10:58:07.559735
-No vulnerabilities found.
-
-
-leitu/netscaler-flask-api
-https://github.com/leitu/netscaler-flask-api
-Entry file: netscaler-flask-api/netscaler_api/__init__.py
-Scanned: 2016-10-20 10:58:08.895558
-No vulnerabilities found.
-
-
-shilpasanthosh/flask-user-login-app
-https://github.com/shilpasanthosh/flask-user-login-app
-Entry file: flask-user-login-app/loginapp/__init__.py
-Scanned: 2016-10-20 10:58:09.530108
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rasselpratomo/simple_flask_restful
-https://github.com/rasselpratomo/simple_flask_restful
-Entry file: simple_flask_restful/app/__init__.py
-Scanned: 2016-10-20 10:58:10.030809
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PrettyPrinted/flask-uploads-intro
-https://github.com/PrettyPrinted/flask-uploads-intro
-Entry file: flask-uploads-intro/upload.py
-Scanned: 2016-10-20 10:58:11.539158
-No vulnerabilities found.
-
-
-kojoidrissa/flask_intro_video
-https://github.com/kojoidrissa/flask_intro_video
-Entry file: flask_intro_video/8c/app/__init__.py
-Scanned: 2016-10-20 10:58:12.936812
-No vulnerabilities found.
-
-
-joe8767/flask-restful-example
-https://github.com/joe8767/flask-restful-example
-Entry file: flask-restful-example/api.py
-Scanned: 2016-10-20 10:58:13.477499
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrkewen/flask-hello-world
-https://github.com/mrkewen/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 10:58:13.995889
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-jmsalcido/python-flask-microblog
-https://github.com/jmsalcido/python-flask-microblog
-Entry file: python-flask-microblog/microblog/app/__init__.py
-Scanned: 2016-10-20 10:58:15.668284
-Vulnerability 1:
-File: python-flask-microblog/microblog/app/views.py
- > User input at line 107, trigger word ".data":
- username = form.username.data
-Reassigned in:
- File: python-flask-microblog/microblog/app/views.py
- > Line 108: g.user.username = username
- File: python-flask-microblog/microblog/app/views.py
- > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form)
-File: python-flask-microblog/microblog/app/views.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username))
-
-Vulnerability 2:
-File: python-flask-microblog/microblog/app/views.py
- > User input at line 107, trigger word ".data":
- username = form.username.data
-Reassigned in:
- File: python-flask-microblog/microblog/app/views.py
- > Line 108: g.user.username = username
- File: python-flask-microblog/microblog/app/views.py
- > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form)
-File: python-flask-microblog/microblog/app/views.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username))
-
-Vulnerability 3:
-File: python-flask-microblog/microblog/app/forms.py
- > User input at line 34, trigger word ".data":
- users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all()
-File: python-flask-microblog/microblog/app/forms.py
- > reaches line 34, trigger word "filter(":
- users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all()
-
-
-
-ettanany/flask-angular-contact-manager
-https://github.com/ettanany/flask-angular-contact-manager
-Entry file: flask-angular-contact-manager/server/app/__init__.py
-Scanned: 2016-10-20 10:58:17.453918
-No vulnerabilities found.
-
-
-nausheenfatma/WebAppWithFlask
-https://github.com/nausheenfatma/WebAppWithFlask
-Entry file: WebAppWithFlask/model.py
-Scanned: 2016-10-20 10:58:18.760912
-Vulnerability 1:
-File: WebAppWithFlask/controller.py
- > User input at line 21, trigger word "form[":
- post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published'])
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 22: post_add = post.add(post)
- File: WebAppWithFlask/controller.py
- > Line 27: error = post_add
-File: WebAppWithFlask/controller.py
- > reaches line 28, trigger word "flash(":
- flash(error)
-
-Vulnerability 2:
-File: WebAppWithFlask/controller.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
- File: WebAppWithFlask/controller.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
-File: WebAppWithFlask/controller.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post)
-
-Vulnerability 3:
-File: WebAppWithFlask/controller.py
- > User input at line 57, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 62: post_delete = post.delete(post)
- File: WebAppWithFlask/controller.py
- > Line 66: error = post_delete
-File: WebAppWithFlask/controller.py
- > reaches line 67, trigger word "flash(":
- flash(error)
-
-
-
-marcfilba/videoStreamingFlask
-https://github.com/marcfilba/videoStreamingFlask
-Entry file: videoStreamingFlask/main.py
-Scanned: 2016-10-20 10:58:19.972577
-No vulnerabilities found.
-
-
-Jacob234/Flask-hello-world
-https://github.com/Jacob234/Flask-hello-world
-Entry file: Flask-hello-world/hello_world.py
-Scanned: 2016-10-20 10:58:21.179666
-No vulnerabilities found.
-
-
-PrettyPrinted/flask-restless-post
-https://github.com/PrettyPrinted/flask-restless-post
-Entry file: flask-restless-post/restless.py
-Scanned: 2016-10-20 10:58:22.377693
-No vulnerabilities found.
-
-
-austindavid/flasktaskr-cont
-https://github.com/austindavid/flasktaskr-cont
-Entry file: flasktaskr-cont/project/__init__.py
-Scanned: 2016-10-20 10:58:23.718432
-No vulnerabilities found.
-
-
-RicoChou/MyFlasky
-https://github.com/RicoChou/MyFlasky
-Entry file: MyFlasky/app/__init__.py
-Scanned: 2016-10-20 10:58:25.496222
-Vulnerability 1:
-File: MyFlasky/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 55: posts = pagination.items
- File: MyFlasky/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: MyFlasky/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 45: show_followed = False
- File: MyFlasky/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: MyFlasky/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 67: posts = pagination.items
-File: MyFlasky/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: MyFlasky/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: MyFlasky/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 134: comments = pagination.items
- File: MyFlasky/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: MyFlasky/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: MyFlasky/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: MyFlasky/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: MyFlasky/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: MyFlasky/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: MyFlasky/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 246: comments = pagination.items
-File: MyFlasky/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 45: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 45: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 45: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: MyFlasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlasky/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: MyFlasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlasky/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: MyFlasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlasky/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-alexwilkerson/microblog
-https://github.com/alexwilkerson/microblog
-Entry file: None
-Scanned: 2016-10-20 10:58:25.997341
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tdvtoan/scorecard-recognition
-https://github.com/tdvtoan/scorecard-recognition
-Entry file: scorecard-recognition/project/__init__.py
-Scanned: 2016-10-20 10:58:49.530298
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-quiqua/docker-flask-celery-redis-example
-https://github.com/quiqua/docker-flask-celery-redis-example
-Entry file: docker-flask-celery-redis-example/src/myapp/app.py
-Scanned: 2016-10-20 10:58:50.783375
-No vulnerabilities found.
-
-
-saichandra286/Complete-Angularjs-Flask-Todo-App
-https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App
-Entry file: None
-Scanned: 2016-10-20 10:58:51.295246
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App.
-
-MakeSchool-17/trip-planner-flask-backend-thetopplayer
-https://github.com/MakeSchool-17/trip-planner-flask-backend-thetopplayer
-Entry file: trip-planner-flask-backend-thetopplayer/server.py
-Scanned: 2016-10-20 10:58:55.010978
-No vulnerabilities found.
-
-
-MacHu-GWU/flask-restless-api-client-project
-https://github.com/MacHu-GWU/flask-restless-api-client-project
-Entry file: flask-restless-api-client-project/tests/CustomizeSerialization/run_server.py
-Scanned: 2016-10-20 10:58:56.330703
-No vulnerabilities found.
-
-
-whiskeyromeo/bucketlist
-https://github.com/whiskeyromeo/bucketlist
-Entry file: None
-Scanned: 2016-10-20 10:58:56.876870
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CHHLeo/foruV1home_flask_pycharm_practice
-https://github.com/CHHLeo/foruV1home_flask_pycharm_practice
-Entry file: foruV1home_flask_pycharm_practice/flask_pycharm_practice.py
-Scanned: 2016-10-20 10:58:57.402374
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-heamon7/learn-restful
-https://github.com/heamon7/learn-restful
-Entry file: learn-restful/app.py
-Scanned: 2016-10-20 10:59:00.110986
-Vulnerability 1:
-File: learn-restful/app.py
- > User input at line 82, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: learn-restful/app.py
- > reaches line 89, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-goodyvn/flask
-https://github.com/goodyvn/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 10:59:07.655912
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-stevebannon/flask
-https://github.com/stevebannon/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 10:59:08.210127
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sebkouba/dynamic-flask-form
-https://github.com/sebkouba/dynamic-flask-form
-Entry file: dynamic-flask-form/multimodel.py
-Scanned: 2016-10-20 10:59:10.530727
-No vulnerabilities found.
-
-
-solutionspecialist/flaskr
-https://github.com/solutionspecialist/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 10:59:11.030515
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-XingxinLi/flaskr
-https://github.com/XingxinLi/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 10:59:11.546821
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-willianribeiro/flaskr
-https://github.com/willianribeiro/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 10:59:12.068445
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wiggitywalt/flasktaskr
-https://github.com/wiggitywalt/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 10:59:13.558691
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mg6/flaskr
-https://github.com/mg6/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 10:59:14.067582
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sourHobbes/flaskdemo
-https://github.com/sourHobbes/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 10:59:14.588130
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Bayaz/flasktaskr
-https://github.com/Bayaz/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 10:59:17.088401
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kewsie/flasky
-https://github.com/kewsie/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 10:59:17.609978
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-metakermit/resin-home-automator
-https://github.com/metakermit/resin-home-automator
-Entry file: resin-home-automator/src/main.py
-Scanned: 2016-10-20 10:59:20.474699
-No vulnerabilities found.
-
-
-zerodaemon/flask1
-https://github.com/zerodaemon/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 10:59:21.079309
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-guiti1/FlaskAp
-https://github.com/guiti1/FlaskAp
-Entry file: FlaskAp/FlaskApp/__init__.py
-Scanned: 2016-10-20 10:59:21.731888
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/genericpath.py
-
-JoshLandry/FlaskBlog
-https://github.com/JoshLandry/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 10:59:22.373948
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Bayaz/FlaskBlog
-https://github.com/Bayaz/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 10:59:23.964001
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-colindjk/flaskTest
-https://github.com/colindjk/flaskTest
-Entry file: flaskTest/url.py
-Scanned: 2016-10-20 10:59:24.481758
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Arsh23/random-crossword-generater
-https://github.com/Arsh23/random-crossword-generater
-Entry file: random-crossword-generater/app.py
-Scanned: 2016-10-20 10:59:26.978459
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zengyifa/flask-starter
-https://github.com/zengyifa/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 10:59:51.000834
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mauriciorey/learning_flask
-https://github.com/mauriciorey/learning_flask
-Entry file: learning_flask/routes.py
-Scanned: 2016-10-20 10:59:53.995983
-Vulnerability 1:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 93, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-Vulnerability 2:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 96, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-
-
-petrgru/flask-remenarna
-https://github.com/petrgru/flask-remenarna
-Entry file: flask-remenarna/app/__init__.py
-Scanned: 2016-10-20 10:59:54.983466
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-spark0128/flask-intro
-https://github.com/spark0128/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 10:59:55.505414
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bcb/flask-uploads
-https://github.com/bcb/flask-uploads
-Entry file: flask-uploads/tests/test-uploads.py
-Scanned: 2016-10-20 10:59:57.056671
-No vulnerabilities found.
-
-
-kumaraswins/flask-angular
-https://github.com/kumaraswins/flask-angular
-Entry file: None
-Scanned: 2016-10-20 10:59:57.593387
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rookiebulls/flask-learn
-https://github.com/rookiebulls/flask-learn
-Entry file: flask-learn/app/__init__.py
-Scanned: 2016-10-20 11:00:05.385465
-Vulnerability 1:
-File: flask-learn/app/main/views.py
- > User input at line 65, trigger word "get(":
- post = Post.query.get(post_id)
-File: flask-learn/app/main/views.py
- > reaches line 67, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('main/article.html',post=post, catergories=catergories)
-
-
-
-climberwb/flask-blog
-https://github.com/climberwb/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:00:05.963154
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Hyvjan/flask-blog
-https://github.com/Hyvjan/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:00:06.508123
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-xingyz/flask_thebutton
-https://github.com/xingyz/flask_thebutton
-Entry file: flask_thebutton/app/__init__.py
-Scanned: 2016-10-20 11:00:07.004023
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brittanymcgarr/learningFlask
-https://github.com/brittanymcgarr/learningFlask
-Entry file: learningFlask/hello.py
-Scanned: 2016-10-20 11:00:07.647075
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py
-
-PrettyPrinted/flask-sessions
-https://github.com/PrettyPrinted/flask-sessions
-Entry file: flask-sessions/web.py
-Scanned: 2016-10-20 11:00:08.142637
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pfig/flask-elasticsearch
-https://github.com/pfig/flask-elasticsearch
-Entry file: flask-elasticsearch/flask_elasticsearch.py
-Scanned: 2016-10-20 11:00:09.476480
-No vulnerabilities found.
-
-
-nimeshkverma/Ideal_Flask
-https://github.com/nimeshkverma/Ideal_Flask
-Entry file: None
-Scanned: 2016-10-20 11:00:10.002753
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tholsapp/flask_framework
-https://github.com/tholsapp/flask_framework
-Entry file: flask_framework/app/__init__.py
-Scanned: 2016-10-20 11:00:12.319799
-No vulnerabilities found.
-
-
-evansa/flask-sqlalchemy
-https://github.com/evansa/flask-sqlalchemy
-Entry file: flask-sqlalchemy/run.py
-Scanned: 2016-10-20 11:00:12.855935
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Kajvdh/nao-flask
-https://github.com/Kajvdh/nao-flask
-Entry file: nao-flask/app.py
-Scanned: 2016-10-20 11:00:13.371529
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-anbasile/flask_sample
-https://github.com/anbasile/flask_sample
-Entry file: flask_sample/app_hello.py
-Scanned: 2016-10-20 11:00:13.903864
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-androidzhibinw/Flask-reg
-https://github.com/androidzhibinw/Flask-reg
-Entry file: Flask-reg/app.py
-Scanned: 2016-10-20 11:00:14.432786
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrasband/flask-seed
-https://github.com/mrasband/flask-seed
-Entry file: None
-Scanned: 2016-10-20 11:00:14.923937
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed.
-
-vrokida/demo-flask
-https://github.com/vrokida/demo-flask
-Entry file: demo-flask/app.py
-Scanned: 2016-10-20 11:00:17.427583
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-Clarity-89/server_flask
-https://github.com/Clarity-89/server_flask
-Entry file: server_flask/Flask Test.py
-Scanned: 2016-10-20 11:00:19.256246
-No vulnerabilities found.
-
-
-jcmflenso/flask-udemy
-https://github.com/jcmflenso/flask-udemy
-Entry file: flask-udemy/hello.py
-Scanned: 2016-10-20 11:00:22.484160
-No vulnerabilities found.
-
-
-schakalakka/flask-project
-https://github.com/schakalakka/flask-project
-Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:00:29.565816
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-simongareste/flask-dummy
-https://github.com/simongareste/flask-dummy
-Entry file: flask-dummy/flask_dummy/__init__.py
-Scanned: 2016-10-20 11:00:31.237080
-No vulnerabilities found.
-
-
-liu1020269358/learn-flask
-https://github.com/liu1020269358/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:00:31.958188
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-foobaar/flask-expt
-https://github.com/foobaar/flask-expt
-Entry file: flask-expt/flask-experiment.py
-Scanned: 2016-10-20 11:00:33.311517
-No vulnerabilities found.
-
-
-lucafaggianelli/flask-skeleton
-https://github.com/lucafaggianelli/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:00:33.826345
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lucafaggianelli/flask-skeleton.
-
-econne01/flask_blog
-https://github.com/econne01/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:00:51.318768
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mdeamon/flask_app
-https://github.com/mdeamon/flask_app
-Entry file: None
-Scanned: 2016-10-20 11:00:51.839532
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mdeamon/flask_app.
-
-dlrice/hello-flask
-https://github.com/dlrice/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 11:00:52.388936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-euler1337/flask_tutorial
-https://github.com/euler1337/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:00:54.929858
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-devyash/Intelligent-Public-Grievance-System
-https://github.com/devyash/Intelligent-Public-Grievance-System
-Entry file: Intelligent-Public-Grievance-System/app.py
-Scanned: 2016-10-20 11:00:56.439036
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elphinkuo/ji_python_flask
-https://github.com/elphinkuo/ji_python_flask
-Entry file: ji_python_flask/app/__init__.py
-Scanned: 2016-10-20 11:00:56.966226
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-afaki077/minitweet
-https://github.com/afaki077/minitweet
-Entry file: None
-Scanned: 2016-10-20 11:00:58.505841
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/afaki077/minitweet.
-
-ThukralAman/flaskApp2
-https://github.com/ThukralAman/flaskApp2
-Entry file: flaskApp2/app.py
-Scanned: 2016-10-20 11:00:59.844969
-No vulnerabilities found.
-
-
-sbm367/flaskTest2
-https://github.com/sbm367/flaskTest2
-Entry file: flaskTest2/flaskTest.py
-Scanned: 2016-10-20 11:01:07.127606
-No vulnerabilities found.
-
-
-emil-k/climate-compare_FlaskApp
-https://github.com/emil-k/climate-compare_FlaskApp
-Entry file: climate-compare_FlaskApp/__init__.py
-Scanned: 2016-10-20 11:01:07.707101
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: climate-compare_FlaskApp/venv/lib/python2.7/genericpath.py
-
-daytonight/Flask-Web-Development-code
-https://github.com/daytonight/Flask-Web-Development-code
-Entry file: Flask-Web-Development-code/venv/lib/python2.7/site-packages/flask/sessions.py
-Scanned: 2016-10-20 11:01:16.245093
-No vulnerabilities found.
-
-
-lkpanganiban/flask-mega-tutorial
-https://github.com/lkpanganiban/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 11:01:16.820083
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Cosaquee/flask-weather-app
-https://github.com/Cosaquee/flask-weather-app
-Entry file: flask-weather-app/main.py
-Scanned: 2016-10-20 11:01:23.675689
-No vulnerabilities found.
-
-
-saichandra286/BlogSpot-using-flask
-https://github.com/saichandra286/BlogSpot-using-flask
-Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py
-Scanned: 2016-10-20 11:01:25.222899
-No vulnerabilities found.
-
-
-afborodin/simple-mysql-flask-app
-https://github.com/afborodin/simple-mysql-flask-app
-Entry file: simple-mysql-flask-app/app/__init__.py
-Scanned: 2016-10-20 11:01:25.759343
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dternyak/my-react-flask-blog
-https://github.com/dternyak/my-react-flask-blog
-Entry file: my-react-flask-blog/index.py
-Scanned: 2016-10-20 11:01:27.039595
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-skriems/flask-cherrypy-dockerized
-https://github.com/skriems/flask-cherrypy-dockerized
-Entry file: flask-cherrypy-dockerized/app.py
-Scanned: 2016-10-20 11:01:28.339505
-No vulnerabilities found.
-
-
-johnkabler/flask_dash_learn
-https://github.com/johnkabler/flask_dash_learn
-Entry file: flask_dash_learn/first_app.py
-Scanned: 2016-10-20 11:01:29.635216
-No vulnerabilities found.
-
-
-broak/flask-hello-world
-https://github.com/broak/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:01:30.285760
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ABaldwinHunter/flask-clone-classic
-https://github.com/ABaldwinHunter/flask-clone-classic
-Entry file: flask-clone-classic/setup.py
-Scanned: 2016-10-20 11:01:31.914127
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ldrunner100/flask_hello_world
-https://github.com/ldrunner100/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 11:01:32.435897
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ldrunner100/flask_hello_world.
-
-FinleySmile/flask_blog_demo
-https://github.com/FinleySmile/flask_blog_demo
-Entry file: flask_blog_demo/flask_blog_demo.py
-Scanned: 2016-10-20 11:01:35.119831
-Vulnerability 1:
-File: flask_blog_demo/flask_blog_demo.py
- > User input at line 63, trigger word "form[":
- username = request.form['username']
-Reassigned in:
- File: flask_blog_demo/flask_blog_demo.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_entries'))
-File: flask_blog_demo/flask_blog_demo.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',username=username, error=error)
-
-
-
-quandrei/godzilla-foxfire-flask
-https://github.com/quandrei/godzilla-foxfire-flask
-Entry file: godzilla-foxfire-flask/app/__init__.py
-Scanned: 2016-10-20 11:01:37.808537
-No vulnerabilities found.
-
-
-ArTrics/Flask_Angular_Project
-https://github.com/ArTrics/Flask_Angular_Project
-Entry file: Flask_Angular_Project/index.py
-Scanned: 2016-10-20 11:01:38.508220
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/genericpath.py
-
-RodrigoVillatoro/flask_social_network
-https://github.com/RodrigoVillatoro/flask_social_network
-Entry file: flask_social_network/app/__init__.py
-Scanned: 2016-10-20 11:01:41.577372
-Vulnerability 1:
-File: flask_social_network/app/main/views.py
- > User input at line 47, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 56: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 61: posts = pagination.items
- File: flask_social_network/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 62, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask_social_network/app/main/views.py
- > User input at line 50, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 48: show_followed = False
- File: flask_social_network/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 62, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask_social_network/app/main/views.py
- > User input at line 74, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 75: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 80: posts = pagination.items
-File: flask_social_network/app/main/views.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask_social_network/app/main/views.py
- > User input at line 146, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 148: page = post.comments.count() - 1 // current_app.config['APP_COMMENTS_PER_PAGE'] + 1
- File: flask_social_network/app/main/views.py
- > Line 150: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 155: comments = pagination.items
- File: flask_social_network/app/main/views.py
- > Line 145: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.post',id=post.id, page=-1))
-File: flask_social_network/app/main/views.py
- > reaches line 156, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask_social_network/app/main/views.py
- > User input at line 220, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 221: pagination = user.followers.paginate(page,per_page=current_app.config['APP_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 226: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_social_network/app/main/views.py
- > Line 219: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 228, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='main.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask_social_network/app/main/views.py
- > User input at line 244, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 245: pagination = user.followed.paginate(page,per_page=current_app.config['APP_FOLLOWING_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 250: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_social_network/app/main/views.py
- > Line 243: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 252, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='main.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask_social_network/app/main/views.py
- > User input at line 282, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 283: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 288: comments = pagination.items
-File: flask_social_network/app/main/views.py
- > reaches line 289, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 21: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 22: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 25: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 24, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 21: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 22: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 25: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 27, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 21: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 22: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 25: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 28, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 11:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 49: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 49: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 51, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 49: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 52, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 14:
-File: flask_social_network/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/posts.py
- > Line 17: posts = pagination.items
- File: flask_social_network/app/api_1_0/posts.py
- > Line 18: prev_page = None
- File: flask_social_network/app/api_1_0/posts.py
- > Line 21: next_page = None
-File: flask_social_network/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flask_social_network/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/posts.py
- > Line 17: posts = pagination.items
- File: flask_social_network/app/api_1_0/posts.py
- > Line 18: prev_page = None
- File: flask_social_network/app/api_1_0/posts.py
- > Line 21: next_page = None
-File: flask_social_network/app/api_1_0/posts.py
- > reaches line 23, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flask_social_network/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/posts.py
- > Line 17: posts = pagination.items
- File: flask_social_network/app/api_1_0/posts.py
- > Line 18: prev_page = None
- File: flask_social_network/app/api_1_0/posts.py
- > Line 21: next_page = None
-File: flask_social_network/app/api_1_0/posts.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 17:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 16: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 17: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 20: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 19, trigger word "url_for(":
- prev_page = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 16: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 17: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 20: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 22, trigger word "url_for(":
- next_page = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 16: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 17: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 20: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total)
-
-Vulnerability 20:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 44: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 45: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 48: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 47, trigger word "url_for(":
- prev_page = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 44: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 45: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 48: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 50, trigger word "url_for(":
- next_page = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 44: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 45: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 48: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 51, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total)
-
-
-
-mdublin/Flask-CRUD-template
-https://github.com/mdublin/Flask-CRUD-template
-Entry file: Flask-CRUD-template/blog/__init__.py
-Scanned: 2016-10-20 11:01:42.116729
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-p00gz/flask-imdbratings-app-backend
-https://github.com/p00gz/flask-imdbratings-app-backend
-Entry file: flask-imdbratings-app-backend/imdbRatings/__init__.py
-Scanned: 2016-10-20 11:01:42.661494
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-moonlitesolutions/flask_rest_template
-https://github.com/moonlitesolutions/flask_rest_template
-Entry file: flask_rest_template/flask_rest/api/api.py
-Scanned: 2016-10-20 11:01:55.959618
-No vulnerabilities found.
-
-
-mrkewen/flask-hello-world
-https://github.com/mrkewen/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:01:56.530915
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-wasw100/flask-sqlalchemy-demo2
-https://github.com/wasw100/flask-sqlalchemy-demo2
-Entry file: flask-sqlalchemy-demo2/hello.py
-Scanned: 2016-10-20 11:01:57.050868
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-artisanofcode/flask-generic-views
-https://github.com/artisanofcode/flask-generic-views
-Entry file: flask-generic-views/tests/__init__.py
-Scanned: 2016-10-20 11:01:57.564714
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-mekanix/flask-bootstrap-sql-rest
-https://github.com/mekanix/flask-bootstrap-sql-rest
-Entry file: flask-bootstrap-sql-rest/manage.py
-Scanned: 2016-10-20 11:01:58.923293
-No vulnerabilities found.
-
-
-ayesandarmoe/microblog_flask_tutorial
-https://github.com/ayesandarmoe/microblog_flask_tutorial
-Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:02:00.799597
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexwilkerson/flask-hello-world
-https://github.com/alexwilkerson/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:02:01.351327
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-nausheenfatma/WebAppWithFlask
-https://github.com/nausheenfatma/WebAppWithFlask
-Entry file: WebAppWithFlask/model.py
-Scanned: 2016-10-20 11:02:02.750852
-Vulnerability 1:
-File: WebAppWithFlask/controller.py
- > User input at line 21, trigger word "form[":
- post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published'])
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 22: post_add = post.add(post)
- File: WebAppWithFlask/controller.py
- > Line 27: error = post_add
-File: WebAppWithFlask/controller.py
- > reaches line 28, trigger word "flash(":
- flash(error)
-
-Vulnerability 2:
-File: WebAppWithFlask/controller.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
- File: WebAppWithFlask/controller.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
-File: WebAppWithFlask/controller.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post)
-
-Vulnerability 3:
-File: WebAppWithFlask/controller.py
- > User input at line 57, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 62: post_delete = post.delete(post)
- File: WebAppWithFlask/controller.py
- > Line 66: error = post_delete
-File: WebAppWithFlask/controller.py
- > reaches line 67, trigger word "flash(":
- flash(error)
-
-
-
-yaoelvon/flask-uwsgi-demo
-https://github.com/yaoelvon/flask-uwsgi-demo
-Entry file: flask-uwsgi-demo/DeployingFlask/myflaskapp.py
-Scanned: 2016-10-20 11:02:08.070493
-No vulnerabilities found.
-
-
-Owen-Gillespie/FeatureLabsFlaskDemo
-https://github.com/Owen-Gillespie/FeatureLabsFlaskDemo
-Entry file: FeatureLabsFlaskDemo/main.py
-Scanned: 2016-10-20 11:02:08.775452
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sheldonsmickley/flaskemail_app
-https://github.com/sheldonsmickley/flaskemail_app
-Entry file: flaskemail_app/emails.py
-Scanned: 2016-10-20 11:02:10.195218
-Vulnerability 1:
-File: flaskemail_app/emails.py
- > User input at line 57, trigger word "form[":
- url = c.execute('select url from emails where company_name like ?', (request.form['existing_company']))
-Reassigned in:
- File: flaskemail_app/emails.py
- > Line 58: url = url.fetchall()[0][0]
-File: flaskemail_app/emails.py
- > reaches line 57, trigger word "execute(":
- url = c.execute('select url from emails where company_name like ?', (request.form['existing_company']))
-
-Vulnerability 2:
-File: flaskemail_app/emails.py
- > User input at line 57, trigger word "form[":
- url = c.execute('select url from emails where company_name like ?', (request.form['existing_company']))
-Reassigned in:
- File: flaskemail_app/emails.py
- > Line 58: url = url.fetchall()[0][0]
-File: flaskemail_app/emails.py
- > reaches line 59, trigger word "execute(":
- c.execute('INSERT into emails (company_name, email, url) values (?, ?, ?)', (request.form['existing_company'], request.form['email'], url))
-
-
-
-tianxie/my_flasky
-https://github.com/tianxie/my_flasky
-Entry file: None
-Scanned: 2016-10-20 11:02:10.725620
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tianxie/my_flasky.
-
-richardsop/REST-API
-https://github.com/richardsop/REST-API
-Entry file: REST-API/app.py
-Scanned: 2016-10-20 11:02:17.247589
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shas15/Betting-Chips
-https://github.com/shas15/Betting-Chips
-Entry file: Betting-Chips/test.py
-Scanned: 2016-10-20 11:02:18.669321
-Vulnerability 1:
-File: Betting-Chips/Models/User.py
- > User input at line 20, trigger word "form[":
- login_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 22, trigger word "filter(":
- found = User.query.filter(User.id == login_id, User.password == login_password).first()
-
-Vulnerability 2:
-File: Betting-Chips/Models/User.py
- > User input at line 21, trigger word "form[":
- login_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 22, trigger word "filter(":
- found = User.query.filter(User.id == login_id, User.password == login_password).first()
-
-Vulnerability 3:
-File: Betting-Chips/Models/User.py
- > User input at line 20, trigger word "form[":
- login_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 27, trigger word "jsonify(":
- print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True))
-
-Vulnerability 4:
-File: Betting-Chips/Models/User.py
- > User input at line 21, trigger word "form[":
- login_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 27, trigger word "jsonify(":
- print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True))
-
-Vulnerability 5:
-File: Betting-Chips/Models/User.py
- > User input at line 20, trigger word "form[":
- login_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 32, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success')
-
-Vulnerability 6:
-File: Betting-Chips/Models/User.py
- > User input at line 21, trigger word "form[":
- login_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 32, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success')
-
-Vulnerability 7:
-File: Betting-Chips/Models/User.py
- > User input at line 45, trigger word "form[":
- signup_name = request.form['name']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 49: user.name = signup_name
-File: Betting-Chips/Models/User.py
- > reaches line 54, trigger word "jsonify(":
- print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True))
-
-Vulnerability 8:
-File: Betting-Chips/Models/User.py
- > User input at line 46, trigger word "form[":
- signup_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 50: user.id = signup_id
-File: Betting-Chips/Models/User.py
- > reaches line 54, trigger word "jsonify(":
- print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True))
-
-Vulnerability 9:
-File: Betting-Chips/Models/User.py
- > User input at line 47, trigger word "form[":
- signup_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 51: user.password = signup_password
-File: Betting-Chips/Models/User.py
- > reaches line 54, trigger word "jsonify(":
- print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True))
-
-Vulnerability 10:
-File: Betting-Chips/Models/User.py
- > User input at line 45, trigger word "form[":
- signup_name = request.form['name']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 49: user.name = signup_name
-File: Betting-Chips/Models/User.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success')
-
-Vulnerability 11:
-File: Betting-Chips/Models/User.py
- > User input at line 46, trigger word "form[":
- signup_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 50: user.id = signup_id
-File: Betting-Chips/Models/User.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success')
-
-Vulnerability 12:
-File: Betting-Chips/Models/User.py
- > User input at line 47, trigger word "form[":
- signup_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 51: user.password = signup_password
-File: Betting-Chips/Models/User.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success')
-
-
-
-malong5219/SampleBlog
-https://github.com/malong5219/SampleBlog
-Entry file: SampleBlog/app/__init__.py
-Scanned: 2016-10-20 11:02:25.209943
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexwilkerson/microblog
-https://github.com/alexwilkerson/microblog
-Entry file: None
-Scanned: 2016-10-20 11:02:26.709360
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tusharpawar/Agrostar_Flaskr
-https://github.com/tusharpawar/Agrostar_Flaskr
-Entry file: None
-Scanned: 2016-10-20 11:02:27.218902
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-eunseo9808/fakeArtist
-https://github.com/eunseo9808/fakeArtist
-Entry file: fakeArtist/test.py
-Scanned: 2016-10-20 11:02:28.620461
-No vulnerabilities found.
-
-
-semonalbertyeah/quickflask
-https://github.com/semonalbertyeah/quickflask
-Entry file: quickflask/app.py
-Scanned: 2016-10-20 11:02:29.143921
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jyang22/Flasky_blog
-https://github.com/jyang22/Flasky_blog
-Entry file: Flasky_blog/app/__init__.py
-Scanned: 2016-10-20 11:02:30.706141
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aceokay/microblog
-https://github.com/aceokay/microblog
-Entry file: None
-Scanned: 2016-10-20 11:02:31.278943
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dantin/microblog
-https://github.com/dantin/microblog
-Entry file: None
-Scanned: 2016-10-20 11:02:32.771549
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-suzf/Flask
-https://github.com/suzf/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:02:39.133029
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-buntyke/Flask
-https://github.com/buntyke/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:02:39.676361
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nowaja/flask
-https://github.com/nowaja/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:02:40.210528
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-b-e/flask
-https://github.com/b-e/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:02:42.808229
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-psuong/FlaskWorkshop
-https://github.com/psuong/FlaskWorkshop
-Entry file: FlaskWorkshop/jinja-templating/app.py
-Scanned: 2016-10-20 11:02:45.550825
-No vulnerabilities found.
-
-
-BLKStone/flask_image_search
-https://github.com/BLKStone/flask_image_search
-Entry file: flask_image_search/app/app.py
-Scanned: 2016-10-20 11:03:02.139799
-No vulnerabilities found.
-
-
-yj0914/flask-
-https://github.com/yj0914/flask-
-Entry file: flask-/num1.py
-Scanned: 2016-10-20 11:03:03.397646
-No vulnerabilities found.
-
-
-Bleezworld/flask_skeleton
-https://github.com/Bleezworld/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 11:03:03.900960
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-TwilioDevEd/lead-alerts-flask
-https://github.com/TwilioDevEd/lead-alerts-flask
-Entry file: None
-Scanned: 2016-10-20 11:03:04.398207
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask.
-
-soasme/flask-perm
-https://github.com/soasme/flask-perm
-Entry file: flask-perm/example.py
-Scanned: 2016-10-20 11:03:09.093476
-Vulnerability 1:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 68, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 68, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'))
-
-Vulnerability 2:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 73, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}')
-File: flask-perm/tests/test_blueprint.py
- > reaches line 73, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}')
-
-Vulnerability 3:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 80, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 80, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id'])
-
-Vulnerability 4:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 87, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 87, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-
-Vulnerability 5:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 121, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 114, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.delete_permission',permission_id=permission['id']))
-
-Vulnerability 6:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 121, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 121, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-
-Vulnerability 7:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 172, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 171: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 173, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.revoke_user_permission',user_permission_id=id))
-
-Vulnerability 8:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 188, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 187: resp = add_user_group_permission(client, user_group['id'], permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 189, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.revoke_user_group_permission',user_group_permission_id=id))
-
-Vulnerability 9:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 199, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}')
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 198: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 199, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}')
-
-Vulnerability 10:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 210, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 209: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 210, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-
-Vulnerability 11:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 221, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}')
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 220: resp = add_user_group_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 221, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}')
-
-Vulnerability 12:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 232, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 231: resp = add_user_group_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 232, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-
-Vulnerability 13:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 245, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_groups'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 245, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_groups'))
-
-Vulnerability 14:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 280, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 279: resp = add_user_group_member(client, 1, user_group['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 281, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.delete_user_from_user_group',user_group_member_id=id))
-
-Vulnerability 15:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 291, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 291, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id'])
-
-Vulnerability 16:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 304, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_users'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 304, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_users'))
-
-Vulnerability 17:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 309, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user',user_id=1))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 309, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user',user_id=1))
-
-Vulnerability 18:
-File: flask-perm/flask_perm/admin.py
- > User input at line 12, trigger word "get(":
- render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERM_ADMIN_PREFIX') + '/api'current_app.config.get('PERM_ADMIN_PREFIX')current_app.config.get('DEBUG')
-Reassigned in:
- File: flask-perm/flask_perm/admin.py
- > Line 10: ret_MAYBE_FUNCTION_NAME = redirect(url_for('perm-admin.login'))
-File: flask-perm/flask_perm/admin.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/perm-admin/index.html',render_data)
-
-
-
-rishipuri/flasktodo
-https://github.com/rishipuri/flasktodo
-Entry file: flasktodo/application.py
-Scanned: 2016-10-20 11:03:09.870651
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Hyvjan/flasktaskr
-https://github.com/Hyvjan/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:03:10.390175
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zachary-russell/Flaskr
-https://github.com/zachary-russell/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 11:03:10.898877
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-storress/Flaskserver
-https://github.com/storress/Flaskserver
-Entry file: Flaskserver/main.py
-Scanned: 2016-10-20 11:03:12.169068
-No vulnerabilities found.
-
-
-dadasoz-cuelogic/flaskapp
-https://github.com/dadasoz-cuelogic/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:03:12.671520
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp.
-
-expersso/flaskr
-https://github.com/expersso/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:03:13.174881
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gileez/flasker
-https://github.com/gileez/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 11:03:17.691102
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sindhus/flaskr
-https://github.com/sindhus/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:03:18.196905
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nickaustinlee/flasktaskr
-https://github.com/nickaustinlee/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:03:25.713359
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Bayaz/flasktaskr
-https://github.com/Bayaz/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:03:27.231580
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-xavinso/flasktaskr
-https://github.com/xavinso/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:03:27.742252
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CharlieWinters/flaskapi
-https://github.com/CharlieWinters/flaskapi
-Entry file: flaskapi/aydaapi3.py
-Scanned: 2016-10-20 11:03:28.439607
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/genericpath.py
-
-kewsie/flasky
-https://github.com/kewsie/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:03:30.004358
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-land-pack/flaskBlog
-https://github.com/land-pack/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 11:03:31.652181
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-apeete/flaskBlog
-https://github.com/apeete/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 11:03:32.266429
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-OscarMelin/learning-flask-bootstrap
-https://github.com/OscarMelin/learning-flask-bootstrap
-Entry file: learning-flask-bootstrap/__init__.py
-Scanned: 2016-10-20 11:03:34.026898
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/genericpath.py
-
-cyan-blue/my_flask
-https://github.com/cyan-blue/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 11:03:34.675208
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-zachary-russell/Flask-Microblog
-https://github.com/zachary-russell/Flask-Microblog
-Entry file: Flask-Microblog/microblog/app/__init__.py
-Scanned: 2016-10-20 11:03:37.744200
-No vulnerabilities found.
-
-
-samwuu/flask_demo
-https://github.com/samwuu/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 11:03:39.273335
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hnb2/flask-customers
-https://github.com/hnb2/flask-customers
-Entry file: flask-customers/customers/__init__.py
-Scanned: 2016-10-20 11:03:40.716385
-Vulnerability 1:
-File: flask-customers/customers/front/view.py
- > User input at line 32, trigger word ".data":
- customer = Customer(email=form.email.data, password=form.password.data)
-Reassigned in:
- File: flask-customers/customers/front/view.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/front/view.py
- > reaches line 39, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(id=customer.id)
-
-Vulnerability 2:
-File: flask-customers/customers/back/view.py
- > User input at line 71, trigger word ".data":
- customer = Customer(email=form.email.data, password=AdminCustomer._generate_password())
-Reassigned in:
- File: flask-customers/customers/back/view.py
- > Line 69: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/back/view.py
- > reaches line 82, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(customer=customer.json)
-
-Vulnerability 3:
-File: flask-customers/customers/back/view.py
- > User input at line 147, trigger word ".data":
- page = form.page.data
-Reassigned in:
- File: flask-customers/customers/back/view.py
- > Line 151: start = page * CustomerService.RESULTS_PER_PAGE
- File: flask-customers/customers/back/view.py
- > Line 152: stop = start + CustomerService.RESULTS_PER_PAGE
- File: flask-customers/customers/back/view.py
- > Line 154: raw_customers = CustomerService.get_customers(start=start, stop=stop)
- File: flask-customers/customers/back/view.py
- > Line 145: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/back/view.py
- > reaches line 159, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(current_page=page, total_pages=int(total_pages), customers=[customer.json for customer in raw_customers])
-
-
-
-LeonNie52/Learn_Flask
-https://github.com/LeonNie52/Learn_Flask
-Entry file: Learn_Flask/hello.py
-Scanned: 2016-10-20 11:03:45.511261
-Vulnerability 1:
-File: Learn_Flask/app/main/views.py
- > User input at line 42, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 50: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 52: posts = pagination.items
- File: Learn_Flask/app/main/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog'))
-File: Learn_Flask/app/main/views.py
- > reaches line 53, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Learn_Flask/app/main/views.py
- > User input at line 45, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 43: show_followed = False
- File: Learn_Flask/app/main/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog'))
-File: Learn_Flask/app/main/views.py
- > reaches line 53, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Learn_Flask/app/main/views.py
- > User input at line 68, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 70: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Learn_Flask/app/main/views.py
- > Line 72: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 75: comments = pagination.items
- File: Learn_Flask/app/main/views.py
- > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Learn_Flask/app/main/views.py
- > reaches line 76, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: Learn_Flask/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Learn_Flask/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Learn_Flask/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: Learn_Flask/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Learn_Flask/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Learn_Flask/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Learn_Flask/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 246: comments = pagination.items
-File: Learn_Flask/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-penguin-penpen/learnFlask
-https://github.com/penguin-penpen/learnFlask
-Entry file: None
-Scanned: 2016-10-20 11:03:46.038397
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/penguin-penpen/learnFlask.
-
-raindrop4steven/tornadoFlask
-https://github.com/raindrop4steven/tornadoFlask
-Entry file: tornadoFlask/hello.py
-Scanned: 2016-10-20 11:03:47.596642
-No vulnerabilities found.
-
-
-mauriciorey/learning_flask
-https://github.com/mauriciorey/learning_flask
-Entry file: learning_flask/routes.py
-Scanned: 2016-10-20 11:03:50.800664
-Vulnerability 1:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 93, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-Vulnerability 2:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 96, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-
-
-cjmochrie/Flask-Demo
-https://github.com/cjmochrie/Flask-Demo
-Entry file: None
-Scanned: 2016-10-20 11:03:53.344614
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmochrie/Flask-Demo.
-
-zengyifa/flask-starter
-https://github.com/zengyifa/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 11:03:57.894288
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pfig/flask-elasticsearch
-https://github.com/pfig/flask-elasticsearch
-Entry file: flask-elasticsearch/flask_elasticsearch.py
-Scanned: 2016-10-20 11:04:04.238747
-No vulnerabilities found.
-
-
-olive42/moz-flask
-https://github.com/olive42/moz-flask
-Entry file: moz-flask/hello.py
-Scanned: 2016-10-20 11:04:05.449054
-No vulnerabilities found.
-
-
-nimeshkverma/Ideal_Flask
-https://github.com/nimeshkverma/Ideal_Flask
-Entry file: None
-Scanned: 2016-10-20 11:04:05.987176
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tholsapp/flask_framework
-https://github.com/tholsapp/flask_framework
-Entry file: flask_framework/app/__init__.py
-Scanned: 2016-10-20 11:04:07.199061
-No vulnerabilities found.
-
-
-nivanko/flask-catalog
-https://github.com/nivanko/flask-catalog
-Entry file: flask-catalog/application.py
-Scanned: 2016-10-20 11:04:09.740035
-Vulnerability 1:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 162, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username'))
-
-Vulnerability 2:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-Vulnerability 3:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-
-
-jaramago/flask-basic
-https://github.com/jaramago/flask-basic
-Entry file: flask-basic/app/__init__.py
-Scanned: 2016-10-20 11:04:12.109939
-No vulnerabilities found.
-
-
-valdemarpereira/flask_tutorial
-https://github.com/valdemarpereira/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:04:13.095709
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jit-1/flask-microblog
-https://github.com/jit-1/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 11:04:13.595072
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nof4444/Flask-mongodb
-https://github.com/nof4444/Flask-mongodb
-Entry file: Flask-mongodb/app.py
-Scanned: 2016-10-20 11:04:14.162063
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-mongodb/env/lib/python2.7/genericpath.py
-
-anbasile/flask_sample
-https://github.com/anbasile/flask_sample
-Entry file: flask_sample/app_hello.py
-Scanned: 2016-10-20 11:04:18.719888
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-VictorDMor/flask-app
-https://github.com/VictorDMor/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 11:04:19.260403
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sunway1988/MyFlask
-https://github.com/sunway1988/MyFlask
-Entry file: MyFlask/app/__init__.py
-Scanned: 2016-10-20 11:04:26.547461
-No vulnerabilities found.
-
-
-setiaji/learn_flask
-https://github.com/setiaji/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:04:28.094279
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-catcoderphp/flask-test
-https://github.com/catcoderphp/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:04:28.629584
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-ottoman91/flask_tutorial
-https://github.com/ottoman91/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:04:30.632594
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HiagoMayk/projetoFlask
-https://github.com/HiagoMayk/projetoFlask
-Entry file: projetoFlask/routes.py
-Scanned: 2016-10-20 11:04:32.944866
-No vulnerabilities found.
-
-
-nimeshkverma/Versioned_Flask
-https://github.com/nimeshkverma/Versioned_Flask
-Entry file: Versioned_Flask/app/__init__.py
-Scanned: 2016-10-20 11:04:34.705666
-No vulnerabilities found.
-
-
-huyquyet/flask-demo
-https://github.com/huyquyet/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:04:36.758928
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/huyquyet/flask-demo.
-
-seonhyeshin/flask-mysql
-https://github.com/seonhyeshin/flask-mysql
-Entry file: flask-mysql/app.py
-Scanned: 2016-10-20 11:04:40.857329
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/genericpath.py
-
-euler1337/flask_tutorial
-https://github.com/euler1337/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:04:41.342685
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-PhilipGough/flask_api
-https://github.com/PhilipGough/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 11:04:46.883426
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lauradebella/treinamentoFlask
-https://github.com/lauradebella/treinamentoFlask
-Entry file: treinamentoFlask/tutorialPythonClub/app.py
-Scanned: 2016-10-20 11:04:55.288310
-No vulnerabilities found.
-
-
-seanbehan/flask_websockets
-https://github.com/seanbehan/flask_websockets
-Entry file: flask_websockets/app.py
-Scanned: 2016-10-20 11:04:56.554635
-No vulnerabilities found.
-
-
-mburke05/flask_tutorial
-https://github.com/mburke05/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:04:57.067163
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-elphinkuo/ji_python_flask
-https://github.com/elphinkuo/ji_python_flask
-Entry file: ji_python_flask/app/__init__.py
-Scanned: 2016-10-20 11:04:58.607363
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rjuppa/microblog
-https://github.com/rjuppa/microblog
-Entry file: None
-Scanned: 2016-10-20 11:05:04.123185
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-depaoli/FlaskAppSample
-https://github.com/depaoli/FlaskAppSample
-Entry file: FlaskAppSample/flask_app_sample/__init__.py
-Scanned: 2016-10-20 11:05:06.390674
-No vulnerabilities found.
-
-
-webon100/ross_flask01
-https://github.com/webon100/ross_flask01
-Entry file: None
-Scanned: 2016-10-20 11:05:06.931366
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AlexProv/flaskRestApiSkeleton
-https://github.com/AlexProv/flaskRestApiSkeleton
-Entry file: flaskRestApiSkeleton/flaskServer.py
-Scanned: 2016-10-20 11:05:09.910773
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xavinso/flask_hello_world
-https://github.com/xavinso/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 11:05:11.454022
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xavinso/flask_hello_world.
-
-aetherwu/Flask-Docker-Template
-https://github.com/aetherwu/Flask-Docker-Template
-Entry file: Flask-Docker-Template/flask/web/__init__.py
-Scanned: 2016-10-20 11:05:21.733159
-Vulnerability 1:
-File: Flask-Docker-Template/flask/web/views.py
- > User input at line 234, trigger word ".data":
- kw = form.name.data
-File: Flask-Docker-Template/flask/web/views.py
- > reaches line 236, trigger word "filter(":
- user = User.query.filter(User.nickname == kw).first()
-
-Vulnerability 2:
-File: Flask-Docker-Template/flask/web/views.py
- > User input at line 562, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Docker-Template/flask/web/views.py
- > Line 550: user = User.query.filter_by(email=user_email).first()
- File: Flask-Docker-Template/flask/web/views.py
- > Line 552: current_user.id = user.id
- File: Flask-Docker-Template/flask/web/views.py
- > Line 577: current_user.id = user.id
-File: Flask-Docker-Template/flask/web/views.py
- > reaches line 554, trigger word "set_cookie(":
- response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60)
-
-Vulnerability 3:
-File: Flask-Docker-Template/flask/web/views.py
- > User input at line 562, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Docker-Template/flask/web/views.py
- > Line 550: user = User.query.filter_by(email=user_email).first()
- File: Flask-Docker-Template/flask/web/views.py
- > Line 552: current_user.id = user.id
- File: Flask-Docker-Template/flask/web/views.py
- > Line 577: current_user.id = user.id
-File: Flask-Docker-Template/flask/web/views.py
- > reaches line 587, trigger word "set_cookie(":
- response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60)
-
-
-
-tommyblue/flask-react-blog
-https://github.com/tommyblue/flask-react-blog
-Entry file: flask-react-blog/initializer.py
-Scanned: 2016-10-20 11:05:23.175997
-No vulnerabilities found.
-
-
-MikeHannon/python_flask_teams
-https://github.com/MikeHannon/python_flask_teams
-Entry file: python_flask_teams/server.py
-Scanned: 2016-10-20 11:05:23.702892
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tomquirk/js-flavoured-flask
-https://github.com/tomquirk/js-flavoured-flask
-Entry file: js-flavoured-flask/app/__init__.py
-Scanned: 2016-10-20 11:05:25.731113
-No vulnerabilities found.
-
-
-gtlambert/first_flask_app
-https://github.com/gtlambert/first_flask_app
-Entry file: first_flask_app/project.py
-Scanned: 2016-10-20 11:05:26.293844
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AngelMunoz/Flask-Blueprints-Template
-https://github.com/AngelMunoz/Flask-Blueprints-Template
-Entry file: Flask-Blueprints-Template/app/__init__.py
-Scanned: 2016-10-20 11:05:27.569922
-Vulnerability 1:
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > User input at line 15, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > Line 17: session['user_id'] = user.id
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > reaches line 18, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-Cosaquee/flask-weather-app
-https://github.com/Cosaquee/flask-weather-app
-Entry file: flask-weather-app/main.py
-Scanned: 2016-10-20 11:05:34.367679
-No vulnerabilities found.
-
-
-Ryanglambert/playing_with_flask
-https://github.com/Ryanglambert/playing_with_flask
-Entry file: playing_with_flask/hello.py
-Scanned: 2016-10-20 11:05:34.903661
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ArTrics/Flask_Angular_Project
-https://github.com/ArTrics/Flask_Angular_Project
-Entry file: Flask_Angular_Project/index.py
-Scanned: 2016-10-20 11:05:35.492857
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/genericpath.py
-
-orjanv/ESVtoLeetFlaskApp
-https://github.com/orjanv/ESVtoLeetFlaskApp
-Entry file: ESVtoLeetFlaskApp/app.py
-Scanned: 2016-10-20 11:05:36.016780
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ptmccarthy/flask-microblog-tutorial
-https://github.com/ptmccarthy/flask-microblog-tutorial
-Entry file: flask-microblog-tutorial/app/__init__.py
-Scanned: 2016-10-20 11:05:37.398746
-No vulnerabilities found.
-
-
-bronka/flask-hello-world
-https://github.com/bronka/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:05:37.939188
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-sidthakur/docker-single-nginx-flask
-https://github.com/sidthakur/docker-single-nginx-flask
-Entry file: docker-single-nginx-flask/app/app.py
-Scanned: 2016-10-20 11:05:39.271672
-No vulnerabilities found.
-
-
-mbreisch/flask-hello-world
-https://github.com/mbreisch/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:05:39.832591
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-zxqwerxz/test_flask_deploy
-https://github.com/zxqwerxz/test_flask_deploy
-Entry file: test_flask_deploy/hello.py
-Scanned: 2016-10-20 11:05:41.112805
-No vulnerabilities found.
-
-
-mdublin/Flask-CRUD-template
-https://github.com/mdublin/Flask-CRUD-template
-Entry file: Flask-CRUD-template/blog/__init__.py
-Scanned: 2016-10-20 11:05:41.647652
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lwjones/flask-hello-world
-https://github.com/lwjones/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:05:42.196677
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-Pensu/flask-ppc64le
-https://github.com/Pensu/flask-ppc64le
-Entry file: flask-ppc64le/app.py
-Scanned: 2016-10-20 11:05:42.710805
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-leonidas/flask-spa-routing-example
-https://github.com/leonidas/flask-spa-routing-example
-Entry file: None
-Scanned: 2016-10-20 11:05:43.210173
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/leonidas/flask-spa-routing-example.
-
-renmmotp/Ren_Learns_Flask
-https://github.com/renmmotp/Ren_Learns_Flask
-Entry file: Ren_Learns_Flask/flaskr/flaskr.py
-Scanned: 2016-10-20 11:05:48.704096
-No vulnerabilities found.
-
-
-posenberg/Flask-Kickstarter-Clone
-https://github.com/posenberg/Flask-Kickstarter-Clone
-Entry file: Flask-Kickstarter-Clone/punchstarter/__init__.py
-Scanned: 2016-10-20 11:05:57.805257
-Vulnerability 1:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 42, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 46, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 53: image_filename = uploaded_image['public_id']
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 56, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 42, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 46, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 53: image_filename = uploaded_image['public_id']
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 6:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 56, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 7:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 81, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 8:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 89, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 94, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 9:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 89, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 10:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 89, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 11:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 115, trigger word "get(":
- query = request.args.get('q') or ''
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 124: query_text = query != ''query'all projects'
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 116, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 12:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 115, trigger word "get(":
- query = request.args.get('q') or ''
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 124: query_text = query != ''query'all projects'
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 126, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query_text, projects=projects, project_count=project_count)
-
-
-
-pythonvietnam/meetup01-flask
-https://github.com/pythonvietnam/meetup01-flask
-Entry file: meetup01-flask/hello_world.py
-Scanned: 2016-10-20 11:05:59.395980
-Vulnerability 1:
-File: meetup01-flask/template.py
- > User input at line 9, trigger word "get(":
- name = request.args.get('name', 'guy')
-File: meetup01-flask/template.py
- > reaches line 10, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',name=name)
-
-
-
-palden/flask-hello-world
-https://github.com/palden/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:05:59.961548
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-shane-kercheval/flask-postgresql-template
-https://github.com/shane-kercheval/flask-postgresql-template
-Entry file: flask-postgresql-template/app_factory.py
-Scanned: 2016-10-20 11:06:07.534640
-Vulnerability 1:
-File: flask-postgresql-template/app.py
- > User input at line 49, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask-postgresql-template/app.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-postgresql-template/app.py
- > reaches line 53, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default'))
-
-Vulnerability 2:
-File: flask-postgresql-template/app.py
- > User input at line 49, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask-postgresql-template/app.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-postgresql-template/app.py
- > reaches line 53, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default'))
-
-
-
-charanjp/flask
-https://github.com/charanjp/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:06:09.595587
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-yasskh/flask
-https://github.com/yasskh/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:06:10.129787
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-poxstone/flask
-https://github.com/poxstone/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:06:10.666448
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-FlaskTutorial/Flask
-https://github.com/FlaskTutorial/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:06:12.351812
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-OnlySHI/flask
-https://github.com/OnlySHI/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:06:13.927225
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-jvuori/flask-uwsgi-nginx-haproxy-docker
-https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker
-Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py
-Scanned: 2016-10-20 11:06:23.186644
-No vulnerabilities found.
-
-
-akupara/flask_inspector
-https://github.com/akupara/flask_inspector
-Entry file: flask_inspector/example/app.py
-Scanned: 2016-10-20 11:06:25.732937
-No vulnerabilities found.
-
-
-soasme/flask-personal-access-token
-https://github.com/soasme/flask-personal-access-token
-Entry file: flask-personal-access-token/example.py
-Scanned: 2016-10-20 11:06:29.826455
-Vulnerability 1:
-File: flask-personal-access-token/flask_personal_access_token/admin.py
- > User input at line 18, trigger word "get(":
- render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_API_PREFIX')current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_PREFIX')current_app.config.get('DEBUG')
-File: flask-personal-access-token/flask_personal_access_token/admin.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/personal_access_token/index.html',render_data)
-
-
-
-shinycoo/flaskmvcsample
-https://github.com/shinycoo/flaskmvcsample
-Entry file: flaskmvcsample/app.py
-Scanned: 2016-10-20 11:06:31.413031
-No vulnerabilities found.
-
-
-alexwilkerson/flasktaskr
-https://github.com/alexwilkerson/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:06:31.918707
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gileez/flasker
-https://github.com/gileez/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 11:06:32.434402
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-apeete/flasktaskr
-https://github.com/apeete/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:06:34.960300
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sindhus/flaskr
-https://github.com/sindhus/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:06:35.459488
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-slippers/flasksec
-https://github.com/slippers/flasksec
-Entry file: flasksec/main/__init__.py
-Scanned: 2016-10-20 11:06:38.782669
-No vulnerabilities found.
-
-
-rui7157/Flask-NvRay-Blog
-https://github.com/rui7157/Flask-NvRay-Blog
-Entry file: Flask-NvRay-Blog/vendor/flask/sessions.py
-Scanned: 2016-10-20 11:06:47.198129
-No vulnerabilities found.
-
-
-Ineeza/FlaskAppBuilder
-https://github.com/Ineeza/FlaskAppBuilder
-Entry file: FlaskAppBuilder/src/classes/__init__.py
-Scanned: 2016-10-20 11:06:47.771574
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yasskh/FlaskProject
-https://github.com/yasskh/FlaskProject
-Entry file: FlaskProject/views.py
-Scanned: 2016-10-20 11:06:48.445175
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DamithaPerera/FlaskApp
-https://github.com/DamithaPerera/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 11:06:49.056793
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dreammis/Flask02
-https://github.com/dreammis/Flask02
-Entry file: Flask02/app/__init__.py
-Scanned: 2016-10-20 11:06:50.341616
-No vulnerabilities found.
-
-
-junniepat/FlaskApp
-https://github.com/junniepat/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 11:06:50.924494
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-YoungGer/FlaskApps
-https://github.com/YoungGer/FlaskApps
-Entry file: FlaskApps/pdClassifier/app.py
-Scanned: 2016-10-20 11:06:53.289213
-Vulnerability 1:
-File: FlaskApps/pdClassifier/app.py
- > User input at line 81, trigger word "form[":
- review = request.form['pdreview']
-Reassigned in:
- File: FlaskApps/pdClassifier/app.py
- > Line 82: y = classify(review)
- File: FlaskApps/pdClassifier/app.py
- > Line 82: proba = classify(review)
- File: FlaskApps/pdClassifier/app.py
- > Line 84: ret_MAYBE_FUNCTION_NAME = render_template('reviewform.html',form=form)
-File: FlaskApps/pdClassifier/app.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',content=review, prediction=y, probability=round(proba * 100, 2))
-
-
-
-land-pack/flaskBlog
-https://github.com/land-pack/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 11:06:53.861785
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-deyoppe/FlaskFire
-https://github.com/deyoppe/FlaskFire
-Entry file: FlaskFire/core/system/app.py
-Scanned: 2016-10-20 11:06:55.230452
-No vulnerabilities found.
-
-
-Njsao/FlaskServer
-https://github.com/Njsao/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-20 11:06:55.766640
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-OscarMelin/learning-flask-bootstrap
-https://github.com/OscarMelin/learning-flask-bootstrap
-Entry file: learning-flask-bootstrap/__init__.py
-Scanned: 2016-10-20 11:06:56.374085
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/genericpath.py
-
-allianRoman/flask-intro
-https://github.com/allianRoman/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:06:56.868991
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hunt3ri/temp-flask
-https://github.com/hunt3ri/temp-flask
-Entry file: temp-flask/app/__init__.py
-Scanned: 2016-10-20 11:06:59.309816
-No vulnerabilities found.
-
-
-noamoss/flask-blog
-https://github.com/noamoss/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:07:00.948603
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Jiezhi/HelloFlask
-https://github.com/Jiezhi/HelloFlask
-Entry file: HelloFlask/src/application.py
-Scanned: 2016-10-20 11:07:05.465364
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-szhjia/flask-blog
-https://github.com/szhjia/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:07:09.013401
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-amybethx/flask-intro
-https://github.com/amybethx/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:10.528649
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-terriwong/flask-intro
-https://github.com/terriwong/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:11.026892
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arkenidar/flask-example
-https://github.com/arkenidar/flask-example
-Entry file: flask-example/main.py
-Scanned: 2016-10-20 11:07:11.544532
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ztomazin/flask_exp
-https://github.com/ztomazin/flask_exp
-Entry file: None
-Scanned: 2016-10-20 11:07:13.080863
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ltaziri/Flask-Intro
-https://github.com/ltaziri/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-20 11:07:14.612018
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alitsiya/flask-intro
-https://github.com/alitsiya/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:23.124461
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-taisa007/timeliner-flask
-https://github.com/taisa007/timeliner-flask
-Entry file: timeliner-flask/timeliner/timeliner/__init__.py
-Scanned: 2016-10-20 11:07:25.551932
-No vulnerabilities found.
-
-
-sandiego206/flask_microblog
-https://github.com/sandiego206/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 11:07:27.091944
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Odava/flask-jwt
-https://github.com/Odava/flask-jwt
-Entry file: flask-jwt/tests/conftest.py
-Scanned: 2016-10-20 11:07:32.133128
-No vulnerabilities found.
-
-
-nivanko/flask-catalog
-https://github.com/nivanko/flask-catalog
-Entry file: flask-catalog/application.py
-Scanned: 2016-10-20 11:07:38.932854
-Vulnerability 1:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 162, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username'))
-
-Vulnerability 2:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-Vulnerability 3:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-
-
-ajoshdee/flask-test
-https://github.com/ajoshdee/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:07:40.396912
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-palden/flask-blog
-https://github.com/palden/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:07:40.930796
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-humaneu/flask_app
-https://github.com/humaneu/flask_app
-Entry file: None
-Scanned: 2016-10-20 11:07:41.461935
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/humaneu/flask_app.
-
-cclittle13/flask-intro
-https://github.com/cclittle13/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:47.983099
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-emlam/flask-intro
-https://github.com/emlam/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:48.492405
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-spyapali/Flask-intro
-https://github.com/spyapali/Flask-intro
-Entry file: Flask-intro/nice.py
-Scanned: 2016-10-20 11:07:49.006630
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-celiawaggoner/flask-intro
-https://github.com/celiawaggoner/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:50.502431
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cachar/flask-intro
-https://github.com/cachar/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:50.998164
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KTAtkinson/flask-intro
-https://github.com/KTAtkinson/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:51.495743
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pasysxa/flask-mall
-https://github.com/pasysxa/flask-mall
-Entry file: flask-mall/myapp/__init__.py
-Scanned: 2016-10-20 11:07:54.704296
-No vulnerabilities found.
-
-
-fendouai/venv_flask
-https://github.com/fendouai/venv_flask
-Entry file: venv_flask/cookie.py
-Scanned: 2016-10-20 11:07:55.310031
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: venv_flask/venv/lib/python2.7/genericpath.py
-
-bekkam/flask-intro
-https://github.com/bekkam/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:55.834054
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-anniehe/flask-intro
-https://github.com/anniehe/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:56.327002
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Vianey81/flask-intro
-https://github.com/Vianey81/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:57.854801
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mcbishop/flask-intro
-https://github.com/mcbishop/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:07:59.359731
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alenakruchkova/flask-intro
-https://github.com/alenakruchkova/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:00.858473
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-florenceloi/flask-intro
-https://github.com/florenceloi/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:06.396263
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DoriRunyon/flask-intro
-https://github.com/DoriRunyon/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:09.935062
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kooder18/flask_Ecommerce
-https://github.com/kooder18/flask_Ecommerce
-Entry file: flask_Ecommerce/project.py
-Scanned: 2016-10-20 11:08:11.918919
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-leiyue/learning_flask
-https://github.com/leiyue/learning_flask
-Entry file: learning_flask/miniblog/miniblog.py
-Scanned: 2016-10-20 11:08:13.191597
-No vulnerabilities found.
-
-
-qistchan/WebhookFlask
-https://github.com/qistchan/WebhookFlask
-Entry file: WebhookFlask/WebHook_Listener.py
-Scanned: 2016-10-20 11:08:14.474611
-No vulnerabilities found.
-
-
-Bandurin/Test-flask
-https://github.com/Bandurin/Test-flask
-Entry file: Test-flask/db_app.py
-Scanned: 2016-10-20 11:08:24.403095
-No vulnerabilities found.
-
-
-GeetikaBatra/Flask_intro
-https://github.com/GeetikaBatra/Flask_intro
-Entry file: Flask_intro/flask_app/__init__.py
-Scanned: 2016-10-20 11:08:24.924920
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-0phelia/flask-app
-https://github.com/0phelia/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 11:08:27.434306
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lauradebella/treinamentoFlask
-https://github.com/lauradebella/treinamentoFlask
-Entry file: treinamentoFlask/tutorialPythonClub/app.py
-Scanned: 2016-10-20 11:08:39.498388
-No vulnerabilities found.
-
-
-seanbehan/flask_websockets
-https://github.com/seanbehan/flask_websockets
-Entry file: flask_websockets/app.py
-Scanned: 2016-10-20 11:08:40.795774
-No vulnerabilities found.
-
-
-ssam123/flask-tutorial
-https://github.com/ssam123/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:08:41.311838
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ziyoung/learningFlask
-https://github.com/ziyoung/learningFlask
-Entry file: learningFlask/hello.py
-Scanned: 2016-10-20 11:08:42.494115
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py
-
-karayount/flask-intro
-https://github.com/karayount/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:42.991471
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-go-bears/flask-intro
-https://github.com/go-bears/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:43.509443
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mlpeters12/flask-intro
-https://github.com/mlpeters12/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:48.036504
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arbonap/flask-intro
-https://github.com/arbonap/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:08:48.560273
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nimeshkverma/SolrFlask
-https://github.com/nimeshkverma/SolrFlask
-Entry file: SolrFlask/app/app_config.py
-Scanned: 2016-10-20 11:08:49.073064
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gaozhidf/flask_websocket
-https://github.com/gaozhidf/flask_websocket
-Entry file: flask_websocket/websocket_py3/manage.py
-Scanned: 2016-10-20 11:08:51.428366
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hilyas/flask-blog
-https://github.com/hilyas/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:08:51.995771
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-dimy407/NBC_Flask
-https://github.com/dimy407/NBC_Flask
-Entry file: NBC_Flask/flask_app.py
-Scanned: 2016-10-20 11:08:52.508727
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ltaziri/Flask-Shopping
-https://github.com/ltaziri/Flask-Shopping
-Entry file: Flask-Shopping/shoppingsite.py
-Scanned: 2016-10-20 11:08:54.033822
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jefersondaniel/notebook-api
-https://github.com/jefersondaniel/notebook-api
-Entry file: notebook-api/app/__init__.py
-Scanned: 2016-10-20 11:08:56.459704
-No vulnerabilities found.
-
-
-ddrsmile/flask-hello-world
-https://github.com/ddrsmile/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:08:56.995713
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-saviour123/flaskStudentData
-https://github.com/saviour123/flaskStudentData
-Entry file: flaskStudentData/app.py
-Scanned: 2016-10-20 11:08:58.267309
-Vulnerability 1:
-File: flaskStudentData/app.py
- > User input at line 29, trigger word "form[":
- name = request.form['nm']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-Vulnerability 2:
-File: flaskStudentData/app.py
- > User input at line 30, trigger word "form[":
- addr = request.form['add']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-Vulnerability 3:
-File: flaskStudentData/app.py
- > User input at line 31, trigger word "form[":
- city = request.form['city']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-Vulnerability 4:
-File: flaskStudentData/app.py
- > User input at line 32, trigger word "form[":
- pin = request.form['pin']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-
-
-webon100/ross_flask01
-https://github.com/webon100/ross_flask01
-Entry file: None
-Scanned: 2016-10-20 11:08:58.808865
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-QLGu/flask-zhihu-demo
-https://github.com/QLGu/flask-zhihu-demo
-Entry file: flask-zhihu-demo/www/__init__.py
-Scanned: 2016-10-20 11:09:06.898485
-Vulnerability 1:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 35, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 33: show_followed = False
- File: flask-zhihu-demo/www/main/views.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.signin'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',show_followed=show_followed, quoras=quoras, users=users)
-
-Vulnerability 2:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 312, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 313: pagination = user.followed.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 314: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 311: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 316, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注的人', endpoint='main.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 3:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 327, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 328: pagination = user.followers.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 329: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 326: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 331, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='的关注者', endpoint='main.followers', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 430, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 431: pagination = user.tags.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 432: following_tags = ['tag'item.tag_set for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 429: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 433, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('following_topics.html',user=user, title='关注的话题', endpoint='main.following_tag', pagination=pagination, following_tags=following_tags)
-
-Vulnerability 5:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 444, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 445: pagination = topic.users.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 446: tag_followers = ['user'item.user_set for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 443: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 447, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('topic_followers.html',topic=topic, title='人关注了该话题', endpoint='main.tag_followers', pagination=pagination, tag_followers=tag_followers)
-
-Vulnerability 6:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 500, trigger word ".data":
- question = Question(title=form.title.data, content=form.content.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 522, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id))
-
-Vulnerability 7:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 500, trigger word ".data":
- question = Question(title=form.title.data, content=form.content.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 522, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id))
-
-Vulnerability 8:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 563, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 564: pagination = user.user_questions.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 565: questions = pagination.items
- File: flask-zhihu-demo/www/main/views.py
- > Line 569: questions[j] = questions[j + 1]
- File: flask-zhihu-demo/www/main/views.py
- > Line 569: questions[j + 1] = questions[j]
- File: flask-zhihu-demo/www/main/views.py
- > Line 562: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 570, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('following_questions.html',user=user, endpoint='main.people_questions', pagination=pagination, questions=questions)
-
-Vulnerability 9:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 617, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 618: pagination = question.users.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 619: question_followers = ['user'item.q_user for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 616: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 620, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('question_followers.html',question=question, endpoint='main.question_followers', pagination=pagination, question_followers=question_followers)
-
-Vulnerability 10:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 705, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 706: pagination = user.user_answers.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 707: answers = pagination.items
- File: flask-zhihu-demo/www/main/views.py
- > Line 711: answers[j] = answers[j + 1]
- File: flask-zhihu-demo/www/main/views.py
- > Line 711: answers[j + 1] = answers[j]
- File: flask-zhihu-demo/www/main/views.py
- > Line 704: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 712, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('following_answers.html',user=user, endpoint='main.people_answers', pagination=pagination, answers=answers)
-
-Vulnerability 11:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 791, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 792: pagination = answer.users.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 793: answer_followers = ['user'item.a_user for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 790: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 794, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('answer_followers.html',answer=answer, endpoint='main.answer_followers', pagination=pagination, answer_followers=answer_followers)
-
-Vulnerability 12:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 855, trigger word ".data":
- collection = Collection(title=form.title.data, desc=form.desc.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 864, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id))
-
-Vulnerability 13:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 855, trigger word ".data":
- collection = Collection(title=form.title.data, desc=form.desc.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 864, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id))
-
-
-
-AndyMcLEOD/PythonFlaskApp
-https://github.com/AndyMcLEOD/PythonFlaskApp
-Entry file: PythonFlaskApp/app.py
-Scanned: 2016-10-20 11:10:08.053571
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mlsh2387/Ex_20160119_Flask-Intro
-https://github.com/mlsh2387/Ex_20160119_Flask-Intro
-Entry file: Ex_20160119_Flask-Intro/nice.py
-Scanned: 2016-10-20 11:10:08.568863
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jkravanja/paypal_flask_payment
-https://github.com/jkravanja/paypal_flask_payment
-Entry file: paypal_flask_payment/payment.py
-Scanned: 2016-10-20 11:10:09.077119
-Vulnerability 1:
-File: paypal_flask_payment/payment.py
- > User input at line 36, trigger word "get(":
- paymentId = request.args.get('paymentId')
-Reassigned in:
- File: paypal_flask_payment/payment.py
- > Line 40: payment = paypalrestsdk.Payment.find(paymentId)
- File: paypal_flask_payment/payment.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK paymentId: {} PayerID: {} '.format(paymentId, PayerID)
- File: paypal_flask_payment/payment.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error
-File: paypal_flask_payment/payment.py
- > reaches line 41, trigger word "execute(":
- if payment.execute('payer_id'PayerID):
-
-Vulnerability 2:
-File: paypal_flask_payment/payment.py
- > User input at line 37, trigger word "get(":
- PayerID = request.args.get('PayerID')
-Reassigned in:
- File: paypal_flask_payment/payment.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK paymentId: {} PayerID: {} '.format(paymentId, PayerID)
- File: paypal_flask_payment/payment.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error
-File: paypal_flask_payment/payment.py
- > reaches line 41, trigger word "execute(":
- if payment.execute('payer_id'PayerID):
-
-
-
-yalove/flask-nginx-gunicorn
-https://github.com/yalove/flask-nginx-gunicorn
-Entry file: flask-nginx-gunicorn/app/hello.py
-Scanned: 2016-10-20 11:10:10.350239
-No vulnerabilities found.
-
-
-tolmun/flask-ng-sample
-https://github.com/tolmun/flask-ng-sample
-Entry file: flask-ng-sample/project/__init__.py
-Scanned: 2016-10-20 11:10:12.290598
-Vulnerability 1:
-File: flask-ng-sample/project/api/views.py
- > User input at line 132, trigger word ".data":
- users = schema.dump(results,many=True).data
-File: flask-ng-sample/project/api/views.py
- > reaches line 133, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'users)
-
-Vulnerability 2:
-File: flask-ng-sample/project/api/views.py
- > User input at line 154, trigger word ".data":
- user = schema.dump(results).data
-File: flask-ng-sample/project/api/views.py
- > reaches line 155, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('user'user)
-
-
-
-Michotastico/NetworkInformationFlaskServer
-https://github.com/Michotastico/NetworkInformationFlaskServer
-Entry file: NetworkInformationFlaskServer/main.py
-Scanned: 2016-10-20 11:10:12.829215
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tjhakseth/Nice-Flask-Intro
-https://github.com/tjhakseth/Nice-Flask-Intro
-Entry file: Nice-Flask-Intro/nice.py
-Scanned: 2016-10-20 11:10:14.123900
-No vulnerabilities found.
-
-
-adamphillips/pi-flask-video-streaming
-https://github.com/adamphillips/pi-flask-video-streaming
-Entry file: pi-flask-video-streaming/app/main.py
-Scanned: 2016-10-20 11:10:15.492768
-No vulnerabilities found.
-
-
-AngelMunoz/Flask-Blueprints-Template
-https://github.com/AngelMunoz/Flask-Blueprints-Template
-Entry file: Flask-Blueprints-Template/app/__init__.py
-Scanned: 2016-10-20 11:10:16.761278
-Vulnerability 1:
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > User input at line 15, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > Line 17: session['user_id'] = user.id
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > reaches line 18, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-SeventhResolve/Flask-Intro-Nice-File
-https://github.com/SeventhResolve/Flask-Intro-Nice-File
-Entry file: Flask-Intro-Nice-File/nice.py
-Scanned: 2016-10-20 11:10:18.055733
-No vulnerabilities found.
-
-
-torykit/docker-flask-console
-https://github.com/torykit/docker-flask-console
-Entry file: docker-flask-console/start.py
-Scanned: 2016-10-20 11:10:19.428362
-No vulnerabilities found.
-
-
-koulanurag/Simple-Flask-Application
-https://github.com/koulanurag/Simple-Flask-Application
-Entry file: Simple-Flask-Application/app.py
-Scanned: 2016-10-20 11:10:19.946219
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-graphql-python/flask-graphql
-https://github.com/graphql-python/flask-graphql
-Entry file: flask-graphql/tests/app.py
-Scanned: 2016-10-20 11:10:24.719723
-Vulnerability 1:
-File: flask-graphql/tests/test_graphiqlview.py
- > User input at line 13, trigger word "get(":
- response = client.get(url_for('graphql'),headers='Accept''text/html')
-File: flask-graphql/tests/test_graphiqlview.py
- > reaches line 13, trigger word "url_for(":
- response = client.get(url_for('graphql'),headers='Accept''text/html')
-
-
-
-hhstore/flask-annotated
-https://github.com/hhstore/flask-annotated
-Entry file: flask-annotated/flask-0.5/flask/app.py
-Scanned: 2016-10-20 11:10:25.267917
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prakxys/flask
-https://github.com/prakxys/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:10:25.859854
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-galacticpy/flask
-https://github.com/galacticpy/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:10:26.540918
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-zhiliang729/flask
-https://github.com/zhiliang729/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:10:27.117791
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-iFe1er/flask
-https://github.com/iFe1er/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:10:27.699284
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-jarogers095/flask-hello-world
-https://github.com/jarogers095/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:10:28.265877
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-alex-paterson/Barebones-Flask-and-Caffe-Classifier
-https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier
-Entry file: Barebones-Flask-and-Caffe-Classifier/app.py
-Scanned: 2016-10-20 11:10:28.779275
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-drone-demos/drone-with-python
-https://github.com/drone-demos/drone-with-python
-Entry file: drone-with-python/dronedemo/main.py
-Scanned: 2016-10-20 11:10:30.269827
-No vulnerabilities found.
-
-
-amirziai/sklearnflask
-https://github.com/amirziai/sklearnflask
-Entry file: sklearnflask/main.py
-Scanned: 2016-10-20 11:10:30.813771
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fengyc/flasky
-https://github.com/fengyc/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:10:31.335400
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sshimp/flasktaskr
-https://github.com/sshimp/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:10:31.840363
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sharma-abhi/flaskr
-https://github.com/sharma-abhi/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:10:32.359348
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kwikiel/flaskr
-https://github.com/kwikiel/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:10:32.858557
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tehasdf/flaskexample
-https://github.com/tehasdf/flaskexample
-Entry file: flaskexample/flaskexample/app.py
-Scanned: 2016-10-20 11:10:34.633711
-No vulnerabilities found.
-
-
-sanghyunjooPurdue/flaskr
-https://github.com/sanghyunjooPurdue/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:10:35.142257
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-becsully/flasktest
-https://github.com/becsully/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 11:11:08.714737
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SFurnace/flaskr
-https://github.com/SFurnace/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:11:09.227578
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-noamoss/flasktaskr
-https://github.com/noamoss/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:11:09.728109
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AxoSal/GAE-Flask-React-skeleton
-https://github.com/AxoSal/GAE-Flask-React-skeleton
-Entry file: GAE-Flask-React-skeleton/main.py
-Scanned: 2016-10-20 11:11:11.108715
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-yasskh/FlaskProject
-https://github.com/yasskh/FlaskProject
-Entry file: FlaskProject/views.py
-Scanned: 2016-10-20 11:11:11.729581
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jrballot/FlaskTaskr
-https://github.com/jrballot/FlaskTaskr
-Entry file: FlaskTaskr/views.py
-Scanned: 2016-10-20 11:11:13.348685
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py
-
-AnshuOnGit/FlaskServices
-https://github.com/AnshuOnGit/FlaskServices
-Entry file: FlaskServices/read_file.py
-Scanned: 2016-10-20 11:11:19.649770
-Vulnerability 1:
-File: FlaskServices/read_file.py
- > User input at line 40, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/read_file.py
- > Line 44: filename = secure_filename(file.filename)
-File: FlaskServices/read_file.py
- > reaches line 50, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: FlaskServices/read_file.py
- > User input at line 40, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/read_file.py
- > Line 44: filename = secure_filename(file.filename)
-File: FlaskServices/read_file.py
- > reaches line 50, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 3:
-File: FlaskServices/uploads/read_file.py
- > User input at line 50, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/uploads/read_file.py
- > Line 54: filename = secure_filename(file.filename)
-File: FlaskServices/uploads/read_file.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 4:
-File: FlaskServices/uploads/read_file.py
- > User input at line 50, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/uploads/read_file.py
- > Line 54: filename = secure_filename(file.filename)
-File: FlaskServices/uploads/read_file.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-ftanevski4/FlaskPycharm
-https://github.com/ftanevski4/FlaskPycharm
-Entry file: FlaskPycharm/FlaskPycharm.py
-Scanned: 2016-10-20 11:11:20.945320
-No vulnerabilities found.
-
-
-yukoga/flasksample1
-https://github.com/yukoga/flasksample1
-Entry file: flasksample1/hello.py
-Scanned: 2016-10-20 11:11:22.174677
-No vulnerabilities found.
-
-
-Njsao/FlaskServer
-https://github.com/Njsao/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-20 11:11:22.691963
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-noamoss/flask-blog
-https://github.com/noamoss/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:11:23.227323
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-ddrsmile/flask-blog
-https://github.com/ddrsmile/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:11:23.769882
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-dasdachs/flask-blog
-https://github.com/dasdachs/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:11:24.324139
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-yuz989/uwsgi-flask
-https://github.com/yuz989/uwsgi-flask
-Entry file: uwsgi-flask/main.py
-Scanned: 2016-10-20 11:11:25.569163
-No vulnerabilities found.
-
-
-hugoren/flask_login
-https://github.com/hugoren/flask_login
-Entry file: None
-Scanned: 2016-10-20 11:11:26.091742
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hugoren/flask_login.
-
-jlents/discover-flask
-https://github.com/jlents/discover-flask
-Entry file: discover-flask/project/__init__.py
-Scanned: 2016-10-20 11:11:27.704308
-No vulnerabilities found.
-
-
-jaleskinen/PythonFlask
-https://github.com/jaleskinen/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:11:34.305679
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-mhgit1/PythonFlask
-https://github.com/mhgit1/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:11:39.729221
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-maukka76/PythonFlask
-https://github.com/maukka76/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:11:45.702611
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-Namelessi/PythonFlask
-https://github.com/Namelessi/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:11:51.578427
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-nimeshkverma/BootstrapFlask
-https://github.com/nimeshkverma/BootstrapFlask
-Entry file: BootstrapFlask/chehra/test_server/driver.py
-Scanned: 2016-10-20 11:11:52.130620
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-feeman1989/backstage_flask
-https://github.com/feeman1989/backstage_flask
-Entry file: backstage_flask/app.py
-Scanned: 2016-10-20 11:11:52.677259
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-charanjp/flask_blog
-https://github.com/charanjp/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:11:53.209517
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-taisa007/timeliner-flask
-https://github.com/taisa007/timeliner-flask
-Entry file: timeliner-flask/timeliner/timeliner/__init__.py
-Scanned: 2016-10-20 11:11:54.592051
-No vulnerabilities found.
-
-
-ddrsmile/flask-taskr
-https://github.com/ddrsmile/flask-taskr
-Entry file: flask-taskr/views.py
-Scanned: 2016-10-20 11:11:55.330117
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-taskr/env/lib/python2.7/genericpath.py
-
-Roconda/flask-bootstrap
-https://github.com/Roconda/flask-bootstrap
-Entry file: flask-bootstrap/src/api/__init__.py
-Scanned: 2016-10-20 11:11:56.536997
-No vulnerabilities found.
-
-
-maxcell/flask-workshop
-https://github.com/maxcell/flask-workshop
-Entry file: flask-workshop/hello_world/hello.py
-Scanned: 2016-10-20 11:11:57.535949
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sshimp/flask-blog
-https://github.com/sshimp/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:11:58.086254
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-PavelMPD/flask_auth
-https://github.com/PavelMPD/flask_auth
-Entry file: flask_auth/web/server.py
-Scanned: 2016-10-20 11:12:00.645618
-No vulnerabilities found.
-
-
-seanwbarry/thinkful_flask
-https://github.com/seanwbarry/thinkful_flask
-Entry file: thinkful_flask/hello_world_original.py
-Scanned: 2016-10-20 11:12:09.362032
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-OrionsSuspenders/flask-blog
-https://github.com/OrionsSuspenders/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:12:09.927468
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-DaTimsta/flask-test
-https://github.com/DaTimsta/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:12:10.457002
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-sstriatlon/PyFlask
-https://github.com/sstriatlon/PyFlask
-Entry file: PyFlask/app.py
-Scanned: 2016-10-20 11:12:11.094908
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlask/venv/lib/python2.7/genericpath.py
-
-Vianey81/Flask-sql
-https://github.com/Vianey81/Flask-sql
-Entry file: Flask-sql/hackbright.py
-Scanned: 2016-10-20 11:12:14.101997
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-timoparv65/PythonFlask
-https://github.com/timoparv65/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:12:20.144226
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-JRaisala/PythonFlask
-https://github.com/JRaisala/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:12:25.891879
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-jraappan/PythonFlask
-https://github.com/jraappan/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:12:31.162227
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-hannu78/PythonFlask
-https://github.com/hannu78/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:12:37.012193
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-marcosf63/flask_app
-https://github.com/marcosf63/flask_app
-Entry file: None
-Scanned: 2016-10-20 11:12:37.539124
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcosf63/flask_app.
-
-maratkanov-a/flask_project
-https://github.com/maratkanov-a/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 11:12:39.126957
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bellcliff/practice-flask
-https://github.com/bellcliff/practice-flask
-Entry file: practice-flask/hello.py
-Scanned: 2016-10-20 11:12:42.377012
-No vulnerabilities found.
-
-
-GeetikaBatra/Flask_intro
-https://github.com/GeetikaBatra/Flask_intro
-Entry file: Flask_intro/flask_app/__init__.py
-Scanned: 2016-10-20 11:12:42.906726
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-changddcn/dd-flask
-https://github.com/changddcn/dd-flask
-Entry file: None
-Scanned: 2016-10-20 11:12:43.451205
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/changddcn/dd-flask.
-
-Decus12/PythonFlask
-https://github.com/Decus12/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:12:48.910465
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-thiltunen78/PythonFlask
-https://github.com/thiltunen78/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:12:55.235650
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-tere15/PythonFlask
-https://github.com/tere15/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:13:01.124491
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-ttakkula/flask_example
-https://github.com/ttakkula/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:13:01.689751
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-satyadevi-nyros/werckers_flask
-https://github.com/satyadevi-nyros/werckers_flask
-Entry file: werckers_flask/app.py
-Scanned: 2016-10-20 11:13:02.996252
-No vulnerabilities found.
-
-
-ltaziri/SQL-Flask
-https://github.com/ltaziri/SQL-Flask
-Entry file: SQL-Flask/hackbright.py
-Scanned: 2016-10-20 11:13:03.518095
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-psavela/PythonFlask
-https://github.com/psavela/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:13:08.898810
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-KariR61/PythonFlask
-https://github.com/KariR61/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:13:14.765847
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-dhruvsrivastava/flask-intro
-https://github.com/dhruvsrivastava/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:13:15.289912
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cjohns38/flask-intro
-https://github.com/cjohns38/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:13:15.823098
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-notaweelos/openshift_flask
-https://github.com/notaweelos/openshift_flask
-Entry file: openshift_flask/helloflask.py
-Scanned: 2016-10-20 11:13:17.131147
-No vulnerabilities found.
-
-
-jkeung/flask_microblog
-https://github.com/jkeung/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 11:13:17.680117
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shank7485/Flask-APIs
-https://github.com/shank7485/Flask-APIs
-Entry file: Flask-APIs/APIs/__init__.py
-Scanned: 2016-10-20 11:13:19.092280
-Vulnerability 1:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 49, trigger word "get(":
- from_address = request.args.get('f_addr')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 53, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 2:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 50, trigger word "get(":
- to_address = request.args.get('t_addr')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 53, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 3:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 58, trigger word "get(":
- from_latitude = request.args.get('f_lat')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 4:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 59, trigger word "get(":
- from_longitude = request.args.get('f_long')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 5:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 60, trigger word "get(":
- to_latitude = request.args.get('t_lat')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 6:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 61, trigger word "get(":
- to_longitude = request.args.get('t_long')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-
-
-mattyait/Flask_webapp
-https://github.com/mattyait/Flask_webapp
-Entry file: Flask_webapp/routes.py
-Scanned: 2016-10-20 11:13:20.483247
-Vulnerability 1:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 2:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 3:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 73, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 4:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 78, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 5:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 6:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 89, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 7:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 95, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 8:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-
-
-nntndfrk/untitled
-https://github.com/nntndfrk/untitled
-Entry file: untitled/untitled.py
-Scanned: 2016-10-20 11:13:21.768369
-No vulnerabilities found.
-
-
-jrballot/FlaskBlogApp
-https://github.com/jrballot/FlaskBlogApp
-Entry file: FlaskBlogApp/blog.py
-Scanned: 2016-10-20 11:13:23.068861
-No vulnerabilities found.
-
-
-jgabrielfreitas/FlaskAndParse
-https://github.com/jgabrielfreitas/FlaskAndParse
-Entry file: FlaskAndParse/hello_flask.py
-Scanned: 2016-10-20 11:13:23.604274
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-Buuntu/TicTacToe-Flask
-https://github.com/Buuntu/TicTacToe-Flask
-Entry file: TicTacToe-Flask/tictactoe.py
-Scanned: 2016-10-20 11:13:25.035270
-No vulnerabilities found.
-
-
-emlam/project-tracker-flask
-https://github.com/emlam/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:25.616303
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bernaerdik/Flask_on_CF
-https://github.com/bernaerdik/Flask_on_CF
-Entry file: Flask_on_CF/hello.py
-Scanned: 2016-10-20 11:13:26.923622
-No vulnerabilities found.
-
-
-knoxilla/web-flask-dockerized
-https://github.com/knoxilla/web-flask-dockerized
-Entry file: web-flask-dockerized/app.py
-Scanned: 2016-10-20 11:13:28.783441
-No vulnerabilities found.
-
-
-julyano/MiniCursoFlaskPETCC
-https://github.com/julyano/MiniCursoFlaskPETCC
-Entry file: MiniCursoFlaskPETCC/routes.py
-Scanned: 2016-10-20 11:13:30.484412
-No vulnerabilities found.
-
-
-go-bears/sql-with-flask
-https://github.com/go-bears/sql-with-flask
-Entry file: sql-with-flask/hackbright.py
-Scanned: 2016-10-20 11:13:31.061525
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-anniehe/project-tracker-flask
-https://github.com/anniehe/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:31.574476
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neonbadger/project-tracker-flask
-https://github.com/neonbadger/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:32.140985
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DoriRunyon/Project-tracker-flask
-https://github.com/DoriRunyon/Project-tracker-flask
-Entry file: Project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:37.676722
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EdilvoLima/CursoPythonFlask
-https://github.com/EdilvoLima/CursoPythonFlask
-Entry file: CursoPythonFlask/routes.py
-Scanned: 2016-10-20 11:13:39.143848
-No vulnerabilities found.
-
-
-dternyak/Flask-Postgres-Docker
-https://github.com/dternyak/Flask-Postgres-Docker
-Entry file: Flask-Postgres-Docker/web/index.py
-Scanned: 2016-10-20 11:13:42.463868
-No vulnerabilities found.
-
-
-info3180/python-flask-example
-https://github.com/info3180/python-flask-example
-Entry file: python-flask-example/hello.py
-Scanned: 2016-10-20 11:13:43.739415
-Vulnerability 1:
-File: python-flask-example/hello.py
- > User input at line 17, trigger word "get(":
- name = request.args.get('name')
-File: python-flask-example/hello.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('process.html',name=name)
-
-
-
-janeygak/Hackbright--SQL-with-Flask
-https://github.com/janeygak/Hackbright--SQL-with-Flask
-Entry file: Hackbright--SQL-with-Flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:44.268592
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SeventhResolve/Project-Tracker-Flask
-https://github.com/SeventhResolve/Project-Tracker-Flask
-Entry file: Project-Tracker-Flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:44.789875
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alitsiya/project-tracker-flask
-https://github.com/alitsiya/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-20 11:13:50.337965
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ThomasMarcel/gae-tomalcala-flask
-https://github.com/ThomasMarcel/gae-tomalcala-flask
-Entry file: gae-tomalcala-flask/main.py
-Scanned: 2016-10-20 11:13:56.836530
-No vulnerabilities found.
-
-
-ContinuumIO/flask-kerberos-login
-https://github.com/ContinuumIO/flask-kerberos-login
-Entry file: flask-kerberos-login/examples/simple.py
-Scanned: 2016-10-20 11:14:03.377601
-No vulnerabilities found.
-
-
-badspelr/flask-hello-world
-https://github.com/badspelr/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:14:04.046818
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-yoophi/flask-appointment-peewee
-https://github.com/yoophi/flask-appointment-peewee
-Entry file: flask-appointment-peewee/sched/app.py
-Scanned: 2016-10-20 11:14:04.552768
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-c1rno/Flask_auth_example
-https://github.com/c1rno/Flask_auth_example
-Entry file: Flask_auth_example/app/__init__.py
-Scanned: 2016-10-20 11:14:10.400808
-No vulnerabilities found.
-
-
-billdwalters/Flask
-https://github.com/billdwalters/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:14:18.084578
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prakxys/flask
-https://github.com/prakxys/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:14:18.703674
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-galacticpy/flask
-https://github.com/galacticpy/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:14:19.357953
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-OneBitSoftware/Office365-SharePoint-Python-Flask-Sample
-https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample
-Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py
-Scanned: 2016-10-20 11:14:21.534353
-No vulnerabilities found.
-
-
-NJIT-SIG-WEBDEV/flask-intro
-https://github.com/NJIT-SIG-WEBDEV/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:14:22.052495
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-imperio-wxm/flask-learn
-https://github.com/imperio-wxm/flask-learn
-Entry file: flask-learn/app/myapp/__init__.py
-Scanned: 2016-10-20 11:14:23.815155
-Vulnerability 1:
-File: flask-learn/app/myapp/main/views.py
- > User input at line 21, trigger word "get(":
- page_index = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-learn/app/myapp/main/views.py
- > Line 25: pagination = query.paginate(page_index,per_page=20, error_out=False)
- File: flask-learn/app/myapp/main/views.py
- > Line 27: posts = pagination.items
-File: flask-learn/app/myapp/main/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',title=_('欢迎来到Ray的博客'), posts=posts, pagination=pagination)
-
-
-
-ptrierweiler/myblog
-https://github.com/ptrierweiler/myblog
-Entry file: None
-Scanned: 2016-10-20 11:14:24.361558
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-drone-demos/drone-with-python
-https://github.com/drone-demos/drone-with-python
-Entry file: drone-with-python/dronedemo/main.py
-Scanned: 2016-10-20 11:14:25.629851
-No vulnerabilities found.
-
-
-msopentechcn/aad-graphapi-flask-demo
-https://github.com/msopentechcn/aad-graphapi-flask-demo
-Entry file: aad-graphapi-flask-demo/app.py
-Scanned: 2016-10-20 11:14:26.953804
-Vulnerability 1:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 100, trigger word "get(":
- error_code = messages.get('error_code')
-File: aad-graphapi-flask-demo/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message)
-
-Vulnerability 2:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 101, trigger word "get(":
- error_message = messages.get('error_message')
-File: aad-graphapi-flask-demo/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message)
-
-Vulnerability 3:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 108, trigger word "get(":
- error_code = errors.get('code')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 4:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 109, trigger word "get(":
- error_message = errors.get('message').get('value')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 5:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 108, trigger word "get(":
- error_code = errors.get('code')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 6:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 109, trigger word "get(":
- error_message = errors.get('message').get('value')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-
-
-amirziai/sklearnflask
-https://github.com/amirziai/sklearnflask
-Entry file: sklearnflask/main.py
-Scanned: 2016-10-20 11:14:27.462148
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-menglong81/flaskr
-https://github.com/menglong81/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:14:27.973789
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chadelder/flasktaskr
-https://github.com/chadelder/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:14:29.533883
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kmosho/flaskr
-https://github.com/kmosho/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:14:31.051200
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SticksInHand/flaskr
-https://github.com/SticksInHand/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:14:32.572784
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jayShepard/Flasky
-https://github.com/jayShepard/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 11:14:33.081860
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vineethtw/flaskexamples
-https://github.com/vineethtw/flaskexamples
-Entry file: flaskexamples/api/simulation.py
-Scanned: 2016-10-20 11:14:38.620665
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Duncodes/flasky
-https://github.com/Duncodes/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:14:39.140798
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-diegogslomp/flaskr
-https://github.com/diegogslomp/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:14:43.137758
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Lazyppl/Flaskblog
-https://github.com/Lazyppl/Flaskblog
-Entry file: Flaskblog/app/__init__.py
-Scanned: 2016-10-20 11:14:45.438119
-No vulnerabilities found.
-
-
-playgrdstar/flasktaskr
-https://github.com/playgrdstar/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:14:45.975311
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-toricor/flaskr
-https://github.com/toricor/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:14:50.497693
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xu00wei/flasky
-https://github.com/xu00wei/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:14:56.052110
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zeratullich/flaskr
-https://github.com/zeratullich/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:15:02.580874
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-noamoss/flasktaskr
-https://github.com/noamoss/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:15:04.089941
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arose13/HerokuCondaScipyFlaskApp
-https://github.com/arose13/HerokuCondaScipyFlaskApp
-Entry file: HerokuCondaScipyFlaskApp/Web/app.py
-Scanned: 2016-10-20 11:15:05.442648
-No vulnerabilities found.
-
-
-awind/FlaskRestful
-https://github.com/awind/FlaskRestful
-Entry file: FlaskRestful/app/__init__.py
-Scanned: 2016-10-20 11:15:06.861324
-Vulnerability 1:
-File: FlaskRestful/app/apis.py
- > User input at line 48, trigger word "get(":
- user = User.query.get(userid)
-File: FlaskRestful/app/apis.py
- > reaches line 51, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = user_schema.jsonify(user)
-
-
-
-jrballot/FlaskTaskr
-https://github.com/jrballot/FlaskTaskr
-Entry file: FlaskTaskr/views.py
-Scanned: 2016-10-20 11:15:10.537811
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py
-
-jgabrielfreitas/FlaskFirebase
-https://github.com/jgabrielfreitas/FlaskFirebase
-Entry file: FlaskFirebase/runner.py
-Scanned: 2016-10-20 11:15:16.850326
-No vulnerabilities found.
-
-
-scarabcoder/FlaskSite
-https://github.com/scarabcoder/FlaskSite
-Entry file: FlaskSite/runServer.py
-Scanned: 2016-10-20 11:15:18.509681
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aetherwu/FlaskDocker
-https://github.com/aetherwu/FlaskDocker
-Entry file: FlaskDocker/app/app.py
-Scanned: 2016-10-20 11:15:19.816350
-No vulnerabilities found.
-
-
-anniee/flask-intro
-https://github.com/anniee/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:15:20.329673
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-angeloski/flask-sandbox
-https://github.com/angeloski/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-20 11:15:20.840325
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jonnybazookatone/flask-watchman
-https://github.com/jonnybazookatone/flask-watchman
-Entry file: None
-Scanned: 2016-10-20 11:15:21.356497
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jonnybazookatone/flask-watchman.
-
-dritux/flask-spark
-https://github.com/dritux/flask-spark
-Entry file: flask-spark/spark/__init__.py
-Scanned: 2016-10-20 11:15:23.661590
-No vulnerabilities found.
-
-
-arvind-iyer/flask-101
-https://github.com/arvind-iyer/flask-101
-Entry file: flask-101/app/__init__.py
-Scanned: 2016-10-20 11:15:25.072321
-No vulnerabilities found.
-
-
-vbalien/flask-skeleton
-https://github.com/vbalien/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:15:25.586808
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vbalien/flask-skeleton.
-
-robbintt/flask-template
-https://github.com/robbintt/flask-template
-Entry file: None
-Scanned: 2016-10-20 11:15:26.126881
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/robbintt/flask-template.
-
-Lucky0604/flask-blog
-https://github.com/Lucky0604/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:15:26.714662
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-felipemfp/flask-microblog
-https://github.com/felipemfp/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 11:15:28.227092
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bronka/flask-blog
-https://github.com/bronka/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:15:28.772141
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-genagain/learning-flask
-https://github.com/genagain/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 11:15:33.380878
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-acknowledge/flask-api
-https://github.com/acknowledge/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 11:15:39.398480
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JunQian-Andy/flask_mail
-https://github.com/JunQian-Andy/flask_mail
-Entry file: flask_mail/app/__init__.py
-Scanned: 2016-10-20 11:15:40.740412
-No vulnerabilities found.
-
-
-fabricekwizera/flask_intro
-https://github.com/fabricekwizera/flask_intro
-Entry file: flask_intro/first_app.py
-Scanned: 2016-10-20 11:15:41.266320
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py
-
-relman/flask-srv
-https://github.com/relman/flask-srv
-Entry file: flask-srv/service.py
-Scanned: 2016-10-20 11:15:44.940798
-No vulnerabilities found.
-
-
-volgoweb/flask_api
-https://github.com/volgoweb/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 11:15:45.464797
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-leiyue/tutorial_flask
-https://github.com/leiyue/tutorial_flask
-Entry file: tutorial_flask/base/app.py
-Scanned: 2016-10-20 11:15:46.001539
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sharma-mohit/flask-mongo
-https://github.com/sharma-mohit/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-20 11:15:57.074643
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-samgclarke/flask-starter
-https://github.com/samgclarke/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 11:16:02.609789
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Tmingh/learn_flask
-https://github.com/Tmingh/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:16:04.117361
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-doobeh/flask-lister
-https://github.com/doobeh/flask-lister
-Entry file: flask-lister/app/core.py
-Scanned: 2016-10-20 11:16:05.418462
-No vulnerabilities found.
-
-
-qiuhaoling/my_flask
-https://github.com/qiuhaoling/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 11:16:07.058553
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-ahsanwtc/flask-project
-https://github.com/ahsanwtc/flask-project
-Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:16:16.514362
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-dfitzgerald3/sg_flask
-https://github.com/dfitzgerald3/sg_flask
-Entry file: sg_flask/__init__.py
-Scanned: 2016-10-20 11:16:17.299726
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: sg_flask/venv/lib/python2.7/genericpath.py
-
-hbldh/flask-pybankid
-https://github.com/hbldh/flask-pybankid
-Entry file: flask-pybankid/flask_pybankid.py
-Scanned: 2016-10-20 11:16:18.807469
-Vulnerability 1:
-File: flask-pybankid/flask_pybankid.py
- > User input at line 130, trigger word "get(":
- text_to_sign = request.args.get('userVisibleData', '')
-Reassigned in:
- File: flask-pybankid/flask_pybankid.py
- > Line 132: response = self.client.sign(text_to_sign, personal_number)
- File: flask-pybankid/flask_pybankid.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError.create_from_pybankid_exception(e))
- File: flask-pybankid/flask_pybankid.py
- > Line 136: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError(str(e), 500))
-File: flask-pybankid/flask_pybankid.py
- > reaches line 138, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-krlex/flask-resume
-https://github.com/krlex/flask-resume
-Entry file: flask-resume/manage.py
-Scanned: 2016-10-20 11:16:20.136357
-No vulnerabilities found.
-
-
-chadelder/flask-blog
-https://github.com/chadelder/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:16:20.717123
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-rdrsh/flask-hello
-https://github.com/rdrsh/flask-hello
-Entry file: flask-hello/hello.py
-Scanned: 2016-10-20 11:16:21.249304
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Forumouth/flask-simple
-https://github.com/Forumouth/flask-simple
-Entry file: flask-simple/tests/data/testapp.py
-Scanned: 2016-10-20 11:16:22.663100
-No vulnerabilities found.
-
-
-mattyait/Flask_webapp
-https://github.com/mattyait/Flask_webapp
-Entry file: Flask_webapp/routes.py
-Scanned: 2016-10-20 11:16:24.069175
-Vulnerability 1:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 2:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 3:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 73, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 4:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 78, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 5:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 6:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 89, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 7:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 95, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 8:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-
-
-playgrdstar/flask-blog
-https://github.com/playgrdstar/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:16:24.656357
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-rx3bp/flask-freeze
-https://github.com/rx3bp/flask-freeze
-Entry file: flask-freeze/app.py
-Scanned: 2016-10-20 11:16:28.789475
-No vulnerabilities found.
-
-
-worthlesspenny7/tumblelogFlask
-https://github.com/worthlesspenny7/tumblelogFlask
-Entry file: tumblelogFlask/__init__.py
-Scanned: 2016-10-20 11:16:30.937643
-No vulnerabilities found.
-
-
-NaoYamaguchi/flask_login
-https://github.com/NaoYamaguchi/flask_login
-Entry file: None
-Scanned: 2016-10-20 11:16:31.441201
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/NaoYamaguchi/flask_login.
-
-njnr/onece
-https://github.com/njnr/onece
-Entry file: onece/app/__init__.py
-Scanned: 2016-10-20 11:16:33.170991
-Vulnerability 1:
-File: onece/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 26: posts = pagination.items
- File: onece/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: onece/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: onece/app/main/views.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 43: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: onece/app/main/views.py
- > Line 45: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 48: comments = pagination.items
- File: onece/app/main/views.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: onece/app/main/views.py
- > reaches line 49, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 3:
-File: onece/app/main/views.py
- > User input at line 54, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 55: pagination = Location.query.order_by(Location.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 58: locations = pagination.items
-File: onece/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('locations.html',locations=locations, pagination=pagination)
-
-Vulnerability 4:
-File: onece/app/main/views.py
- > User input at line 117, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 118: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 121: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: onece/app/main/views.py
- > Line 116: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: onece/app/main/views.py
- > reaches line 123, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: onece/app/main/views.py
- > User input at line 134, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 135: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 138: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: onece/app/main/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: onece/app/main/views.py
- > reaches line 140, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-rmaheshkumarblr/FlaskTestingApp
-https://github.com/rmaheshkumarblr/FlaskTestingApp
-Entry file: FlaskTestingApp/testingFlaskScript.py
-Scanned: 2016-10-20 11:16:33.809681
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jrballot/FlaskBlogApp
-https://github.com/jrballot/FlaskBlogApp
-Entry file: FlaskBlogApp/blog.py
-Scanned: 2016-10-20 11:16:35.073354
-No vulnerabilities found.
-
-
-joyzhaoyang/FlaskDirectUploader
-https://github.com/joyzhaoyang/FlaskDirectUploader
-Entry file: FlaskDirectUploader/application.py
-Scanned: 2016-10-20 11:16:37.122917
-No vulnerabilities found.
-
-
-worthlesspenny7/FlaskYoutubeTutorial
-https://github.com/worthlesspenny7/FlaskYoutubeTutorial
-Entry file: FlaskYoutubeTutorial/application.py
-Scanned: 2016-10-20 11:16:37.769715
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/genericpath.py
-
-astianseb/flask-simple-distributed-applicaiton
-https://github.com/astianseb/flask-simple-distributed-applicaiton
-Entry file: flask-simple-distributed-applicaiton/Flasktest/__init__.py
-Scanned: 2016-10-20 11:16:40.307648
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bernaerdik/Flask_on_CF
-https://github.com/bernaerdik/Flask_on_CF
-Entry file: Flask_on_CF/hello.py
-Scanned: 2016-10-20 11:16:41.587460
-No vulnerabilities found.
-
-
-knoxilla/web-flask-dockerized
-https://github.com/knoxilla/web-flask-dockerized
-Entry file: web-flask-dockerized/app.py
-Scanned: 2016-10-20 11:16:42.876349
-No vulnerabilities found.
-
-
-mhgit1/PythonFlask_oma
-https://github.com/mhgit1/PythonFlask_oma
-Entry file: PythonFlask_oma/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:16:50.394323
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-IvanBodnar/fromzero_flask_blog
-https://github.com/IvanBodnar/fromzero_flask_blog
-Entry file: fromzero_flask_blog/__init__.py
-Scanned: 2016-10-20 11:16:51.865659
-Vulnerability 1:
-File: fromzero_flask_blog/author/views.py
- > User input at line 27, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: fromzero_flask_blog/author/views.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
- File: fromzero_flask_blog/author/views.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error)
-File: fromzero_flask_blog/author/views.py
- > reaches line 29, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 2:
-File: fromzero_flask_blog/blog/views.py
- > User input at line 100, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: fromzero_flask_blog/blog/views.py
- > Line 102: slug = slugify(title)
- File: fromzero_flask_blog/blog/views.py
- > Line 103: post = Post(blog, author, title, body, category, filename, slug)
- File: fromzero_flask_blog/blog/views.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: fromzero_flask_blog/blog/views.py
- > reaches line 108, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-Vulnerability 3:
-File: fromzero_flask_blog/blog/views.py
- > User input at line 100, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: fromzero_flask_blog/blog/views.py
- > Line 102: slug = slugify(title)
- File: fromzero_flask_blog/blog/views.py
- > Line 103: post = Post(blog, author, title, body, category, filename, slug)
- File: fromzero_flask_blog/blog/views.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: fromzero_flask_blog/blog/views.py
- > reaches line 108, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-
-
-alexarnautu/simple-flask-blog
-https://github.com/alexarnautu/simple-flask-blog
-Entry file: simple-flask-blog/blog.py
-Scanned: 2016-10-20 11:16:54.146397
-No vulnerabilities found.
-
-
-apiarian/RPi-GPIO-flask
-https://github.com/apiarian/RPi-GPIO-flask
-Entry file: RPi-GPIO-flask/server.py
-Scanned: 2016-10-20 11:16:55.443851
-No vulnerabilities found.
-
-
-tomov/flask-heroku-backend
-https://github.com/tomov/flask-heroku-backend
-Entry file: flask-heroku-backend/app/__init__.py
-Scanned: 2016-10-20 11:16:58.760874
-No vulnerabilities found.
-
-
-MuriloFerraz/intel_edison_flask
-https://github.com/MuriloFerraz/intel_edison_flask
-Entry file: intel_edison_flask/flask_example/contole.py
-Scanned: 2016-10-20 11:17:03.311071
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-akaak/flask-mega-tutorial
-https://github.com/akaak/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 11:17:04.838424
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thechad12/Flask-Item-Catalog
-https://github.com/thechad12/Flask-Item-Catalog
-Entry file: Flask-Item-Catalog/application.py
-Scanned: 2016-10-20 11:17:05.382863
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-javicacheiro/rest_api_flask
-https://github.com/javicacheiro/rest_api_flask
-Entry file: rest_api_flask/rest/app/__init__.py
-Scanned: 2016-10-20 11:17:12.340264
-No vulnerabilities found.
-
-
-florenceloi/flask-intro-redo
-https://github.com/florenceloi/flask-intro-redo
-Entry file: flask-intro-redo/nice.py
-Scanned: 2016-10-20 11:17:19.128515
-No vulnerabilities found.
-
-
-eric-boone/python-flask-round1
-https://github.com/eric-boone/python-flask-round1
-Entry file: python-flask-round1/app/__init__.py
-Scanned: 2016-10-20 11:17:20.439741
-No vulnerabilities found.
-
-
-ddrsmile/flask-taskr-with-blueprint
-https://github.com/ddrsmile/flask-taskr-with-blueprint
-Entry file: flask-taskr-with-blueprint/project/__init__.py
-Scanned: 2016-10-20 11:17:22.707274
-No vulnerabilities found.
-
-
-austinbrovick/flask-book_review_website
-https://github.com/austinbrovick/flask-book_review_website
-Entry file: flask-book_review_website/app/models/User.py
-Scanned: 2016-10-20 11:17:23.720632
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-apiaas/gae-flask-base
-https://github.com/apiaas/gae-flask-base
-Entry file: gae-flask-base/src/main.py
-Scanned: 2016-10-20 11:17:26.047607
-No vulnerabilities found.
-
-
-playgrdstar/flask-hello-world
-https://github.com/playgrdstar/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:17:26.620938
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-iceskel/flask-restful-api
-https://github.com/iceskel/flask-restful-api
-Entry file: flask-restful-api/restful/api.py
-Scanned: 2016-10-20 11:17:30.157298
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-oscarvazquez/flask_mysql_migrations
-https://github.com/oscarvazquez/flask_mysql_migrations
-Entry file: None
-Scanned: 2016-10-20 11:17:30.725085
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bethesdamd/python_flask_pharma
-https://github.com/bethesdamd/python_flask_pharma
-Entry file: python_flask_pharma/app.py
-Scanned: 2016-10-20 11:17:35.455399
-No vulnerabilities found.
-
-
-billdwalters/Flask
-https://github.com/billdwalters/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:17:37.431215
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rlsharpton/flask
-https://github.com/rlsharpton/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:17:38.007948
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ccapudev/flask
-https://github.com/ccapudev/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:17:39.110209
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-hezx/flask
-https://github.com/hezx/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:17:40.685110
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-its-dirg/Flask-pyoidc
-https://github.com/its-dirg/Flask-pyoidc
-Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py
-Scanned: 2016-10-20 11:17:42.232614
-No vulnerabilities found.
-
-
-NJIT-SIG-WEBDEV/flask-intro
-https://github.com/NJIT-SIG-WEBDEV/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:17:42.746848
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-karanj112294/flasktutorial
-https://github.com/karanj112294/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 11:17:45.280212
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chadelder/flasktaskr
-https://github.com/chadelder/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:17:51.777536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jocelynaladin/flaskworkspace
-https://github.com/jocelynaladin/flaskworkspace
-Entry file: flaskworkspace/__init__.py
-Scanned: 2016-10-20 11:17:53.430203
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KDmytro/flasktaskr
-https://github.com/KDmytro/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:17:54.949479
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dreamtiger2016/flaskr
-https://github.com/dreamtiger2016/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:17:58.463257
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-davetromp/flasksqlapi
-https://github.com/davetromp/flasksqlapi
-Entry file: flasksqlapi/runapi.py
-Scanned: 2016-10-20 11:18:04.030838
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xu00wei/flasky
-https://github.com/xu00wei/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:18:05.531237
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zzclynn/flaskr
-https://github.com/zzclynn/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:18:06.039865
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-psykos/flaskloginskeleton
-https://github.com/psykos/flaskloginskeleton
-Entry file: flaskloginskeleton/app/__init__.py
-Scanned: 2016-10-20 11:18:09.337607
-No vulnerabilities found.
-
-
-AndrewGoldstein/flaskapp
-https://github.com/AndrewGoldstein/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:18:11.875993
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp.
-
-JamesMilnerUK/Loxo
-https://github.com/JamesMilnerUK/Loxo
-Entry file: Loxo/loxoapi.py
-Scanned: 2016-10-20 11:18:18.398507
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nescode/punchstarter
-https://github.com/nescode/punchstarter
-Entry file: punchstarter/punchstarter/__init__.py
-Scanned: 2016-10-20 11:18:19.810943
-Vulnerability 1:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 31, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 36, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550)
- File: punchstarter/punchstarter/__init__.py
- > Line 43: image_filename = uploaded_image['public_id']
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 45, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 31, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 36, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550)
- File: punchstarter/punchstarter/__init__.py
- > Line 43: image_filename = uploaded_image['public_id']
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 6:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 45, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 7:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 64, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 8:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 9:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 93, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 10:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 93, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 11:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 97, trigger word "get(":
- query = request.args.get('q') or ''
-File: punchstarter/punchstarter/__init__.py
- > reaches line 98, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 12:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 97, trigger word "get(":
- query = request.args.get('q') or ''
-File: punchstarter/punchstarter/__init__.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count)
-
-
-
-edwardszczepanski/FlaskApplication
-https://github.com/edwardszczepanski/FlaskApplication
-Entry file: FlaskApplication/app.py
-Scanned: 2016-10-20 11:18:20.443063
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskApplication/venv/lib/python2.7/genericpath.py
-
-AllyW/flaskyDeb
-https://github.com/AllyW/flaskyDeb
-Entry file: flaskyDeb/app/__init__.py
-Scanned: 2016-10-20 11:18:23.372931
-Vulnerability 1:
-File: flaskyDeb/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 55: posts = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskyDeb/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 45: show_followed = False
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskyDeb/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 67: posts = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskyDeb/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskyDeb/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 134: comments = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskyDeb/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskyDeb/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskyDeb/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskyDeb/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 246: comments = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-jgabrielfreitas/FlaskFirebase
-https://github.com/jgabrielfreitas/FlaskFirebase
-Entry file: FlaskFirebase/runner.py
-Scanned: 2016-10-20 11:18:24.670349
-No vulnerabilities found.
-
-
-chrismontone/flasktaskr2
-https://github.com/chrismontone/flasktaskr2
-Entry file: flasktaskr2/project/__init__.py
-Scanned: 2016-10-20 11:18:26.841565
-No vulnerabilities found.
-
-
-scarabcoder/FlaskSite
-https://github.com/scarabcoder/FlaskSite
-Entry file: FlaskSite/runServer.py
-Scanned: 2016-10-20 11:18:27.573857
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-musicalfish/FlaskApp
-https://github.com/musicalfish/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 11:18:28.185775
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-oscarmeanwell/FlaskMusic
-https://github.com/oscarmeanwell/FlaskMusic
-Entry file: FlaskMusic/app/routesun.py
-Scanned: 2016-10-20 11:18:28.865823
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TwilioDevEd/eta-notifications-flask
-https://github.com/TwilioDevEd/eta-notifications-flask
-Entry file: eta-notifications-flask/eta_notifications_flask/__init__.py
-Scanned: 2016-10-20 11:18:30.440840
-Vulnerability 1:
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > User input at line 29, trigger word "get(":
- order = Order.query.get(order_id)
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order)
-
-Vulnerability 2:
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > User input at line 63, trigger word "get(":
- order = Order.query.get(order_id)
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > reaches line 67, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order)
-
-
-
-johnsliao/flask-sqlite3-chartjs-toy
-https://github.com/johnsliao/flask-sqlite3-chartjs-toy
-Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py
-Scanned: 2016-10-20 11:18:32.179547
-No vulnerabilities found.
-
-
-QsBBQ/flask_test
-https://github.com/QsBBQ/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:18:32.805115
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pedrocarvalhodev/flask-intro
-https://github.com/pedrocarvalhodev/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:18:36.340104
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lawrencexia/flask_notecards
-https://github.com/lawrencexia/flask_notecards
-Entry file: flask_notecards/app/__init__.py
-Scanned: 2016-10-20 11:18:38.756781
-No vulnerabilities found.
-
-
-ameya0909/Flask-Blog
-https://github.com/ameya0909/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 11:18:39.278929
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chrismontone/flask-blog
-https://github.com/chrismontone/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:18:39.817880
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-ziggear/wechat-flask
-https://github.com/ziggear/wechat-flask
-Entry file: wechat-flask/src/myapp.py
-Scanned: 2016-10-20 11:18:41.282666
-No vulnerabilities found.
-
-
-yetship/flask-usages
-https://github.com/yetship/flask-usages
-Entry file: flask-usages/application/__init__.py
-Scanned: 2016-10-20 11:18:42.703340
-Vulnerability 1:
-File: flask-usages/application/controllers/todo.py
- > User input at line 12, trigger word "get(":
- todo_id = request.args.get('todo_id')
-Reassigned in:
- File: flask-usages/application/controllers/todo.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify()
-File: flask-usages/application/controllers/todo.py
- > reaches line 15, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content)
-
-Vulnerability 2:
-File: flask-usages/application/controllers/todo.py
- > User input at line 21, trigger word "get(":
- todo = Todo(content=data.get('content'))
-File: flask-usages/application/controllers/todo.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content)
-
-
-
-drmalex07/flask-helloworld
-https://github.com/drmalex07/flask-helloworld
-Entry file: flask-helloworld/helloworld/app.py
-Scanned: 2016-10-20 11:18:44.448935
-No vulnerabilities found.
-
-
-Oracleli/flask-try
-https://github.com/Oracleli/flask-try
-Entry file: None
-Scanned: 2016-10-20 11:18:44.969687
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Oracleli/flask-try.
-
-al4/flask-tokenauth
-https://github.com/al4/flask-tokenauth
-Entry file: flask-tokenauth/test_tokenauth.py
-Scanned: 2016-10-20 11:18:46.288086
-No vulnerabilities found.
-
-
-marcosomma/first_flask
-https://github.com/marcosomma/first_flask
-Entry file: first_flask/app/__init__.py
-Scanned: 2016-10-20 11:18:56.692231
-No vulnerabilities found.
-
-
-miracleluchen/blog-flask
-https://github.com/miracleluchen/blog-flask
-Entry file: blog-flask/project/views.py
-Scanned: 2016-10-20 11:18:59.372011
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-meyersj/bootstrap-flask
-https://github.com/meyersj/bootstrap-flask
-Entry file: bootstrap-flask/app/__init__.py
-Scanned: 2016-10-20 11:19:05.678725
-No vulnerabilities found.
-
-
-sharma-mohit/flask-mongo
-https://github.com/sharma-mohit/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-20 11:19:06.674688
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jarogers095/flask-blog
-https://github.com/jarogers095/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:19:09.241372
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Jelly-Yu/learningFlask
-https://github.com/Jelly-Yu/learningFlask
-Entry file: learningFlask/hello.py
-Scanned: 2016-10-20 11:19:12.913575
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py
-
-ratherbsurfing/flask-cms
-https://github.com/ratherbsurfing/flask-cms
-Entry file: flask-cms/flaskCMS/flaskCMS/__init__.py
-Scanned: 2016-10-20 11:19:18.491674
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-philtrep/Flask-Skeleton
-https://github.com/philtrep/Flask-Skeleton
-Entry file: None
-Scanned: 2016-10-20 11:19:19.026972
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/philtrep/Flask-Skeleton.
-
-cynrick/kickstarter-flask
-https://github.com/cynrick/kickstarter-flask
-Entry file: kickstarter-flask/kickstarter/__init__.py
-Scanned: 2016-10-20 11:19:21.465604
-Vulnerability 1:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 29, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 32, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 29, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 32, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 50, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 6:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 59, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 7:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 59, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 79, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 8:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 59, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 79, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 9:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 83, trigger word "get(":
- query = request.args.get('q') or ''
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 84, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 10:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 83, trigger word "get(":
- query = request.args.get('q') or ''
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 92, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count)
-
-
-
-kessiacastro/flask-blog
-https://github.com/kessiacastro/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:19:22.023121
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-doobeh/flask-lister
-https://github.com/doobeh/flask-lister
-Entry file: flask-lister/app/core.py
-Scanned: 2016-10-20 11:19:25.429704
-No vulnerabilities found.
-
-
-rjturek/flask-etf
-https://github.com/rjturek/flask-etf
-Entry file: flask-etf/flask_etf_main.py
-Scanned: 2016-10-20 11:19:26.751142
-No vulnerabilities found.
-
-
-worthlesspenny7/tumblelogFlask
-https://github.com/worthlesspenny7/tumblelogFlask
-Entry file: tumblelogFlask/__init__.py
-Scanned: 2016-10-20 11:19:29.056467
-No vulnerabilities found.
-
-
-axontrust/alexa-flask
-https://github.com/axontrust/alexa-flask
-Entry file: alexa-flask/app/__init__.py
-Scanned: 2016-10-20 11:19:29.607860
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-asjedh/flask_tutorial
-https://github.com/asjedh/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:19:30.171324
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-robb216/MyFlask
-https://github.com/robb216/MyFlask
-Entry file: MyFlask/MyFlask.py
-Scanned: 2016-10-20 11:19:31.868917
-No vulnerabilities found.
-
-
-rogerpence/flask-blueprint
-https://github.com/rogerpence/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 11:19:32.404991
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-androidzhibinw/flask-bootstrap
-https://github.com/androidzhibinw/flask-bootstrap
-Entry file: flask-bootstrap/app/__init__.py
-Scanned: 2016-10-20 11:19:34.598340
-No vulnerabilities found.
-
-
-ytanno/PlotFlask
-https://github.com/ytanno/PlotFlask
-Entry file: PlotFlask/FlaskTest1/FlaskTest1/__init__.py
-Scanned: 2016-10-20 11:19:44.575262
-No vulnerabilities found.
-
-
-psykos/psilex-flask
-https://github.com/psykos/psilex-flask
-Entry file: psilex-flask/app/__init__.py
-Scanned: 2016-10-20 11:19:46.034554
-No vulnerabilities found.
-
-
-Hank02/flask_example
-https://github.com/Hank02/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:19:46.565586
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-VerdigrisReader/flask-workshop
-https://github.com/VerdigrisReader/flask-workshop
-Entry file: flask-workshop/hello_world/hello.py
-Scanned: 2016-10-20 11:19:47.077172
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rogerpence/flask-skeleton
-https://github.com/rogerpence/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:19:47.586966
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rogerpence/flask-skeleton.
-
-rodcox89/FlaskDynamoStarterKit
-https://github.com/rodcox89/FlaskDynamoStarterKit
-Entry file: FlaskDynamoStarterKit/main.py
-Scanned: 2016-10-20 11:19:48.355102
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskDynamoStarterKit/venv/lib/python2.7/genericpath.py
-
-pulysak/FlaskServer-Tests
-https://github.com/pulysak/FlaskServer-Tests
-Entry file: FlaskServer-Tests/server.py
-Scanned: 2016-10-20 11:19:49.012026
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskServer-Tests/flask_env/lib/python2.7/genericpath.py
-
-rbtoner/FlaskWebApp
-https://github.com/rbtoner/FlaskWebApp
-Entry file: FlaskWebApp/FanGuardFlask/__init__.py
-Scanned: 2016-10-20 11:19:49.527067
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-worthlesspenny7/FlaskYoutubeTutorial
-https://github.com/worthlesspenny7/FlaskYoutubeTutorial
-Entry file: FlaskYoutubeTutorial/application.py
-Scanned: 2016-10-20 11:19:52.625665
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/genericpath.py
-
-MGago/flaskBasicApp1
-https://github.com/MGago/flaskBasicApp1
-Entry file: None
-Scanned: 2016-10-20 11:19:54.159370
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-skpdvidby0/Flask-Python-App
-https://github.com/skpdvidby0/Flask-Python-App
-Entry file: Flask-Python-App/flaskapp.py
-Scanned: 2016-10-20 11:19:56.745267
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Python-App/virtenv/lib/python2.7/genericpath.py
-
-sindhus/flask-mega-tutorial
-https://github.com/sindhus/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 11:20:05.753403
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mbreisch/real-python-flask-bdd
-https://github.com/mbreisch/real-python-flask-bdd
-Entry file: real-python-flask-bdd/flaskr.py
-Scanned: 2016-10-20 11:20:07.595124
-No vulnerabilities found.
-
-
-MuriloFerraz/intel_edison_flask
-https://github.com/MuriloFerraz/intel_edison_flask
-Entry file: intel_edison_flask/flask_example/contole.py
-Scanned: 2016-10-20 11:20:10.098614
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PiyushGoyal443/studentLogin_API_Flask
-https://github.com/PiyushGoyal443/studentLogin_API_Flask
-Entry file: studentLogin_API_Flask/server.py
-Scanned: 2016-10-20 11:20:13.656785
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GertjanvanhetHof/helloworld_with_flask
-https://github.com/GertjanvanhetHof/helloworld_with_flask
-Entry file: helloworld_with_flask/mypython.py
-Scanned: 2016-10-20 11:20:19.960756
-No vulnerabilities found.
-
-
-taromurao/flask-python-logger-experiment
-https://github.com/taromurao/flask-python-logger-experiment
-Entry file: flask-python-logger-experiment/app.py
-Scanned: 2016-10-20 11:20:21.286981
-No vulnerabilities found.
-
-
-mikicaivosevic/flask-simple-todo
-https://github.com/mikicaivosevic/flask-simple-todo
-Entry file: flask-simple-todo/app.py
-Scanned: 2016-10-20 11:20:22.572308
-No vulnerabilities found.
-
-
-KDmytro/flask-hello-world
-https://github.com/KDmytro/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:20:23.134313
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-bepetersn/flask-permissions-ex
-https://github.com/bepetersn/flask-permissions-ex
-Entry file: flask-permissions-ex/ex/__init__.py
-Scanned: 2016-10-20 11:20:27.048775
-No vulnerabilities found.
-
-
-EricSchles/db_migrations_flask
-https://github.com/EricSchles/db_migrations_flask
-Entry file: db_migrations_flask/app/__init__.py
-Scanned: 2016-10-20 11:20:31.183354
-No vulnerabilities found.
-
-
-yyssjj33/flask-menu-application
-https://github.com/yyssjj33/flask-menu-application
-Entry file: flask-menu-application/project.py
-Scanned: 2016-10-20 11:20:31.712003
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kessiacastro/flask-hello-world
-https://github.com/kessiacastro/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:20:32.303209
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-androidzhibinw/flask-app-builder-example
-https://github.com/androidzhibinw/flask-app-builder-example
-Entry file: flask-app-builder-example/myapp/app/__init__.py
-Scanned: 2016-10-20 11:20:33.668029
-No vulnerabilities found.
-
-
-tim1978/flask-hello-world
-https://github.com/tim1978/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:20:34.228467
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-jmcevoy1984/Flask-Restful-Tutorial
-https://github.com/jmcevoy1984/Flask-Restful-Tutorial
-Entry file: Flask-Restful-Tutorial/app.py
-Scanned: 2016-10-20 11:20:38.587452
-No vulnerabilities found.
-
-
-jigen7/python_flask_tutorial
-https://github.com/jigen7/python_flask_tutorial
-Entry file: python_flask_tutorial/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:20:53.290818
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-danieltl/python_flask_final
-https://github.com/danieltl/python_flask_final
-Entry file: python_flask_final/application.py
-Scanned: 2016-10-20 11:20:55.202602
-No vulnerabilities found.
-
-
-devizier/flask-hello-world
-https://github.com/devizier/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:20:55.778429
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-tomov/flask-location-survey-psych
-https://github.com/tomov/flask-location-survey-psych
-Entry file: flask-location-survey-psych/app/__init__.py
-Scanned: 2016-10-20 11:20:56.313332
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rakou1986/flask-mvt-min
-https://github.com/rakou1986/flask-mvt-min
-Entry file: flask-mvt-min/webapp/app.py
-Scanned: 2016-10-20 11:20:57.630869
-No vulnerabilities found.
-
-
-mbreisch/real-python-reverse-flask
-https://github.com/mbreisch/real-python-reverse-flask
-Entry file: None
-Scanned: 2016-10-20 11:20:58.148620
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mbreisch/real-python-reverse-flask.
-
-jeet4320/PythonFlask-IBMBluemix
-https://github.com/jeet4320/PythonFlask-IBMBluemix
-Entry file: PythonFlask-IBMBluemix/welcome.py
-Scanned: 2016-10-20 11:20:58.678771
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-junniepat/Python-flask-app
-https://github.com/junniepat/Python-flask-app
-Entry file: Python-flask-app/app.py
-Scanned: 2016-10-20 11:20:59.972317
-No vulnerabilities found.
-
-
-Kwpolska/flask-demo-app
-https://github.com/Kwpolska/flask-demo-app
-Entry file: flask-demo-app/app.py
-Scanned: 2016-10-20 11:21:00.510871
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tiangolo/uwsgi-nginx-flask-docker
-https://github.com/tiangolo/uwsgi-nginx-flask-docker
-Entry file: uwsgi-nginx-flask-docker/example-flask-python3.5-upload/app/main.py
-Scanned: 2016-10-20 11:21:03.539046
-No vulnerabilities found.
-
-
-bobdorff/flask
-https://github.com/bobdorff/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:21:06.656305
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-chrisvasey/flask
-https://github.com/chrisvasey/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:21:07.226514
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wildjan/Flask
-https://github.com/wildjan/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:21:10.792255
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-smltc/Flask
-https://github.com/smltc/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:21:14.321192
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rlsharpton/flask
-https://github.com/rlsharpton/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:21:19.878389
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-mikelkl/flasky
-https://github.com/mikelkl/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:21:21.375354
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-besimaltnok/Flask-Examples
-https://github.com/besimaltnok/Flask-Examples
-Entry file: Flask-Examples/helloworld.py
-Scanned: 2016-10-20 11:21:23.390742
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-luo-jialin/flask-
-https://github.com/luo-jialin/flask-
-Entry file: flask-/flaskr.py
-Scanned: 2016-10-20 11:21:25.714212
-No vulnerabilities found.
-
-
-ubbochum/hb2_flask
-https://github.com/ubbochum/hb2_flask
-Entry file: hb2_flask/hb2_flask.py
-Scanned: 2016-10-20 11:21:32.897326
-Vulnerability 1:
-File: hb2_flask/hb2_flask.py
- > User input at line 362, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 369: index_solr = Solr(start=page - 1 * 10, query=current_user.email, facet='false')
- File: hb2_flask/hb2_flask.py
- > Line 372: records = index_solr.results
- File: hb2_flask/hb2_flask.py
- > Line 376: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 379: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 361: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 363: records = []
- File: hb2_flask/hb2_flask.py
- > Line 365: index_solr = ''
- File: hb2_flask/hb2_flask.py
- > Line 366: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 380, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',header=lazy_gettext('Home'), site=theme(request.access_route), numFound=num_found, records=records, pagination=pagination, offset=mystart - 1)
-
-Vulnerability 2:
-File: hb2_flask/hb2_flask.py
- > User input at line 416, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 417: duplicates_solr = Solr(start=page - 1 * 10, fquery=['dedupid:[* TO *]'], group='true', group_field='dedupid', group_limit=100, facet='false')
- File: hb2_flask/hb2_flask.py
- > Line 424: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('duplicate groups'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 427: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 415: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 423: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 428, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('duplicates.html',groups=duplicates_solr.results, pagination=pagination, header=lazy_gettext('Duplicates'), site=theme(request.access_route), offset=mystart - 1)
-
-Vulnerability 3:
-File: hb2_flask/hb2_flask.py
- > User input at line 433, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons'))
- File: hb2_flask/hb2_flask.py
- > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 434: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 446, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now())
-
-Vulnerability 4:
-File: hb2_flask/hb2_flask.py
- > User input at line 433, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons'))
- File: hb2_flask/hb2_flask.py
- > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 434: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 455, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), del_redirect='persons')
-
-Vulnerability 5:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 6:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 7:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 8:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 9:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 10:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 11:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 12:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 13:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 14:
-File: hb2_flask/hb2_flask.py
- > User input at line 742, trigger word "get(":
- bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json()
-File: hb2_flask/hb2_flask.py
- > reaches line 744, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value')))
-
-Vulnerability 15:
-File: hb2_flask/hb2_flask.py
- > User input at line 749, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 787: dashboard_solr = Solr(start=page - 1 * 10, query=query, sort='recordCreationDate asc', json_facet=DASHBOARD_FACETS, fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 795: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 798: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 750: mystart = 0
- File: hb2_flask/hb2_flask.py
- > Line 791: pagination = ''
-File: hb2_flask/hb2_flask.py
- > reaches line 801, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('dashboard.html',records=dashboard_solr.results, facet_data=dashboard_solr.facets, header=lazy_gettext('Dashboard'), site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), target='dashboard', del_redirect='dashboard')
-
-Vulnerability 16:
-File: hb2_flask/hb2_flask.py
- > User input at line 826, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 827: locked_solr = Solr(core='hb2', fquery=['locked:true', 'recordChangeDate:[* TO NOW-1HOUR]'], sort='recordChangeDate asc', start=page - 1 * 10)
- File: hb2_flask/hb2_flask.py
- > Line 831: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('records'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 834: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 824: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 841, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('superadmin.html',locked_records=locked_solr.results, header=lazy_gettext('Superadmin Board'), import_records=solr_dumps.results, offset=mystart - 1, pagination=pagination, del_redirect='superadmin', form=form, site=theme(request.access_route))
-
-Vulnerability 17:
-File: hb2_flask/hb2_flask.py
- > User input at line 912, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units'))
- File: hb2_flask/hb2_flask.py
- > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 913: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 925, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now())
-
-Vulnerability 18:
-File: hb2_flask/hb2_flask.py
- > User input at line 912, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units'))
- File: hb2_flask/hb2_flask.py
- > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 913: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 933, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now())
-
-Vulnerability 19:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1110, trigger word "replace(":
- solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z')
-
-Vulnerability 20:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1112, trigger word "replace(":
- solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z')
-
-Vulnerability 21:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype)
-
-Vulnerability 22:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1160, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data)
-
-Vulnerability 23:
-File: hb2_flask/hb2_flask.py
- > User input at line 1167, trigger word "get(":
- is_part_of = show_record_solr.results[0].get('is_part_of')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 24:
-File: hb2_flask/hb2_flask.py
- > User input at line 1168, trigger word "get(":
- has_part = show_record_solr.results[0].get('has_part')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 25:
-File: hb2_flask/hb2_flask.py
- > User input at line 1169, trigger word "get(":
- other_version = show_record_solr.results[0].get('other_version')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 26:
-File: hb2_flask/hb2_flask.py
- > User input at line 1171, trigger word "get(":
- thedata = json.loads(show_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1173: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 27:
-File: hb2_flask/hb2_flask.py
- > User input at line 1172, trigger word "get(":
- locked = show_record_solr.results[0].get('locked')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 28:
-File: hb2_flask/hb2_flask.py
- > User input at line 1173, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 29:
-File: hb2_flask/hb2_flask.py
- > User input at line 1189, trigger word "get(":
- thedata = json.loads(show_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1190: form = PersonAdminForm.from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1192, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('name'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=person_id, pubtype='person', del_redirect='persons')
-
-Vulnerability 30:
-File: hb2_flask/hb2_flask.py
- > User input at line 1200, trigger word "get(":
- thedata = json.loads(show_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1201: form = OrgaAdminForm.from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1203, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('pref_label'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=orga_id, pubtype='organisation', del_redirect='organisations')
-
-Vulnerability 31:
-File: hb2_flask/hb2_flask.py
- > User input at line 1213, trigger word "get(":
- thedata = json.loads(edit_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1218: form = OrgaAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas'))
- File: hb2_flask/hb2_flask.py
- > Line 1216: form = OrgaAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1223, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update')
-
-Vulnerability 32:
-File: hb2_flask/hb2_flask.py
- > User input at line 1213, trigger word "get(":
- thedata = json.loads(edit_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1218: form = OrgaAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas'))
- File: hb2_flask/hb2_flask.py
- > Line 1216: form = OrgaAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1231, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(orga)s',orga=form.data.get('pref_label')), site=theme(request.access_route), action='https://github.com/update', pubtype='organisation')
-
-Vulnerability 33:
-File: hb2_flask/hb2_flask.py
- > User input at line 1242, trigger word "get(":
- thedata = json.loads(edit_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1247: form = PersonAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons'))
- File: hb2_flask/hb2_flask.py
- > Line 1245: form = PersonAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1253, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update')
-
-Vulnerability 34:
-File: hb2_flask/hb2_flask.py
- > User input at line 1242, trigger word "get(":
- thedata = json.loads(edit_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1247: form = PersonAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons'))
- File: hb2_flask/hb2_flask.py
- > Line 1245: form = PersonAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1261, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(person)s',person=form.data.get('name')), site=theme(request.access_route), action='https://github.com/update', pubtype='person')
-
-Vulnerability 35:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 36:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 37:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 38:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 39:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 40:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 41:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 42:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 43:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 44:
-File: hb2_flask/hb2_flask.py
- > User input at line 1491, trigger word "form[":
- target = request.form['next']
-File: hb2_flask/hb2_flask.py
- > reaches line 1493, trigger word "url_for(":
- target = url_for(endpoint,values)
-
-Vulnerability 45:
-File: hb2_flask/hb2_flask.py
- > User input at line 1491, trigger word "form[":
- target = request.form['next']
-File: hb2_flask/hb2_flask.py
- > reaches line 1494, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(target)
-
-Vulnerability 46:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 47:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 48:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 49:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 50:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 51:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 52:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 53:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 54:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1573, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route))
-
-Vulnerability 55:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1573, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route))
-
-Vulnerability 56:
-File: hb2_flask/hb2_flask.py
- > User input at line 1627, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1628: solr_dumps = Solr(core='hb2_users', query='id:*.json', facet='false', start=page - 1 * 10)
- File: hb2_flask/hb2_flask.py
- > Line 1631: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('dumps'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 1634: mystart = 1 + pagination.page - 1 * pagination.per_page
-File: hb2_flask/hb2_flask.py
- > reaches line 1636, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('solr_dumps.html',records=solr_dumps.results, offset=mystart - 1, pagination=pagination, header=lazy_gettext('Import Dump'), del_redirect='import/solr_dumps', form=form)
-
-Vulnerability 57:
-File: hb2_flask/hb2_flask.py
- > User input at line 1652, trigger word "get(":
- thedata = json.loads(import_solr.results[0].get('dump')[0])
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1645: thedata = ''
- File: hb2_flask/hb2_flask.py
- > Line 1656: thedata = json.loads(form.file.data.stream.read())
-File: hb2_flask/hb2_flask.py
- > reaches line 1665, trigger word "flash(":
- flash('%s records imported!' % len(thedata), 'success')
-
-Vulnerability 58:
-File: hb2_flask/hb2_flask.py
- > User input at line 1656, trigger word ".data":
- thedata = json.loads(form.file.data.stream.read())
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1645: thedata = ''
- File: hb2_flask/hb2_flask.py
- > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0])
-File: hb2_flask/hb2_flask.py
- > reaches line 1665, trigger word "flash(":
- flash('%s records imported!' % len(thedata), 'success')
-
-Vulnerability 59:
-File: hb2_flask/processors/mods_parser.py
- > User input at line 123, trigger word "get(":
- pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '')
-Reassigned in:
- File: hb2_flask/processors/mods_parser.py
- > Line 120: pnd = ''
-File: hb2_flask/processors/mods_parser.py
- > reaches line 123, trigger word "replace(":
- pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '')
-
-
-
-Vertabelo/flask-oauth-demo-app
-https://github.com/Vertabelo/flask-oauth-demo-app
-Entry file: flask-oauth-demo-app/models.py
-Scanned: 2016-10-20 11:21:33.425035
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-waharnum/inlibraries.com
-https://github.com/waharnum/inlibraries.com
-Entry file: None
-Scanned: 2016-10-20 11:21:33.960525
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-billyfung/flask_shortener
-https://github.com/billyfung/flask_shortener
-Entry file: flask_shortener/app.py
-Scanned: 2016-10-20 11:21:35.282945
-Vulnerability 1:
-File: flask_shortener/app.py
- > User input at line 41, trigger word "form[":
- url_to_parse = request.form['input-url']
-Reassigned in:
- File: flask_shortener/app.py
- > Line 42: parts = urlparse.urlparse(url_to_parse)
- File: flask_shortener/app.py
- > Line 47: short_id = shorten(url_to_parse)
-File: flask_shortener/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id)
-
-Vulnerability 2:
-File: flask_shortener/app.py
- > User input at line 52, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(link_target)
-
-Vulnerability 3:
-File: flask_shortener/app.py
- > User input at line 60, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-Vulnerability 4:
-File: flask_shortener/app.py
- > User input at line 63, trigger word "get(":
- click_count = int(redis.get('click-count:' + short_id) or 0)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-
-
-MLH/my-mlh-flask-example
-https://github.com/MLH/my-mlh-flask-example
-Entry file: my-mlh-flask-example/app.py
-Scanned: 2016-10-20 11:21:37.100262
-No vulnerabilities found.
-
-
-hammygoonan/Flaskify
-https://github.com/hammygoonan/Flaskify
-Entry file: Flaskify/project/__init__.py
-Scanned: 2016-10-20 11:21:38.636443
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-anujspatel/flaskr
-https://github.com/anujspatel/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:21:46.166468
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-williamcaban/flaskrcloud
-https://github.com/williamcaban/flaskrcloud
-Entry file: flaskrcloud/flaskr.py
-Scanned: 2016-10-20 11:21:54.692978
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-crazyqipython/flaskdemo
-https://github.com/crazyqipython/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 11:21:55.211099
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pythondude325/flaskr
-https://github.com/pythondude325/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:21:55.711450
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fenske/flasky
-https://github.com/fenske/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:21:57.222534
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fakegit/flasky
-https://github.com/fakegit/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:21:57.729938
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Anddor/flaskr
-https://github.com/Anddor/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:21:59.201376
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jarogers095/flasktaskr
-https://github.com/jarogers095/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:22:00.752901
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zzclynn/flaskr
-https://github.com/zzclynn/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:22:01.258671
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-johnpwillman/flasktest
-https://github.com/johnpwillman/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 11:22:02.762846
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottmarinoff/Flasky
-https://github.com/scottmarinoff/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 11:22:06.276852
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JamesMilnerUK/Loxo
-https://github.com/JamesMilnerUK/Loxo
-Entry file: Loxo/loxoapi.py
-Scanned: 2016-10-20 11:22:06.783358
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rkholoniuk/FlaskAPI
-https://github.com/rkholoniuk/FlaskAPI
-Entry file: None
-Scanned: 2016-10-20 11:22:07.298810
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI.
-
-AllyW/flaskyDeb
-https://github.com/AllyW/flaskyDeb
-Entry file: flaskyDeb/app/__init__.py
-Scanned: 2016-10-20 11:22:12.138821
-Vulnerability 1:
-File: flaskyDeb/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 55: posts = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskyDeb/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 45: show_followed = False
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskyDeb/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 67: posts = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskyDeb/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskyDeb/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 134: comments = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskyDeb/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskyDeb/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskyDeb/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskyDeb/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 246: comments = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-jmcerv/FlaskTutorial
-https://github.com/jmcerv/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 11:22:14.711520
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-LaRueGT/FlaskBlog
-https://github.com/LaRueGT/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 11:22:20.361160
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhou18520786640/FlaskWeb
-https://github.com/zhou18520786640/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 11:22:22.041228
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-ethanphunter/FlaskExperiment
-https://github.com/ethanphunter/FlaskExperiment
-Entry file: FlaskExperiment/main.py
-Scanned: 2016-10-20 11:22:22.623467
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-asimonia/FlaskJeopardy
-https://github.com/asimonia/FlaskJeopardy
-Entry file: FlaskJeopardy/app/__init__.py
-Scanned: 2016-10-20 11:22:33.385203
-Vulnerability 1:
-File: FlaskJeopardy/app/main/views.py
- > User input at line 17, trigger word ".data":
- show_number = form.show_number.data
-Reassigned in:
- File: FlaskJeopardy/app/main/views.py
- > Line 32: questions = Questionbank.objects(show_number=show_number, current_round='Jeopardy!')
- File: FlaskJeopardy/app/main/views.py
- > Line 33: init_game = Game(state='playing', show_number=show_number, current_round='Jeopardy!')
- File: FlaskJeopardy/app/main/views.py
- > Line 12: ret_MAYBE_FUNCTION_NAME = render_template('questions/index.html',form=form)
-File: FlaskJeopardy/app/main/views.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('questions/game_board.html',game=init_game)
-
-
-
-motleytech/flaskPlate
-https://github.com/motleytech/flaskPlate
-Entry file: flaskPlate/app/app.py
-Scanned: 2016-10-20 11:22:35.756640
-No vulnerabilities found.
-
-
-ciricihq/wkhtmltopdf-flask-aas
-https://github.com/ciricihq/wkhtmltopdf-flask-aas
-Entry file: wkhtmltopdf-flask-aas/app.py
-Scanned: 2016-10-20 11:22:37.416509
-No vulnerabilities found.
-
-
-cr8ivecodesmith/save22-flask-course-src
-https://github.com/cr8ivecodesmith/save22-flask-course-src
-Entry file: save22-flask-course-src/01-hello/app2_1.py
-Scanned: 2016-10-20 11:22:38.865248
-No vulnerabilities found.
-
-
-johnsliao/flask-sqlite3-chartjs-toy
-https://github.com/johnsliao/flask-sqlite3-chartjs-toy
-Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py
-Scanned: 2016-10-20 11:22:40.150068
-No vulnerabilities found.
-
-
-swkaen/Flask_LED
-https://github.com/swkaen/Flask_LED
-Entry file: Flask_LED/hello.py
-Scanned: 2016-10-20 11:22:41.449700
-No vulnerabilities found.
-
-
-johnsliao/flask-bp
-https://github.com/johnsliao/flask-bp
-Entry file: flask-bp/flaskApp.py
-Scanned: 2016-10-20 11:22:42.721023
-No vulnerabilities found.
-
-
-MaximeGir/flask_skeleton
-https://github.com/MaximeGir/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 11:22:43.233614
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-devmtnaing/python_flask
-https://github.com/devmtnaing/python_flask
-Entry file: None
-Scanned: 2016-10-20 11:22:43.764745
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/devmtnaing/python_flask.
-
-josepablob/flask-blog
-https://github.com/josepablob/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:22:44.333083
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-faraday-effect/spectacle-flask
-https://github.com/faraday-effect/spectacle-flask
-Entry file: spectacle-flask/app/__init__.py
-Scanned: 2016-10-20 11:22:47.749863
-No vulnerabilities found.
-
-
-yetship/flask-usages
-https://github.com/yetship/flask-usages
-Entry file: flask-usages/application/__init__.py
-Scanned: 2016-10-20 11:22:56.236937
-Vulnerability 1:
-File: flask-usages/application/controllers/todo.py
- > User input at line 12, trigger word "get(":
- todo_id = request.args.get('todo_id')
-Reassigned in:
- File: flask-usages/application/controllers/todo.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify()
-File: flask-usages/application/controllers/todo.py
- > reaches line 15, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content)
-
-Vulnerability 2:
-File: flask-usages/application/controllers/todo.py
- > User input at line 21, trigger word "get(":
- todo = Todo(content=data.get('content'))
-File: flask-usages/application/controllers/todo.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content)
-
-
-
-raticate/flask-tutorial
-https://github.com/raticate/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:22:56.747378
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cnds/flask_web
-https://github.com/cnds/flask_web
-Entry file: flask_web/helloflask.py
-Scanned: 2016-10-20 11:22:57.357072
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py
-
-al4/flask-tokenauth
-https://github.com/al4/flask-tokenauth
-Entry file: flask-tokenauth/test_tokenauth.py
-Scanned: 2016-10-20 11:22:58.667142
-No vulnerabilities found.
-
-
-jgoret/flask-dataset
-https://github.com/jgoret/flask-dataset
-Entry file: flask-dataset/flask_dataset/__init__.py
-Scanned: 2016-10-20 11:23:01.827284
-No vulnerabilities found.
-
-
-fenfir/flask_test
-https://github.com/fenfir/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:23:02.415836
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-danjamin/flask-guide
-https://github.com/danjamin/flask-guide
-Entry file: flask-guide/app/server.py
-Scanned: 2016-10-20 11:23:03.680944
-No vulnerabilities found.
-
-
-stevejgoodman/flask-app
-https://github.com/stevejgoodman/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 11:23:04.188886
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-devizier/flask-blog
-https://github.com/devizier/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:23:04.766885
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-rafaelgotts/flask_rest
-https://github.com/rafaelgotts/flask_rest
-Entry file: None
-Scanned: 2016-10-20 11:23:05.275223
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rafaelgotts/flask_rest.
-
-Orlandohub/flask-tutorial
-https://github.com/Orlandohub/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:23:05.783877
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-python-0/flask_blog
-https://github.com/python-0/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:23:06.290195
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bdero/flask-sleep
-https://github.com/bdero/flask-sleep
-Entry file: flask-sleep/flasksleep.py
-Scanned: 2016-10-20 11:23:07.593992
-No vulnerabilities found.
-
-
-miracleluchen/blog-flask
-https://github.com/miracleluchen/blog-flask
-Entry file: blog-flask/project/views.py
-Scanned: 2016-10-20 11:23:08.251062
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-IvanBodnar/flask_relevamientos
-https://github.com/IvanBodnar/flask_relevamientos
-Entry file: flask_relevamientos/app.py
-Scanned: 2016-10-20 11:23:12.944875
-No vulnerabilities found.
-
-
-ravivooda/flask-server
-https://github.com/ravivooda/flask-server
-Entry file: None
-Scanned: 2016-10-20 11:23:15.471930
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ravivooda/flask-server.
-
-wipatrick/flask-restapi
-https://github.com/wipatrick/flask-restapi
-Entry file: flask-restapi/api.py
-Scanned: 2016-10-20 11:23:21.922128
-No vulnerabilities found.
-
-
-yogeshralhan/flask_1
-https://github.com/yogeshralhan/flask_1
-Entry file: flask_1/2.py
-Scanned: 2016-10-20 11:23:23.730387
-No vulnerabilities found.
-
-
-YeWang0/Flask_Blog
-https://github.com/YeWang0/Flask_Blog
-Entry file: Flask_Blog/Blog/blog.py
-Scanned: 2016-10-20 11:23:24.663675
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-windery/flask-blog
-https://github.com/windery/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:23:34.241393
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-chuan137/flask_bess
-https://github.com/chuan137/flask_bess
-Entry file: flask_bess/main.py
-Scanned: 2016-10-20 11:23:38.275385
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kgandhi37/flask_blog
-https://github.com/kgandhi37/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:23:39.926973
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-krol3/python-flask
-https://github.com/krol3/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 11:23:41.441934
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ramhiser/flask-docker
-https://github.com/ramhiser/flask-docker
-Entry file: flask-docker/app.py
-Scanned: 2016-10-20 11:23:43.817332
-No vulnerabilities found.
-
-
-ialamin/flask_hello
-https://github.com/ialamin/flask_hello
-Entry file: flask_hello/hello_world.py
-Scanned: 2016-10-20 11:23:44.492299
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Vasiliy-tech/flask_httpserver
-https://github.com/Vasiliy-tech/flask_httpserver
-Entry file: flask_httpserver/simple_http.py
-Scanned: 2016-10-20 11:23:46.315942
-No vulnerabilities found.
-
-
-jyameo/Flask-Blog
-https://github.com/jyameo/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 11:23:47.836668
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Yuhuishishishi/Flask_toy
-https://github.com/Yuhuishishishi/Flask_toy
-Entry file: Flask_toy/MenuApp.py
-Scanned: 2016-10-20 11:23:56.140898
-No vulnerabilities found.
-
-
-heyericnelson/flask_apps
-https://github.com/heyericnelson/flask_apps
-Entry file: flask_apps/flaskr/flaskr.py
-Scanned: 2016-10-20 11:23:58.555832
-No vulnerabilities found.
-
-
-datakiss/flask-miguel
-https://github.com/datakiss/flask-miguel
-Entry file: flask-miguel/app/__init__.py
-Scanned: 2016-10-20 11:24:00.001973
-No vulnerabilities found.
-
-
-timotk/flask-login
-https://github.com/timotk/flask-login
-Entry file: flask-login/app/__init__.py
-Scanned: 2016-10-20 11:24:01.376474
-No vulnerabilities found.
-
-
-johnsliao/flask-toy
-https://github.com/johnsliao/flask-toy
-Entry file: flask-toy/flaskr/flaskr.py
-Scanned: 2016-10-20 11:24:01.901189
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jan26th/flask_test
-https://github.com/jan26th/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:24:02.524513
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dawran6/flask-blog
-https://github.com/dawran6/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:24:03.069644
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-msapkota/Flask_Blog
-https://github.com/msapkota/Flask_Blog
-Entry file: Flask_Blog/Blog/blog.py
-Scanned: 2016-10-20 11:24:04.936519
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wish007/MyFlask
-https://github.com/wish007/MyFlask
-Entry file: MyFlask/app/__init__.py
-Scanned: 2016-10-20 11:24:06.332753
-No vulnerabilities found.
-
-
-rogerpence/flask-skeleton
-https://github.com/rogerpence/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:24:06.864146
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rogerpence/flask-skeleton.
-
-chungsquared/flask-introduction
-https://github.com/chungsquared/flask-introduction
-Entry file: flask-introduction/app.py
-Scanned: 2016-10-20 11:24:10.028777
-No vulnerabilities found.
-
-
-zachbpd/microblog
-https://github.com/zachbpd/microblog
-Entry file: None
-Scanned: 2016-10-20 11:24:10.599349
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-josepablob/flask-hello-world
-https://github.com/josepablob/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:24:11.157107
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ipsha21/My-flask-application
-https://github.com/ipsha21/My-flask-application
-Entry file: My-flask-application/app.py
-Scanned: 2016-10-20 11:24:11.670556
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Tribe216/microblog
-https://github.com/Tribe216/microblog
-Entry file: None
-Scanned: 2016-10-20 11:24:12.162818
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DonBeck69/FlaskWebProject2
-https://github.com/DonBeck69/FlaskWebProject2
-Entry file: FlaskWebProject2/FlaskWebProject2/FlaskWebProject2/__init__.py
-Scanned: 2016-10-20 11:24:15.697178
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laaroussiBadr/FlaskWebProject
-https://github.com/laaroussiBadr/FlaskWebProject
-Entry file: FlaskWebProject/FlaskWebProject2/FlaskWebProject2/__init__.py
-Scanned: 2016-10-20 11:24:21.230915
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Mad1331/FlaskMessageBoard
-https://github.com/Mad1331/FlaskMessageBoard
-Entry file: FlaskMessageBoard/server.py
-Scanned: 2016-10-20 11:24:23.234206
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sasha-ruby/flask2spark
-https://github.com/sasha-ruby/flask2spark
-Entry file: flask2spark/flask2spark.py
-Scanned: 2016-10-20 11:24:25.554907
-No vulnerabilities found.
-
-
-damionlowers/flask
-https://github.com/damionlowers/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:24:37.622000
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-smltc/Flask
-https://github.com/smltc/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:24:39.131357
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-embasa/FLASK
-https://github.com/embasa/FLASK
-Entry file: FLASK/app.py
-Scanned: 2016-10-20 11:24:41.448546
-No vulnerabilities found.
-
-
-rakeshhegishte/Flask
-https://github.com/rakeshhegishte/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:24:41.964700
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-RayneHwang/Flask
-https://github.com/RayneHwang/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:24:43.489856
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-RoseOu/flasky
-https://github.com/RoseOu/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:24:45.049243
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-materialsvirtuallab/flamyngo
-https://github.com/materialsvirtuallab/flamyngo
-Entry file: flamyngo/flamyngo/app.py
-Scanned: 2016-10-20 11:24:48.446516
-Vulnerability 1:
-File: flamyngo/flamyngo/views.py
- > User input at line 95, trigger word "get(":
- cname = request.args.get('collection')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 96: settings = CSETTINGS[cname]
- File: flamyngo/flamyngo/views.py
- > Line 98: projection = [t[0] for t in settings['summary']]
- File: flamyngo/flamyngo/views.py
- > Line 105: criteria = process_search_string(search_string, settings)
-File: flamyngo/flamyngo/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message))
-
-Vulnerability 2:
-File: flamyngo/flamyngo/views.py
- > User input at line 97, trigger word "get(":
- search_string = request.args.get('search_string')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 105: criteria = process_search_string(search_string, settings)
-File: flamyngo/flamyngo/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message))
-
-Vulnerability 3:
-File: flamyngo/flamyngo/views.py
- > User input at line 142, trigger word "get(":
- cname = request.args.get('collection')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 4:
-File: flamyngo/flamyngo/views.py
- > User input at line 145, trigger word "get(":
- plot_type = request.args.get('plot_type') or 'scatter'
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 5:
-File: flamyngo/flamyngo/views.py
- > User input at line 146, trigger word "get(":
- search_string = request.args.get('search_string')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 6:
-File: flamyngo/flamyngo/views.py
- > User input at line 147, trigger word "get(":
- xaxis = request.args.get('xaxis')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 7:
-File: flamyngo/flamyngo/views.py
- > User input at line 148, trigger word "get(":
- yaxis = request.args.get('yaxis')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-
-
-jonafato/Flask-Copilot
-https://github.com/jonafato/Flask-Copilot
-Entry file: Flask-Copilot/example/app.py
-Scanned: 2016-10-20 11:24:49.835602
-No vulnerabilities found.
-
-
-Upflask/Upflask
-https://github.com/Upflask/Upflask
-Entry file: Upflask/server.py
-Scanned: 2016-10-20 11:24:51.996189
-Vulnerability 1:
-File: Upflask/server.py
- > User input at line 161, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Upflask/server.py
- > Line 165: filename = secure_filename(file.filename)
-File: Upflask/server.py
- > reaches line 171, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: Upflask/server.py
- > User input at line 161, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Upflask/server.py
- > Line 165: filename = secure_filename(file.filename)
-File: Upflask/server.py
- > reaches line 171, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-PrettyPrinted/flask-wtforms
-https://github.com/PrettyPrinted/flask-wtforms
-Entry file: flask-wtforms/main.py
-Scanned: 2016-10-20 11:24:56.331643
-No vulnerabilities found.
-
-
-billyfung/flask_shortener
-https://github.com/billyfung/flask_shortener
-Entry file: flask_shortener/app.py
-Scanned: 2016-10-20 11:24:58.641433
-Vulnerability 1:
-File: flask_shortener/app.py
- > User input at line 41, trigger word "form[":
- url_to_parse = request.form['input-url']
-Reassigned in:
- File: flask_shortener/app.py
- > Line 42: parts = urlparse.urlparse(url_to_parse)
- File: flask_shortener/app.py
- > Line 47: short_id = shorten(url_to_parse)
-File: flask_shortener/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id)
-
-Vulnerability 2:
-File: flask_shortener/app.py
- > User input at line 52, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(link_target)
-
-Vulnerability 3:
-File: flask_shortener/app.py
- > User input at line 60, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-Vulnerability 4:
-File: flask_shortener/app.py
- > User input at line 63, trigger word "get(":
- click_count = int(redis.get('click-count:' + short_id) or 0)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-
-
-MLH/my-mlh-flask-example
-https://github.com/MLH/my-mlh-flask-example
-Entry file: my-mlh-flask-example/app.py
-Scanned: 2016-10-20 11:24:59.964323
-No vulnerabilities found.
-
-
-boydjohnson/flasktwilio
-https://github.com/boydjohnson/flasktwilio
-Entry file: flasktwilio/app.py
-Scanned: 2016-10-20 11:25:02.255720
-Vulnerability 1:
-File: flasktwilio/app.py
- > User input at line 14, trigger word "form[":
- number = request.form['number']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-Vulnerability 2:
-File: flasktwilio/app.py
- > User input at line 15, trigger word "form[":
- lat = request.form['latitude']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-Vulnerability 3:
-File: flasktwilio/app.py
- > User input at line 16, trigger word "form[":
- lon = request.form['longitude']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-
-
-yizhianiu/flasky
-https://github.com/yizhianiu/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:25:02.771480
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ifcheung2012/flaskanalysis
-https://github.com/ifcheung2012/flaskanalysis
-Entry file: flaskanalysis/manage.py
-Scanned: 2016-10-20 11:25:04.100318
-No vulnerabilities found.
-
-
-wdxfairy/flaskblog
-https://github.com/wdxfairy/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 11:25:04.660259
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-Narcissist1/flasktest
-https://github.com/Narcissist1/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 11:25:05.162392
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-msapkota/flasktaskr
-https://github.com/msapkota/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:25:05.684870
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-super452/flasky
-https://github.com/super452/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:25:07.189752
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wish007/flasktest
-https://github.com/wish007/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 11:25:07.707610
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wildjan/Flaskr
-https://github.com/wildjan/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 11:25:11.235463
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pnilan/flaskr
-https://github.com/pnilan/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:25:11.746671
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottmarinoff/Flasky
-https://github.com/scottmarinoff/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 11:25:12.261027
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cutedogspark/Flask-SocketIO
-https://github.com/cutedogspark/Flask-SocketIO
-Entry file: None
-Scanned: 2016-10-20 11:25:12.781412
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rkholoniuk/FlaskAPI
-https://github.com/rkholoniuk/FlaskAPI
-Entry file: None
-Scanned: 2016-10-20 11:25:16.318920
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI.
-
-VitPN/FlaskRPi
-https://github.com/VitPN/FlaskRPi
-Entry file: FlaskRPi/go.py
-Scanned: 2016-10-20 11:25:21.861615
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EvenYan/FlaskTest
-https://github.com/EvenYan/FlaskTest
-Entry file: None
-Scanned: 2016-10-20 11:25:23.376242
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/EvenYan/FlaskTest.
-
-jll90/flaskAng
-https://github.com/jll90/flaskAng
-Entry file: flaskAng/app.py
-Scanned: 2016-10-20 11:25:24.051166
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskAng/lib/python2.7/genericpath.py
-
-edgewood/webfaction-flask0.10-boilerplate
-https://github.com/edgewood/webfaction-flask0.10-boilerplate
-Entry file: None
-Scanned: 2016-10-20 11:25:37.557472
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-garderobin/HelloFlask
-https://github.com/garderobin/HelloFlask
-Entry file: HelloFlask/src/application.py
-Scanned: 2016-10-20 11:25:40.077240
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shidante/notes-flask
-https://github.com/shidante/notes-flask
-Entry file: notes-flask/hello.py
-Scanned: 2016-10-20 11:25:42.529004
-No vulnerabilities found.
-
-
-maixianyu/flask_tennis
-https://github.com/maixianyu/flask_tennis
-Entry file: flask_tennis/app/__init__.py
-Scanned: 2016-10-20 11:25:43.106415
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-saalmerol/cds-flask
-https://github.com/saalmerol/cds-flask
-Entry file: None
-Scanned: 2016-10-20 11:25:43.614853
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-trileg/HelloFlask
-https://github.com/trileg/HelloFlask
-Entry file: HelloFlask/src/application.py
-Scanned: 2016-10-20 11:25:45.121631
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-M1lan/flask_helloworld
-https://github.com/M1lan/flask_helloworld
-Entry file: flask_helloworld/flask_helloworld.py
-Scanned: 2016-10-20 11:25:45.660620
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-codybousc/flask_practice-
-https://github.com/codybousc/flask_practice-
-Entry file: flask_practice-/app.py
-Scanned: 2016-10-20 11:25:49.331544
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_practice-/venv/lib/python2.7/genericpath.py
-
-s-kovacevic/elearning-flask
-https://github.com/s-kovacevic/elearning-flask
-Entry file: elearning-flask/main.py
-Scanned: 2016-10-20 11:25:51.810044
-Vulnerability 1:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 71, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi())
-
-Vulnerability 2:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()])
-
-Vulnerability 3:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 99, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi())
-
-Vulnerability 4:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 102, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()])
-
-Vulnerability 5:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 131, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi())
-
-Vulnerability 6:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 134, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()])
-
-Vulnerability 7:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 163, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi())
-
-Vulnerability 8:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 166, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()])
-
-Vulnerability 9:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 195, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi())
-
-Vulnerability 10:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 198, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()])
-
-
-
-xpleaf/flask_catalog
-https://github.com/xpleaf/flask_catalog
-Entry file: flask_catalog/my_app/__init__.py
-Scanned: 2016-10-20 11:25:59.773274
-Vulnerability 1:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 41, trigger word "get(":
- products = [redis.get(k) for k in keys_alive]
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('products'products)
-
-Vulnerability 2:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 66, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 79, trigger word "flash(":
- flash('The product %s has been created' % name, 'success')
-
-Vulnerability 3:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 66, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 4:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 67, trigger word ".data":
- price = form.price.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 5:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 68, trigger word ".data":
- category = Category.query.get_or_404(form.category.data)
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 6:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 71, trigger word "files[":
- image = request.files['image']
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 74: filename = secure_filename(image.filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
- File: flask_catalog/my_app/catalog/views.py
- > Line 72: filename = ''
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 7:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 66, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 8:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 67, trigger word ".data":
- price = form.price.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 9:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 68, trigger word ".data":
- category = Category.query.get_or_404(form.category.data)
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 10:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 71, trigger word "files[":
- image = request.files['image']
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 74: filename = secure_filename(image.filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
- File: flask_catalog/my_app/catalog/views.py
- > Line 72: filename = ''
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 11:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 93, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 94: category = Category(name)
- File: flask_catalog/my_app/catalog/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 97, trigger word "flash(":
- flash('The category %s has been created' % name, 'success')
-
-Vulnerability 12:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 93, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 94: category = Category(name)
- File: flask_catalog/my_app/catalog/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 99, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id))
-
-Vulnerability 13:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 93, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 94: category = Category(name)
- File: flask_catalog/my_app/catalog/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 99, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id))
-
-Vulnerability 14:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 15:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 16:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 17:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 18:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 19:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 20:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 21:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 22:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 23:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 24:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 25:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 26:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 27:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 28:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 29:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 30:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-Vulnerability 31:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-Vulnerability 32:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-Vulnerability 33:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-
-
-yizhianiu/flask-blog
-https://github.com/yizhianiu/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:26:00.331772
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-zhuwei05/flask-blog
-https://github.com/zhuwei05/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:26:00.890406
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-fenfir/flask_test
-https://github.com/fenfir/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:26:02.481571
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tim1978/flask-blog
-https://github.com/tim1978/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:26:03.050714
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-junhl/Flask_Test
-https://github.com/junhl/Flask_Test
-Entry file: None
-Scanned: 2016-10-20 11:26:03.711051
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-anupam0601/flask_off
-https://github.com/anupam0601/flask_off
-Entry file: flask_off/app.py
-Scanned: 2016-10-20 11:26:05.493900
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cdhop/flask_exercises
-https://github.com/cdhop/flask_exercises
-Entry file: flask_exercises/hello.py
-Scanned: 2016-10-20 11:26:06.138044
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_exercises/venv/lib/python2.7/genericpath.py
-
-AmeetSM/AngularFlask
-https://github.com/AmeetSM/AngularFlask
-Entry file: AngularFlask/app.py
-Scanned: 2016-10-20 11:26:08.931270
-No vulnerabilities found.
-
-
-a358003542/flask-examples
-https://github.com/a358003542/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-20 11:26:09.443735
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-slacksec/flask_blog
-https://github.com/slacksec/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:26:11.962094
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-seabrookmx/flask-demo
-https://github.com/seabrookmx/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:26:12.478839
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/seabrookmx/flask-demo.
-
-Desmonddai583/flask-blog
-https://github.com/Desmonddai583/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:26:13.030240
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-GreenDragonSoft/refundmytrain-flask
-https://github.com/GreenDragonSoft/refundmytrain-flask
-Entry file: refundmytrain-flask/app.py
-Scanned: 2016-10-20 11:26:14.452750
-No vulnerabilities found.
-
-
-zhiweicai/flask-hello
-https://github.com/zhiweicai/flask-hello
-Entry file: flask-hello/hello.py
-Scanned: 2016-10-20 11:26:17.020169
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Yuhuishishishi/Flask_toy
-https://github.com/Yuhuishishishi/Flask_toy
-Entry file: Flask_toy/MenuApp.py
-Scanned: 2016-10-20 11:26:23.348597
-No vulnerabilities found.
-
-
-heyericnelson/flask_apps
-https://github.com/heyericnelson/flask_apps
-Entry file: flask_apps/flaskr/flaskr.py
-Scanned: 2016-10-20 11:26:24.659424
-No vulnerabilities found.
-
-
-abunuwas/flask_experiments
-https://github.com/abunuwas/flask_experiments
-Entry file: flask_experiments/main.py
-Scanned: 2016-10-20 11:26:25.172340
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ykchat/gundam-flask
-https://github.com/ykchat/gundam-flask
-Entry file: gundam-flask/server.py
-Scanned: 2016-10-20 11:26:26.562996
-No vulnerabilities found.
-
-
-datakiss/flask-miguel
-https://github.com/datakiss/flask-miguel
-Entry file: flask-miguel/app/__init__.py
-Scanned: 2016-10-20 11:26:37.017797
-No vulnerabilities found.
-
-
-eltonto187/learn_flask
-https://github.com/eltonto187/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:26:37.562460
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NickyThreeNames/flask_blog
-https://github.com/NickyThreeNames/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:26:40.088247
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-netkicorp/flask-jwe
-https://github.com/netkicorp/flask-jwe
-Entry file: flask-jwe/server.py
-Scanned: 2016-10-20 11:26:41.624251
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chungsquared/flask-introduction
-https://github.com/chungsquared/flask-introduction
-Entry file: flask-introduction/app.py
-Scanned: 2016-10-20 11:26:46.093969
-No vulnerabilities found.
-
-
-dengshilong/flask_example
-https://github.com/dengshilong/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:26:46.639828
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nathanielcompton/flask-tutorial
-https://github.com/nathanielcompton/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:26:47.156300
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-JesseLabruyere/flask_api
-https://github.com/JesseLabruyere/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 11:26:47.731788
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-leon740gk/flask_quick_start
-https://github.com/leon740gk/flask_quick_start
-Entry file: flask_quick_start/hello.py
-Scanned: 2016-10-20 11:26:50.034326
-No vulnerabilities found.
-
-
-dommert/test.dommert.xyz
-https://github.com/dommert/test.dommert.xyz
-Entry file: None
-Scanned: 2016-10-20 11:26:51.569086
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DonBeck69/FlaskWebProject2
-https://github.com/DonBeck69/FlaskWebProject2
-Entry file: FlaskWebProject2/FlaskWebProject2/FlaskWebProject2/__init__.py
-Scanned: 2016-10-20 11:26:57.096752
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-poppuyo/FlaskUrlShortener
-https://github.com/poppuyo/FlaskUrlShortener
-Entry file: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
-Scanned: 2016-10-20 11:27:00.640319
-Vulnerability 1:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 95, trigger word "replace(":
- requested_shortened = requested_shortened.replace(request.url_root, '')
-
-Vulnerability 2:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 98, trigger word "execute(":
- cur.execute('SELECT url FROM urls where shortened=%s', [requested_shortened])
-
-Vulnerability 3:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 100, trigger word "execute(":
- cur = g.db.execute('SELECT url FROM urls where shortened=?', [requested_shortened])
-
-Vulnerability 4:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 104, trigger word "url_for(":
- short_url = request.url_root.rstrip('/') + url_for('find_shortened',shortened=requested_shortened)
-
-Vulnerability 5:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 149, trigger word "execute(":
- cur.execute('WITH new_values (url, shortened) as ( values (%s, %s) ), ' + 'upsert as ' + '( update urls u set url = nv.url, shortened = nv.shortened ' + ' FROM new_values nv WHERE u.url = nv.url RETURNING u.* )' + ' INSERT INTO urls (url, shortened) ' + ' SELECT url, shortened FROM new_values WHERE NOT EXISTS ' + ' (SELECT 1 FROM upsert up WHERE up.url = new_values.url)', [stripped_url, untrimmed_shortened[leftstring_length]])
-
-Vulnerability 6:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 160, trigger word "execute(":
- g.db.execute('UPDATE urls SET url=?, shortened=? WHERE url=?', [stripped_url, untrimmed_shortened[leftstring_length], stripped_url])
-
-Vulnerability 7:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 162, trigger word "execute(":
- g.db.execute('INSERT OR IGNORE INTO urls (url, shortened) VALUES (?, ?)', [stripped_url, untrimmed_shortened[leftstring_length]])
-
-Vulnerability 8:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 166, trigger word "flash(":
- flash(Markup('' + short_url + '' + ' now redirects to the following URL: ' + '' + stripped_url + ''))
-
-
-
-j1wu/wechat-enterprise-bot
-https://github.com/j1wu/wechat-enterprise-bot
-Entry file: None
-Scanned: 2016-10-20 11:27:02.650821
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/j1wu/wechat-enterprise-bot.
-
-chamambom/flask_sqlalchemy_crud
-https://github.com/chamambom/flask_sqlalchemy_crud
-Entry file: flask_sqlalchemy_crud/sqlcrud.py
-Scanned: 2016-10-20 11:27:03.167962
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pyd-testing/flask-docker-workflow
-https://github.com/pyd-testing/flask-docker-workflow
-Entry file: flask-docker-workflow/app/app.py
-Scanned: 2016-10-20 11:27:03.675234
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EsmondMoe/flask-globalcache-http-api
-https://github.com/EsmondMoe/flask-globalcache-http-api
-Entry file: flask-globalcache-http-api/app.py
-Scanned: 2016-10-20 11:27:06.214137
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gr8shivam/Flask---Handling-File-Uploads
-https://github.com/gr8shivam/Flask---Handling-File-Uploads
-Entry file: Flask---Handling-File-Uploads/app/__init__.py
-Scanned: 2016-10-20 11:27:07.546298
-No vulnerabilities found.
-
-
-pbsugg/flask_testbed_server
-https://github.com/pbsugg/flask_testbed_server
-Entry file: flask_testbed_server/main.py
-Scanned: 2016-10-20 11:27:08.553344
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-HYL13/flask_project_0
-https://github.com/HYL13/flask_project_0
-Entry file: flask_project_0/app/__init__.py
-Scanned: 2016-10-20 11:27:11.376893
-Vulnerability 1:
-File: flask_project_0/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 55: posts = pagination.items
- File: flask_project_0/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask_project_0/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 45: show_followed = False
- File: flask_project_0/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask_project_0/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 67: posts = pagination.items
-File: flask_project_0/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask_project_0/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask_project_0/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 134: comments = pagination.items
- File: flask_project_0/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask_project_0/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask_project_0/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_project_0/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask_project_0/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_project_0/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask_project_0/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 246: comments = pagination.items
-File: flask_project_0/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flask_project_0/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_project_0/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_project_0/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_project_0/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flask_project_0/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_project_0/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_project_0/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_project_0/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flask_project_0/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_project_0/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_project_0/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_project_0/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-anthonybrown/Flask-web-API-demo
-https://github.com/anthonybrown/Flask-web-API-demo
-Entry file: Flask-web-API-demo/app.py
-Scanned: 2016-10-20 11:27:13.034385
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-web-API-demo/venv/lib/python2.7/genericpath.py
-
-myCSprojects/PythonFlask-IBMBluemix
-https://github.com/myCSprojects/PythonFlask-IBMBluemix
-Entry file: PythonFlask-IBMBluemix/welcome.py
-Scanned: 2016-10-20 11:27:13.550477
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Kriordan/flask-hello-world
-https://github.com/Kriordan/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:27:14.104129
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-mdublin/Flask-SPA-API-Template
-https://github.com/mdublin/Flask-SPA-API-Template
-Entry file: None
-Scanned: 2016-10-20 11:27:14.637628
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dwisulfahnur/My-flask-app
-https://github.com/dwisulfahnur/My-flask-app
-Entry file: None
-Scanned: 2016-10-20 11:27:17.180064
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dwisulfahnur/My-flask-app.
-
-andreffs18/flask-template-project
-https://github.com/andreffs18/flask-template-project
-Entry file: flask-template-project/project/__init__.py
-Scanned: 2016-10-20 11:27:24.035205
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-valexandersaulys/flask_microblog_tutorial
-https://github.com/valexandersaulys/flask_microblog_tutorial
-Entry file: flask_microblog_tutorial/app/__init__.py
-Scanned: 2016-10-20 11:27:25.480869
-No vulnerabilities found.
-
-
-wenzhihong2003/awesome-flask-todo
-https://github.com/wenzhihong2003/awesome-flask-todo
-Entry file: None
-Scanned: 2016-10-20 11:27:26.006223
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wenzhihong2003/awesome-flask-todo.
-
-kfiras/cloudfoundry-flask-webservice
-https://github.com/kfiras/cloudfoundry-flask-webservice
-Entry file: cloudfoundry-flask-webservice/app.py
-Scanned: 2016-10-20 11:27:27.448435
-Vulnerability 1:
-File: cloudfoundry-flask-webservice/app.py
- > User input at line 80, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: cloudfoundry-flask-webservice/app.py
- > reaches line 87, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201)
-
-
-
-ssam123/flask-blog-tutorial
-https://github.com/ssam123/flask-blog-tutorial
-Entry file: flask-blog-tutorial/__init__.py
-Scanned: 2016-10-20 11:27:38.180346
-Vulnerability 1:
-File: flask-blog-tutorial/author/views.py
- > User input at line 31, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flask-blog-tutorial/author/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
- File: flask-blog-tutorial/author/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error)
-File: flask-blog-tutorial/author/views.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 2:
-File: flask-blog-tutorial/blog/views.py
- > User input at line 127, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: flask-blog-tutorial/blog/views.py
- > Line 129: slug = slugify(title)
- File: flask-blog-tutorial/blog/views.py
- > Line 130: post = Post(blog, author, title, body, category, filename, slug)
- File: flask-blog-tutorial/blog/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: flask-blog-tutorial/blog/views.py
- > reaches line 133, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-Vulnerability 3:
-File: flask-blog-tutorial/blog/views.py
- > User input at line 127, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: flask-blog-tutorial/blog/views.py
- > Line 129: slug = slugify(title)
- File: flask-blog-tutorial/blog/views.py
- > Line 130: post = Post(blog, author, title, body, category, filename, slug)
- File: flask-blog-tutorial/blog/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: flask-blog-tutorial/blog/views.py
- > reaches line 133, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-
-
-MrLeeh/flask-mega-tutorial
-https://github.com/MrLeeh/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 11:27:38.697796
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MatthewHodgson/flask-by-example
-https://github.com/MatthewHodgson/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:27:40.465158
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yun70/flask-rest-api
-https://github.com/yun70/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-20 11:27:41.995799
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kevinlondon/flask-hello-world
-https://github.com/kevinlondon/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:27:43.585754
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-viney-shih/Flask_App_Template
-https://github.com/viney-shih/Flask_App_Template
-Entry file: Flask_App_Template/app/__init__.py
-Scanned: 2016-10-20 11:27:47.113368
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-davehalladay/openr-flask-api
-https://github.com/davehalladay/openr-flask-api
-Entry file: openr-flask-api/main.py
-Scanned: 2016-10-20 11:27:48.555764
-No vulnerabilities found.
-
-
-momotaro98/flask-for-test
-https://github.com/momotaro98/flask-for-test
-Entry file: flask-for-test/app.py
-Scanned: 2016-10-20 11:27:49.844749
-No vulnerabilities found.
-
-
-andela-mochieng/flask-practice-tutorial
-https://github.com/andela-mochieng/flask-practice-tutorial
-Entry file: flask-practice-tutorial/app/__init__.py
-Scanned: 2016-10-20 11:27:51.216947
-No vulnerabilities found.
-
-
-GreenDragonSoft/flask-heroku-template
-https://github.com/GreenDragonSoft/flask-heroku-template
-Entry file: flask-heroku-template/app.py
-Scanned: 2016-10-20 11:27:52.619053
-No vulnerabilities found.
-
-
-mahfuzsust/flask-heroku-intro
-https://github.com/mahfuzsust/flask-heroku-intro
-Entry file: flask-heroku-intro/app.py
-Scanned: 2016-10-20 11:27:58.051856
-No vulnerabilities found.
-
-
-MoodyLyrics/flask
-https://github.com/MoodyLyrics/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:28:03.258154
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sunshine-sjd/Flask
-https://github.com/sunshine-sjd/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:28:03.781367
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-unikatsieben/flask
-https://github.com/unikatsieben/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:28:04.373687
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Mei-Lin-Chen/Flask
-https://github.com/Mei-Lin-Chen/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:28:04.873159
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dannyec/flask
-https://github.com/dannyec/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:28:06.482437
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-kakshi3242/Flask
-https://github.com/kakshi3242/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:28:06.989361
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Abirdcfly/flask-blog
-https://github.com/Abirdcfly/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:28:09.013795
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-rainyear/MathModeBot
-https://github.com/rainyear/MathModeBot
-Entry file: MathModeBot/main.py
-Scanned: 2016-10-20 11:28:11.487001
-No vulnerabilities found.
-
-
-jrhuerta/flask-api
-https://github.com/jrhuerta/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 11:28:13.008620
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-huachen0216/flaskdemo
-https://github.com/huachen0216/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 11:28:14.521727
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-MrLokans/flaskr
-https://github.com/MrLokans/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:28:15.041054
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-citizen-stig/flaskone
-https://github.com/citizen-stig/flaskone
-Entry file: flaskone/flask_one.py
-Scanned: 2016-10-20 11:28:16.339887
-No vulnerabilities found.
-
-
-ifcheung2012/flaskanalysis
-https://github.com/ifcheung2012/flaskanalysis
-Entry file: flaskanalysis/manage.py
-Scanned: 2016-10-20 11:28:18.772978
-No vulnerabilities found.
-
-
-Robotwing/flaskweb
-https://github.com/Robotwing/flaskweb
-Entry file: None
-Scanned: 2016-10-20 11:28:23.314263
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-super452/flasky
-https://github.com/super452/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:28:24.833279
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-srbhtest/flaskwebsite
-https://github.com/srbhtest/flaskwebsite
-Entry file: flaskwebsite/__init__.py
-Scanned: 2016-10-20 11:28:27.131060
-No vulnerabilities found.
-
-
-josepablob/flasktaskr
-https://github.com/josepablob/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:28:27.660261
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wangduanyang/flasky
-https://github.com/wangduanyang/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:28:39.694741
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neo1218/m2m
-https://github.com/neo1218/m2m
-Entry file: m2m/m2m/app/__init__.py
-Scanned: 2016-10-20 11:28:42.264379
-No vulnerabilities found.
-
-
-fhamami/flaskone
-https://github.com/fhamami/flaskone
-Entry file: flaskone/app/__init__.py
-Scanned: 2016-10-20 11:28:43.992240
-No vulnerabilities found.
-
-
-windery/flasky
-https://github.com/windery/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:28:44.538056
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kcunning/flask-class-c9
-https://github.com/kcunning/flask-class-c9
-Entry file: flask-class-c9/flaskclass/app/__init__.py
-Scanned: 2016-10-20 11:28:49.150238
-Vulnerability 1:
-File: flask-class-c9/flaskclass/app/views.py
- > User input at line 38, trigger word ".data":
- numbers = form.numbers.data
-Reassigned in:
- File: flask-class-c9/flaskclass/app/views.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
- File: flask-class-c9/flaskclass/app/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
-File: flask-class-c9/flaskclass/app/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins)
-
-
-
-tangza/FlaskAPP
-https://github.com/tangza/FlaskAPP
-Entry file: FlaskAPP/myblog/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-20 11:28:57.063715
-No vulnerabilities found.
-
-
-MarHelen/FlaskLogin
-https://github.com/MarHelen/FlaskLogin
-Entry file: FlaskLogin/sql_declarative.py
-Scanned: 2016-10-20 11:29:04.753985
-Vulnerability 1:
-File: FlaskLogin/first.py
- > User input at line 63, trigger word "get(":
- email = request.form.get('email')
-Reassigned in:
- File: FlaskLogin/first.py
- > Line 70: user = User(email, request.form.get('pw'))
-File: FlaskLogin/first.py
- > reaches line 65, trigger word "filter(":
- temp_user_set = User.query.filter(User.email == email).first()
-
-
-
-louiskun/flaskGIT
-https://github.com/louiskun/flaskGIT
-Entry file: flaskGIT/sessionmail.py
-Scanned: 2016-10-20 11:29:05.540902
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskGIT/venv/lib/python2.7/genericpath.py
-
-narakai/FlaskDemo
-https://github.com/narakai/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 11:29:06.068893
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sethblack/python-flask-pixel-tracking
-https://github.com/sethblack/python-flask-pixel-tracking
-Entry file: python-flask-pixel-tracking/pfpt/main.py
-Scanned: 2016-10-20 11:29:07.538330
-No vulnerabilities found.
-
-
-kloudsec/py-webkit2png-flask-api
-https://github.com/kloudsec/py-webkit2png-flask-api
-Entry file: py-webkit2png-flask-api/api/app.py
-Scanned: 2016-10-20 11:29:09.490537
-Vulnerability 1:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 25, trigger word "get(":
- url = request.args.get('url', None)
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 2:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 26, trigger word "get(":
- width = int(request.args.get('width', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 3:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 27, trigger word "get(":
- height = int(request.args.get('height', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 4:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 28, trigger word "get(":
- scale = float(request.args.get('scale', 0.5))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 5:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 25, trigger word "get(":
- url = request.args.get('url', None)
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 6:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 26, trigger word "get(":
- width = int(request.args.get('width', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 7:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 27, trigger word "get(":
- height = int(request.args.get('height', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 8:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 28, trigger word "get(":
- scale = float(request.args.get('scale', 0.5))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-
-
-Karambir-K/Flask-Intro
-https://github.com/Karambir-K/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-20 11:29:10.017774
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-s-kovacevic/elearning-flask
-https://github.com/s-kovacevic/elearning-flask
-Entry file: elearning-flask/main.py
-Scanned: 2016-10-20 11:29:11.603547
-Vulnerability 1:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 71, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi())
-
-Vulnerability 2:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()])
-
-Vulnerability 3:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 99, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi())
-
-Vulnerability 4:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 102, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()])
-
-Vulnerability 5:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 131, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi())
-
-Vulnerability 6:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 134, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()])
-
-Vulnerability 7:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 163, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi())
-
-Vulnerability 8:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 166, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()])
-
-Vulnerability 9:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 195, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi())
-
-Vulnerability 10:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 198, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()])
-
-
-
-logicalicy/flask_boostrap
-https://github.com/logicalicy/flask_boostrap
-Entry file: flask_boostrap/app/__init__.py
-Scanned: 2016-10-20 11:29:13.016612
-No vulnerabilities found.
-
-
-jeffreybergman/flask-blog
-https://github.com/jeffreybergman/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:29:13.576835
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-MrLokans/discover_flask
-https://github.com/MrLokans/discover_flask
-Entry file: discover_flask/app.py
-Scanned: 2016-10-20 11:29:15.123894
-No vulnerabilities found.
-
-
-xiazhe/flask-demo
-https://github.com/xiazhe/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:29:15.649241
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiazhe/flask-demo.
-
-nikoheikkila/flask-blog
-https://github.com/nikoheikkila/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:29:16.200193
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Vatsalgame/flask-try
-https://github.com/Vatsalgame/flask-try
-Entry file: None
-Scanned: 2016-10-20 11:29:16.900513
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Vatsalgame/flask-try.
-
-bbozhev/flask-test
-https://github.com/bbozhev/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:29:17.464919
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-tim1978/flask-blog
-https://github.com/tim1978/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:29:18.541706
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-danielcodes/flask-practice
-https://github.com/danielcodes/flask-practice
-Entry file: None
-Scanned: 2016-10-20 11:29:19.068750
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danielcodes/flask-practice.
-
-zhiweicai/flask-hello
-https://github.com/zhiweicai/flask-hello
-Entry file: flask-hello/hello.py
-Scanned: 2016-10-20 11:29:19.587202
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GreenDragonSoft/refundmytrain-flask
-https://github.com/GreenDragonSoft/refundmytrain-flask
-Entry file: refundmytrain-flask/app.py
-Scanned: 2016-10-20 11:29:25.039838
-No vulnerabilities found.
-
-
-keithleit/flask-demo
-https://github.com/keithleit/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:29:25.570197
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/keithleit/flask-demo.
-
-wstcpyt/flask-demo
-https://github.com/wstcpyt/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:29:27.096606
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wstcpyt/flask-demo.
-
-geraldmc/flask-template
-https://github.com/geraldmc/flask-template
-Entry file: None
-Scanned: 2016-10-20 11:29:28.621645
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/geraldmc/flask-template.
-
-jordo1ken/flask-fibonacci
-https://github.com/jordo1ken/flask-fibonacci
-Entry file: flask-fibonacci/Fibonacci.py
-Scanned: 2016-10-20 11:29:39.087735
-No vulnerabilities found.
-
-
-bodzio2k/flask-blueprint
-https://github.com/bodzio2k/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 11:29:40.637159
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PeachDew/flask_tutorialwebapp
-https://github.com/PeachDew/flask_tutorialwebapp
-Entry file: flask_tutorialwebapp/app.py
-Scanned: 2016-10-20 11:29:43.939182
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-ktomlee/flask_init
-https://github.com/ktomlee/flask_init
-Entry file: None
-Scanned: 2016-10-20 11:29:44.468047
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ktomlee/flask_init.
-
-abunuwas/flask_experiments
-https://github.com/abunuwas/flask_experiments
-Entry file: flask_experiments/main.py
-Scanned: 2016-10-20 11:29:48.469140
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Joryang/flask_videos
-https://github.com/Joryang/flask_videos
-Entry file: flask_videos/videos.py
-Scanned: 2016-10-20 11:29:49.993244
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AvijitGhosh82/appengine_flask
-https://github.com/AvijitGhosh82/appengine_flask
-Entry file: appengine_flask/main.py
-Scanned: 2016-10-20 11:29:59.111152
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sadev1/flask-demo
-https://github.com/sadev1/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:30:05.623829
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sadev1/flask-demo.
-
-markleung1969/flask-base
-https://github.com/markleung1969/flask-base
-Entry file: None
-Scanned: 2016-10-20 11:30:06.145568
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/markleung1969/flask-base.
-
-NickyThreeNames/flask_blog
-https://github.com/NickyThreeNames/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:30:06.667816
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zmrfzn/Flask_Sample
-https://github.com/zmrfzn/Flask_Sample
-Entry file: Flask_Sample/app.py
-Scanned: 2016-10-20 11:30:08.264379
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JesseLabruyere/flask_api
-https://github.com/JesseLabruyere/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 11:30:08.791910
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-butovichev/flask-blog
-https://github.com/butovichev/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:30:10.331258
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-pyx/flask-simplemde
-https://github.com/pyx/flask-simplemde
-Entry file: flask-simplemde/examples/simple/app.py
-Scanned: 2016-10-20 11:30:12.523214
-No vulnerabilities found.
-
-
-rholmes69/flasky2_1
-https://github.com/rholmes69/flasky2_1
-Entry file: flasky2_1/app/__init__.py
-Scanned: 2016-10-20 11:30:16.063752
-Vulnerability 1:
-File: flasky2_1/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 55: posts = pagination.items
- File: flasky2_1/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flasky2_1/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 45: show_followed = False
- File: flasky2_1/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flasky2_1/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 67: posts = pagination.items
-File: flasky2_1/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flasky2_1/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flasky2_1/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 134: comments = pagination.items
- File: flasky2_1/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flasky2_1/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flasky2_1/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flasky2_1/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flasky2_1/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flasky2_1/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flasky2_1/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 246: comments = pagination.items
-File: flasky2_1/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flasky2_1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2_1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2_1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2_1/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flasky2_1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2_1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2_1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2_1/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flasky2_1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2_1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2_1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2_1/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-ChellsChen/FlaskSocketIOChart
-https://github.com/ChellsChen/FlaskSocketIOChart
-Entry file: FlaskSocketIOChart/app/__init__.py
-Scanned: 2016-10-20 11:30:18.045844
-Vulnerability 1:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 31, trigger word "get(":
- name = session.get('name', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-Vulnerability 2:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 32, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-
-
-jcerise/openspacesboard-python
-https://github.com/jcerise/openspacesboard-python
-Entry file: openspacesboard-python/osbp_app/__init__.py
-Scanned: 2016-10-20 11:30:20.621628
-Vulnerability 1:
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > User input at line 44, trigger word "get(":
- me = github.get('user')
-Reassigned in:
- File: openspacesboard-python/osbp_app/openspacesboard.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > reaches line 45, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(me.data)
-
-Vulnerability 2:
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > User input at line 69, trigger word "get(":
- me = github.get('user')
-Reassigned in:
- File: openspacesboard-python/osbp_app/openspacesboard.py
- > Line 64: ret_MAYBE_FUNCTION_NAME = 'Access denied: reason=%s error=%s' % (request.args['error'], request.args['error_description'])
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > reaches line 70, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(me.data)
-
-Vulnerability 3:
-File: openspacesboard-python/osbp_app/mod_spaces/controllers.py
- > User input at line 29, trigger word "get(":
- space = ConferenceSpace.query.get(space_id)
-Reassigned in:
- File: openspacesboard-python/osbp_app/mod_spaces/controllers.py
- > Line 32: space = dict(id=space.id, space_name=space.space_name, location_id=space.location_id, event_date=space.event_date, start_time=space.start_time, end_time=space.end_time)
-File: openspacesboard-python/osbp_app/mod_spaces/controllers.py
- > reaches line 34, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('space'space)
-
-Vulnerability 4:
-File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > User input at line 39, trigger word "get(":
- session = ConferenceSession.query.get(session_id)
-Reassigned in:
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 42: session_space = session.space
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 43: session_location = session_space.location
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 44: timespan = 'start_time''end_time'session_space.start_timesession_space.end_time
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 45: session = dict(id=session.id, title=session.title, description=session.description, convener=session.convener, space_name=session_space.space_name, location=session_location.name, date=session_space.event_date, timespan=timespan)
-File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('session'session)
-
-Vulnerability 5:
-File: openspacesboard-python/osbp_app/mod_locations/controllers.py
- > User input at line 27, trigger word "get(":
- location = ConferenceLocation.query.get(location_id)
-Reassigned in:
- File: openspacesboard-python/osbp_app/mod_locations/controllers.py
- > Line 30: location = dict(id=location.id, name=location.name)
-File: openspacesboard-python/osbp_app/mod_locations/controllers.py
- > reaches line 31, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('location'location)
-
-
-
-icecraft/ZhiHuDaemon
-https://github.com/icecraft/ZhiHuDaemon
-Entry file: ZhiHuDaemon/app/__init__.py
-Scanned: 2016-10-20 11:30:22.296293
-Vulnerability 1:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 16: pagination = Question.query.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 19: questions = pagination.items
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',questions=questions, pagination=pagination)
-
-Vulnerability 2:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 26, trigger word "form[":
- keyword = '%' + request.form['search'] + '%'
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 30, trigger word "filter(":
- pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False)
-
-Vulnerability 3:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 29, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 33: questions = pagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 30, trigger word "filter(":
- pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False)
-
-Vulnerability 4:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 26, trigger word "form[":
- keyword = '%' + request.form['search'] + '%'
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1])
-
-Vulnerability 5:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 29, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 33: questions = pagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1])
-
-Vulnerability 6:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 100, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 104: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 105: page = request.args.get('page', 1,type=int)
- File: ZhiHuDaemon/app/main/views.py
- > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 109: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 110: answers = anspagination.items
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination)
-
-Vulnerability 7:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 105, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 100: page = request.args.get('page', 1,type=int)
- File: ZhiHuDaemon/app/main/views.py
- > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 104: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 109: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 110: answers = anspagination.items
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination)
-
-Vulnerability 8:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 145, trigger word "get(":
- answer_id = request.args.get('answer_id', -1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 147: answer = Answer.query.filter_by(id=answer_id)
- File: ZhiHuDaemon/app/main/views.py
- > Line 150: answer = Answer(answer=answerForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, question=question)
- File: ZhiHuDaemon/app/main/views.py
- > Line 159: comment = Comment(comment=commentForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, answer=answer)
- File: ZhiHuDaemon/app/main/views.py
- > Line 155: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id))
- File: ZhiHuDaemon/app/main/views.py
- > Line 164: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id))
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 168, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('question.html',question=question, asker=asker, answerForm=answerForm, answers=answers, comments=comments, commentForm=commentForm, answer_id=answer_id)
-
-
-
-AntonisFK/Login_registration_Flask
-https://github.com/AntonisFK/Login_registration_Flask
-Entry file: None
-Scanned: 2016-10-20 11:30:23.309841
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AntonisFK/Login_registration_Flask.
-
-jeseon/flask-by-example
-https://github.com/jeseon/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:30:24.482230
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-liuenyan/micro-flask-blog
-https://github.com/liuenyan/micro-flask-blog
-Entry file: micro-flask-blog/app/__init__.py
-Scanned: 2016-10-20 11:30:26.028966
-Vulnerability 1:
-File: micro-flask-blog/app/main/views.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 19: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: micro-flask-blog/app/main/views.py
- > User input at line 124, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 126: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 127, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id)
-
-
-
-maxidrum/Flask_and_Mongo
-https://github.com/maxidrum/Flask_and_Mongo
-Entry file: Flask_and_Mongo/application/__init__.py
-Scanned: 2016-10-20 11:30:26.552250
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mdublin/Flask-SPA-API-Template
-https://github.com/mdublin/Flask-SPA-API-Template
-Entry file: None
-Scanned: 2016-10-20 11:30:28.081121
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-keimos/flask-rest-sql
-https://github.com/keimos/flask-rest-sql
-Entry file: flask-rest-sql/app.py
-Scanned: 2016-10-20 11:30:30.577361
-No vulnerabilities found.
-
-
-jeffreybergman/flask-hello-world
-https://github.com/jeffreybergman/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:30:39.139076
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-zolaneta/todo_flask_application
-https://github.com/zolaneta/todo_flask_application
-Entry file: None
-Scanned: 2016-10-20 11:30:40.678968
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/todo_flask_application.
-
-baskervilski/flask-hello-world
-https://github.com/baskervilski/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:30:42.253347
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-Bbouley/flask-by-example
-https://github.com/Bbouley/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:30:44.914213
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wilbert-abreu/realtime_slack_flask_app
-https://github.com/wilbert-abreu/realtime_slack_flask_app
-Entry file: None
-Scanned: 2016-10-20 11:30:45.417335
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ellachao/Flask_GmailAPI_Example
-https://github.com/ellachao/Flask_GmailAPI_Example
-Entry file: Flask_GmailAPI_Example/main.py
-Scanned: 2016-10-20 11:30:48.936294
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NJIT-SIG-WEBDEV/Flask-URL-Shortner
-https://github.com/NJIT-SIG-WEBDEV/Flask-URL-Shortner
-Entry file: Flask-URL-Shortner/app.py
-Scanned: 2016-10-20 11:30:52.043852
-Vulnerability 1:
-File: Flask-URL-Shortner/app.py
- > User input at line 30, trigger word ".data":
- site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id']
-Reassigned in:
- File: Flask-URL-Shortner/app.py
- > Line 33: site_id = ''
- File: Flask-URL-Shortner/app.py
- > Line 35: site_id += random.choice(string.ascii_letters)
- File: Flask-URL-Shortner/app.py
- > Line 37: data = 'site_id''url'site_idform.url.data
-File: Flask-URL-Shortner/app.py
- > reaches line 43, trigger word "url_for(":
- flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data))
-
-Vulnerability 2:
-File: Flask-URL-Shortner/app.py
- > User input at line 30, trigger word ".data":
- site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id']
-Reassigned in:
- File: Flask-URL-Shortner/app.py
- > Line 33: site_id = ''
- File: Flask-URL-Shortner/app.py
- > Line 35: site_id += random.choice(string.ascii_letters)
- File: Flask-URL-Shortner/app.py
- > Line 37: data = 'site_id''url'site_idform.url.data
-File: Flask-URL-Shortner/app.py
- > reaches line 43, trigger word "flash(":
- flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data))
-
-
-
-hilmarh/island-python-flask-example
-https://github.com/hilmarh/island-python-flask-example
-Entry file: island-python-flask-example/app/__init__.py
-Scanned: 2016-10-20 11:30:59.617350
-No vulnerabilities found.
-
-
-dv3/sample-Flask-Application
-https://github.com/dv3/sample-Flask-Application
-Entry file: None
-Scanned: 2016-10-20 11:31:06.149270
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application.
-
-mml1/flask_multiple_forms
-https://github.com/mml1/flask_multiple_forms
-Entry file: flask_multiple_forms/server.py
-Scanned: 2016-10-20 11:31:07.458041
-No vulnerabilities found.
-
-
-jideobs/flask-gae-ndb-starter
-https://github.com/jideobs/flask-gae-ndb-starter
-Entry file: flask-gae-ndb-starter/server/main.py
-Scanned: 2016-10-20 11:31:07.985795
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marcabomb/flask_hello_world
-https://github.com/marcabomb/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 11:31:09.003945
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcabomb/flask_hello_world.
-
-kevin-js/azure-flask-tutorial
-https://github.com/kevin-js/azure-flask-tutorial
-Entry file: azure-flask-tutorial/run.py
-Scanned: 2016-10-20 11:31:11.314240
-No vulnerabilities found.
-
-
-ShawnPengxy/Flask-madeBlog
-https://github.com/ShawnPengxy/Flask-madeBlog
-Entry file: Flask-madeBlog/site-packages/flask/sessions.py
-Scanned: 2016-10-20 11:31:21.628231
-No vulnerabilities found.
-
-
-vinayraghavan/pyacacemy-flask-workshop
-https://github.com/vinayraghavan/pyacacemy-flask-workshop
-Entry file: pyacacemy-flask-workshop/bookmarks.py
-Scanned: 2016-10-20 11:31:23.009081
-No vulnerabilities found.
-
-
-drbrightside/first-flask-app
-https://github.com/drbrightside/first-flask-app
-Entry file: None
-Scanned: 2016-10-20 11:31:23.526823
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-D10221/gae_flask_ndb_test
-https://github.com/D10221/gae_flask_ndb_test
-Entry file: gae_flask_ndb_test/main.py
-Scanned: 2016-10-20 11:31:24.939739
-No vulnerabilities found.
-
-
-micahcourey/FirstFlaskApp
-https://github.com/micahcourey/FirstFlaskApp
-Entry file: FirstFlaskApp/flask_app.py
-Scanned: 2016-10-20 11:31:26.221159
-No vulnerabilities found.
-
-
-commandknight/cs125-fooddy-flask
-https://github.com/commandknight/cs125-fooddy-flask
-Entry file: cs125-fooddy-flask/fooddy2.py
-Scanned: 2016-10-20 11:31:32.182950
-Vulnerability 1:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 177, trigger word "get(":
- long = request.form.get('current_location_longitude')
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 185, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-
-Vulnerability 2:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 178, trigger word "get(":
- lat = request.form.get('current_location_latitude')
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 185, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-
-Vulnerability 3:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 191, trigger word "form[":
- a1 = request.form['addressline1']
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 194: address = a1 + ' ' + city + ' ' + state
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
- File: cs125-fooddy-flask/fooddy2.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
-
-Vulnerability 4:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 192, trigger word "form[":
- city = request.form['addresscity']
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 194: address = a1 + ' ' + city + ' ' + state
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
- File: cs125-fooddy-flask/fooddy2.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
-
-Vulnerability 5:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 193, trigger word "form[":
- state = request.form['addressstate']
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 194: address = a1 + ' ' + city + ' ' + state
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
- File: cs125-fooddy-flask/fooddy2.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
-
-
-
-GreenDragonSoft/flask-heroku-template
-https://github.com/GreenDragonSoft/flask-heroku-template
-Entry file: flask-heroku-template/app.py
-Scanned: 2016-10-20 11:31:33.633115
-No vulnerabilities found.
-
-
-rfmapp/TheFlaskMegaTutorial
-https://github.com/rfmapp/TheFlaskMegaTutorial
-Entry file: None
-Scanned: 2016-10-20 11:31:34.183319
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-candyer/Flask
-https://github.com/candyer/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:31:36.339790
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scripterkaran/flask
-https://github.com/scripterkaran/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:31:36.922014
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-JadyLiu/flask
-https://github.com/JadyLiu/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:31:37.512160
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-itsrifat/flask-celery-docker-scale
-https://github.com/itsrifat/flask-celery-docker-scale
-Entry file: flask-celery-docker-scale/flask-app/app.py
-Scanned: 2016-10-20 11:31:38.807388
-No vulnerabilities found.
-
-
-sinscary/Flask-Social-Networking
-https://github.com/sinscary/Flask-Social-Networking
-Entry file: Flask-Social-Networking/app.py
-Scanned: 2016-10-20 11:31:40.714757
-Vulnerability 1:
-File: Flask-Social-Networking/app.py
- > User input at line 111, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: Flask-Social-Networking/app.py
- > Line 118: user = current_user
-File: Flask-Social-Networking/app.py
- > reaches line 121, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 146, trigger word "flash(":
- flash('You are now following {}'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 147, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 147, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 165, trigger word "flash(":
- flash('You have unfollowed {}'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 166, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 166, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-osuosl/timesync-frontend-flask
-https://github.com/osuosl/timesync-frontend-flask
-Entry file: None
-Scanned: 2016-10-20 11:31:41.272318
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask.
-
-CBR09/flaskapp
-https://github.com/CBR09/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:31:41.785892
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp.
-
-narakai/flaskblog
-https://github.com/narakai/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 11:31:42.310753
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-josepablob/flasktaskr
-https://github.com/josepablob/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:31:42.821776
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wangduanyang/flasky
-https://github.com/wangduanyang/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:31:45.340998
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adrianneperedo/flaskr
-https://github.com/adrianneperedo/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:31:45.849505
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-darrenhankins/flaskr
-https://github.com/darrenhankins/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:31:49.367979
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mirukushake/flaskr
-https://github.com/mirukushake/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:31:50.879918
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Looncall/Flaskr
-https://github.com/Looncall/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 11:31:59.393682
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jeffreybergman/flasktaskr
-https://github.com/jeffreybergman/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:32:06.902508
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-marcabomb/flasktaskr
-https://github.com/marcabomb/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:32:07.417916
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-czy1238677/flasky
-https://github.com/czy1238677/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:32:08.934428
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Pink-Moon/flaskr
-https://github.com/Pink-Moon/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:32:09.454304
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AlexGrek/FlaskLib
-https://github.com/AlexGrek/FlaskLib
-Entry file: None
-Scanned: 2016-10-20 11:32:09.976409
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-daveweber/FlaskBar
-https://github.com/daveweber/FlaskBar
-Entry file: FlaskBar/index.py
-Scanned: 2016-10-20 11:32:11.489396
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-danleyb2/flaskMe
-https://github.com/danleyb2/flaskMe
-Entry file: flaskMe/flaskREST.py
-Scanned: 2016-10-20 11:32:12.840981
-Vulnerability 1:
-File: flaskMe/flaskREST.py
- > User input at line 73, trigger word "get(":
- name = data.get('name')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 76, trigger word "execute(":
- db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color])
-
-Vulnerability 2:
-File: flaskMe/flaskREST.py
- > User input at line 74, trigger word "get(":
- color = data.get('color')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 76, trigger word "execute(":
- db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color])
-
-Vulnerability 3:
-File: flaskMe/flaskREST.py
- > User input at line 73, trigger word "get(":
- name = data.get('name')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 78, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color))
-
-Vulnerability 4:
-File: flaskMe/flaskREST.py
- > User input at line 74, trigger word "get(":
- color = data.get('color')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 78, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color))
-
-
-
-Rikka-chan/flaskCharts
-https://github.com/Rikka-chan/flaskCharts
-Entry file: None
-Scanned: 2016-10-20 11:32:22.423328
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mcmcgonagle/flasktaskr2
-https://github.com/mcmcgonagle/flasktaskr2
-Entry file: flasktaskr2/project/views.py
-Scanned: 2016-10-20 11:32:24.792754
-No vulnerabilities found.
-
-
-AlexFransis/FlaskyProject
-https://github.com/AlexFransis/FlaskyProject
-Entry file: FlaskyProject/app/__init__.py
-Scanned: 2016-10-20 11:32:26.660184
-No vulnerabilities found.
-
-
-bunkdeath/FlaskTemplate
-https://github.com/bunkdeath/FlaskTemplate
-Entry file: FlaskTemplate/application.py
-Scanned: 2016-10-20 11:32:27.957444
-No vulnerabilities found.
-
-
-zding5/FlaskDemo
-https://github.com/zding5/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 11:32:28.476896
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-diggzhang/flaskMaze
-https://github.com/diggzhang/flaskMaze
-Entry file: None
-Scanned: 2016-10-20 11:32:33.022765
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/diggzhang/flaskMaze.
-
-narakai/FlaskDemo
-https://github.com/narakai/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 11:32:34.542909
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-deanmax/FlaskAPP
-https://github.com/deanmax/FlaskAPP
-Entry file: FlaskAPP/app/__init__.py
-Scanned: 2016-10-20 11:32:41.372486
-No vulnerabilities found.
-
-
-hugoantunes/base-flask
-https://github.com/hugoantunes/base-flask
-Entry file: base-flask/service/__init__.py
-Scanned: 2016-10-20 11:32:43.163571
-No vulnerabilities found.
-
-
-haburibe/docker-flask
-https://github.com/haburibe/docker-flask
-Entry file: docker-flask/main.py
-Scanned: 2016-10-20 11:32:44.454578
-No vulnerabilities found.
-
-
-timyi1212/flask-demo
-https://github.com/timyi1212/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:32:44.973146
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/timyi1212/flask-demo.
-
-mmingle/flask-blog
-https://github.com/mmingle/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:32:45.513597
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-namickey/hello-flask
-https://github.com/namickey/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 11:32:46.106239
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-justinwp/flask-urs
-https://github.com/justinwp/flask-urs
-Entry file: flask-urs/tests/conftest.py
-Scanned: 2016-10-20 11:32:47.731228
-No vulnerabilities found.
-
-
-krisekenes/flask_deployment
-https://github.com/krisekenes/flask_deployment
-Entry file: flask_deployment/server.py
-Scanned: 2016-10-20 11:32:49.043036
-No vulnerabilities found.
-
-
-SawHigh/flask_cdn
-https://github.com/SawHigh/flask_cdn
-Entry file: flask_cdn/cdn.py
-Scanned: 2016-10-20 11:32:50.835814
-No vulnerabilities found.
-
-
-crq/flask-scaffold
-https://github.com/crq/flask-scaffold
-Entry file: flask-scaffold/[appname].py
-Scanned: 2016-10-20 11:32:51.414483
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-asielen/Woodles_Flask
-https://github.com/asielen/Woodles_Flask
-Entry file: Woodles_Flask/app/__init__.py
-Scanned: 2016-10-20 11:32:53.300673
-Vulnerability 1:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-Vulnerability 2:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-
-
-honmaple/flask-word
-https://github.com/honmaple/flask-word
-Entry file: flask-word/app/__init__.py
-Scanned: 2016-10-20 11:32:56.483608
-Vulnerability 1:
-File: flask-word/app/paginate/views.py
- > User input at line 42, trigger word "get(":
- page = is_num(request.args.get('page'))
-Reassigned in:
- File: flask-word/app/paginate/views.py
- > Line 43: topics = Topic.query.paginate(page, app.config['PER_PAGE'],error_out=True)
-File: flask-word/app/paginate/views.py
- > reaches line 44, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('page/page.html',topics=topics)
-
-Vulnerability 2:
-File: flask-word/app/count/views.py
- > User input at line 17, trigger word "cookies[":
- count = int(request.cookies['count']) + 1
-Reassigned in:
- File: flask-word/app/count/views.py
- > Line 19: count = 0
- File: flask-word/app/count/views.py
- > Line 20: response = make_response(str(count))
- File: flask-word/app/count/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = response
-File: flask-word/app/count/views.py
- > reaches line 21, trigger word "set_cookie(":
- response.set_cookie('count',value=str(count), max_age=1800)
-
-Vulnerability 3:
-File: flask-word/app/chat/views.py
- > User input at line 38, trigger word "get(":
- username = session.get('username', '')
-Reassigned in:
- File: flask-word/app/chat/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-word/app/chat/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room)
-
-Vulnerability 4:
-File: flask-word/app/chat/views.py
- > User input at line 39, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: flask-word/app/chat/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-word/app/chat/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room)
-
-
-
-marcabomb/flask-blog
-https://github.com/marcabomb/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:32:57.071474
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-studiomezklador/flask_api
-https://github.com/studiomezklador/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 11:32:59.612666
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rinechran/flask-tutorial
-https://github.com/rinechran/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:33:07.149002
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Savvis/flask-phonebook
-https://github.com/Savvis/flask-phonebook
-Entry file: flask-phonebook/app/__init__.py
-Scanned: 2016-10-20 11:33:10.132579
-No vulnerabilities found.
-
-
-a-r-g-v/flask-template
-https://github.com/a-r-g-v/flask-template
-Entry file: None
-Scanned: 2016-10-20 11:33:10.650112
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/a-r-g-v/flask-template.
-
-aksareen/Flask-learn
-https://github.com/aksareen/Flask-learn
-Entry file: Flask-learn/app.py
-Scanned: 2016-10-20 11:33:11.186462
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aqisnotliquid/flask_rpg
-https://github.com/aqisnotliquid/flask_rpg
-Entry file: flask_rpg/app/__init__.py
-Scanned: 2016-10-20 11:33:12.664554
-No vulnerabilities found.
-
-
-jordo1ken/flask-fibonacci
-https://github.com/jordo1ken/flask-fibonacci
-Entry file: flask-fibonacci/Fibonacci.py
-Scanned: 2016-10-20 11:33:14.064492
-No vulnerabilities found.
-
-
-bodzio2k/flask-blueprint
-https://github.com/bodzio2k/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 11:33:22.615350
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PeachDew/flask_tutorialwebapp
-https://github.com/PeachDew/flask_tutorialwebapp
-Entry file: flask_tutorialwebapp/app.py
-Scanned: 2016-10-20 11:33:25.357385
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-Kriordan/flask-blog
-https://github.com/Kriordan/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:33:25.906311
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-textbook/flask-forecaster
-https://github.com/textbook/flask-forecaster
-Entry file: flask-forecaster/flask_forecaster/flask_app.py
-Scanned: 2016-10-20 11:33:28.678890
-Vulnerability 1:
-File: flask-forecaster/flask_forecaster/flask_app.py
- > User input at line 34, trigger word ".data":
- token = form.token.data
-Reassigned in:
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 36: projects = Tracker.validate_token(token)
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 38: session['token'] = token
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, version=__version__)
-File: flask-forecaster/flask_forecaster/flask_app.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, projects=projects, version=__version__)
-
-Vulnerability 2:
-File: flask-forecaster/flask_forecaster/flask_app.py
- > User input at line 52, trigger word "get(":
- token = session.get('token')
-Reassigned in:
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 55: api = Tracker(token)
-File: flask-forecaster/flask_forecaster/flask_app.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project.html',project=api.get_project(project_id))
-
-
-
-nava45/flask-routelogger
-https://github.com/nava45/flask-routelogger
-Entry file: flask-routelogger/flask_app_example.py
-Scanned: 2016-10-20 11:33:29.220522
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MattHealy/flask-skeleton
-https://github.com/MattHealy/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:33:33.747285
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MattHealy/flask-skeleton.
-
-Xavier-Lam/flask-wechat
-https://github.com/Xavier-Lam/flask-wechat
-Entry file: flask-wechat/fenghuang/__init__.py
-Scanned: 2016-10-20 11:33:35.276935
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Ty-WDFW/Flask-Tickets
-https://github.com/Ty-WDFW/Flask-Tickets
-Entry file: Flask-Tickets/main.py
-Scanned: 2016-10-20 11:33:36.613595
-Vulnerability 1:
-File: Flask-Tickets/main.py
- > User input at line 15, trigger word "form[":
- fishticket = request.form['text']
-Reassigned in:
- File: Flask-Tickets/main.py
- > Line 16: response = get_fish_ticket(fishticket)
-File: Flask-Tickets/main.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('bioinfo.html',entries=response, ticket=fishticket)
-
-
-
-makudesu/flask-thesis
-https://github.com/makudesu/flask-thesis
-Entry file: flask-thesis/bnhs.py
-Scanned: 2016-10-20 11:33:42.137409
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ivanenko/flask-webcrawler
-https://github.com/ivanenko/flask-webcrawler
-Entry file: flask-webcrawler/ww2.py
-Scanned: 2016-10-20 11:33:42.663527
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pyx/flask-simplemde
-https://github.com/pyx/flask-simplemde
-Entry file: flask-simplemde/examples/simple/app.py
-Scanned: 2016-10-20 11:33:45.835218
-No vulnerabilities found.
-
-
-kubabu/flask_blog
-https://github.com/kubabu/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:33:46.830692
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MichaelDaniello/LearnFlask
-https://github.com/MichaelDaniello/LearnFlask
-Entry file: LearnFlask/ex1_URL解析.py
-Scanned: 2016-10-20 11:33:47.378193
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bplabombarda/fdr
-https://github.com/bplabombarda/fdr
-Entry file: fdr/server/__init__.py
-Scanned: 2016-10-20 11:33:51.260658
-No vulnerabilities found.
-
-
-gzxultra/FlaskLoginManagement
-https://github.com/gzxultra/FlaskLoginManagement
-Entry file: FlaskLoginManagement/app/__init__.py
-Scanned: 2016-10-20 11:33:51.806615
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-metajemo/testapp
-https://github.com/metajemo/testapp
-Entry file: testapp/testapp.py
-Scanned: 2016-10-20 11:33:52.335630
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-victorcuervo/FlaskMongoDB
-https://github.com/victorcuervo/FlaskMongoDB
-Entry file: FlaskMongoDB/welcome.py
-Scanned: 2016-10-20 11:33:53.738447
-No vulnerabilities found.
-
-
-ChellsChen/FlaskSocketIOChart
-https://github.com/ChellsChen/FlaskSocketIOChart
-Entry file: FlaskSocketIOChart/app/__init__.py
-Scanned: 2016-10-20 11:33:55.673233
-Vulnerability 1:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 31, trigger word "get(":
- name = session.get('name', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-Vulnerability 2:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 32, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-
-
-sasha42/Mailchimp-utility
-https://github.com/sasha42/Mailchimp-utility
-Entry file: None
-Scanned: 2016-10-20 11:33:56.191789
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sasha42/Mailchimp-utility.
-
-auliude/flask_hello_world
-https://github.com/auliude/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 11:33:56.699940
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/auliude/flask_hello_world.
-
-yogeshdixit41/PyFlaskWebApp
-https://github.com/yogeshdixit41/PyFlaskWebApp
-Entry file: PyFlaskWebApp/hello.py
-Scanned: 2016-10-20 11:33:57.347146
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-liuenyan/micro-flask-blog
-https://github.com/liuenyan/micro-flask-blog
-Entry file: micro-flask-blog/app/__init__.py
-Scanned: 2016-10-20 11:34:00.858228
-Vulnerability 1:
-File: micro-flask-blog/app/main/views.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 19: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: micro-flask-blog/app/main/views.py
- > User input at line 124, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 126: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 127, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id)
-
-
-
-znss1989/flask_blog_ex
-https://github.com/znss1989/flask_blog_ex
-Entry file: flask_blog_ex/blog.py
-Scanned: 2016-10-20 11:34:08.243303
-No vulnerabilities found.
-
-
-rtorres90/rest-flask-tutorial
-https://github.com/rtorres90/rest-flask-tutorial
-Entry file: rest-flask-tutorial/rest_flask/endpoints_project2sol.py
-Scanned: 2016-10-20 11:34:08.944756
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jz314/flask-demo-copy
-https://github.com/jz314/flask-demo-copy
-Entry file: None
-Scanned: 2016-10-20 11:34:09.461886
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jz314/flask-demo-copy.
-
-willelson/flask-app-template
-https://github.com/willelson/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-20 11:34:11.007553
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-acbart/lti-flask-skeleton
-https://github.com/acbart/lti-flask-skeleton
-Entry file: lti-flask-skeleton/main.py
-Scanned: 2016-10-20 11:34:11.548788
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GreatBedAwake/flask_lab_web
-https://github.com/GreatBedAwake/flask_lab_web
-Entry file: flask_lab_web/app/__init__.py
-Scanned: 2016-10-20 11:34:13.131349
-Vulnerability 1:
-File: flask_lab_web/app/views.py
- > User input at line 46, trigger word "form[":
- find_component = request.form['find_component']
-Reassigned in:
- File: flask_lab_web/app/views.py
- > Line 47: dates = select_where_db(find_component)
- File: flask_lab_web/app/views.py
- > Line 54: dates = select_data()
- File: flask_lab_web/app/views.py
- > Line 56: dates = select_data()
-File: flask_lab_web/app/views.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',component=dates)
-
-
-
-Derfirm/hello-docker-flask
-https://github.com/Derfirm/hello-docker-flask
-Entry file: hello-docker-flask/app.py
-Scanned: 2016-10-20 11:34:14.424947
-No vulnerabilities found.
-
-
-arvvvs/Flask-Practice-Metis-Delivery
-https://github.com/arvvvs/Flask-Practice-Metis-Delivery
-Entry file: Flask-Practice-Metis-Delivery/app.py
-Scanned: 2016-10-20 11:34:25.607792
-Vulnerability 1:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 30, trigger word "form(":
- form = request_phone_form()
-Reassigned in:
- File: Flask-Practice-Metis-Delivery/app.py
- > Line 32: session['phone'] = form.phone.data
- File: Flask-Practice-Metis-Delivery/app.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('lookup'))
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form)
-
-Vulnerability 2:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 57, trigger word "get(":
- address = request.args.get('address', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 65, trigger word "execute(":
- cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");')
-
-Vulnerability 3:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 59, trigger word "get(":
- name = request.args.get('name', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 65, trigger word "execute(":
- cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");')
-
-Vulnerability 4:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 127, trigger word "form[":
- _phone = request.form['submitPhone']
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 128, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('lookup.html',phone=_phone)
-
-Vulnerability 5:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 148, trigger word "get(":
- phone = request.args.get('phone', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-Vulnerability 6:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 149, trigger word "get(":
- name = request.args.get('name', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-Vulnerability 7:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 150, trigger word "get(":
- address = request.args.get('address', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-Vulnerability 8:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 151, trigger word "get(":
- phone_value = request.args.get('phone_value', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-
-
-nosuchip/flask-video-streaming
-https://github.com/nosuchip/flask-video-streaming
-Entry file: flask-video-streaming/main.py
-Scanned: 2016-10-20 11:34:29.153655
-No vulnerabilities found.
-
-
-VistaarJ/REST-API-Using-Flask-
-https://github.com/VistaarJ/REST-API-Using-Flask-
-Entry file: REST-API-Using-Flask-/app.py
-Scanned: 2016-10-20 11:34:37.600063
-No vulnerabilities found.
-
-
-n-batalha/flask-api-template
-https://github.com/n-batalha/flask-api-template
-Entry file: flask-api-template/web/journey_predict/__init__.py
-Scanned: 2016-10-20 11:34:39.042547
-No vulnerabilities found.
-
-
-knight-zhou/Web.py_Flask
-https://github.com/knight-zhou/Web.py_Flask
-Entry file: None
-Scanned: 2016-10-20 11:34:39.631672
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dv3/sample-Flask-Application
-https://github.com/dv3/sample-Flask-Application
-Entry file: None
-Scanned: 2016-10-20 11:34:40.167600
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application.
-
-blackmad/flask-google-login-example
-https://github.com/blackmad/flask-google-login-example
-Entry file: flask-google-login-example/main.py
-Scanned: 2016-10-20 11:34:40.686808
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DEV3L/openshift-python-flask-example
-https://github.com/DEV3L/openshift-python-flask-example
-Entry file: openshift-python-flask-example/wsgi/run.py
-Scanned: 2016-10-20 11:34:43.084094
-No vulnerabilities found.
-
-
-mml1/flask_multiple_forms
-https://github.com/mml1/flask_multiple_forms
-Entry file: flask_multiple_forms/server.py
-Scanned: 2016-10-20 11:34:44.382890
-No vulnerabilities found.
-
-
-jideobs/flask-gae-ndb-starter
-https://github.com/jideobs/flask-gae-ndb-starter
-Entry file: flask-gae-ndb-starter/server/main.py
-Scanned: 2016-10-20 11:34:44.903432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Tim9Liu9/Flask_Bootstrap_Blog
-https://github.com/Tim9Liu9/Flask_Bootstrap_Blog
-Entry file: Flask_Bootstrap_Blog/doc/app.py
-Scanned: 2016-10-20 11:34:48.101899
-No vulnerabilities found.
-
-
-cerealcake/flask-ldap3
-https://github.com/cerealcake/flask-ldap3
-Entry file: flask-ldap3/app.py
-Scanned: 2016-10-20 11:34:49.498520
-No vulnerabilities found.
-
-
-willelson/flask-login-template
-https://github.com/willelson/flask-login-template
-Entry file: None
-Scanned: 2016-10-20 11:34:50.143051
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zolaneta/books_flask_app
-https://github.com/zolaneta/books_flask_app
-Entry file: None
-Scanned: 2016-10-20 11:34:50.652801
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/books_flask_app.
-
-Anivarth/quiz-python-flask
-https://github.com/Anivarth/quiz-python-flask
-Entry file: quiz-python-flask/quiz.py
-Scanned: 2016-10-20 11:34:52.986579
-No vulnerabilities found.
-
-
-richyvk/flask-url-shortener
-https://github.com/richyvk/flask-url-shortener
-Entry file: flask-url-shortener/app.py
-Scanned: 2016-10-20 11:34:53.523031
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-susantshrestha/flask
-https://github.com/susantshrestha/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:34:57.058970
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-SunchunZhou/flask
-https://github.com/SunchunZhou/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:34:57.659551
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-zbc/Flask
-https://github.com/zbc/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:34:58.168746
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cobra0914/flask
-https://github.com/cobra0914/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:35:00.751420
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-k-hung/FlaskApp
-https://github.com/k-hung/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 11:35:09.827157
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-w84miracle/flask-sb-admin2
-https://github.com/w84miracle/flask-sb-admin2
-Entry file: flask-sb-admin2/sbadmin.py
-Scanned: 2016-10-20 11:35:13.944967
-No vulnerabilities found.
-
-
-yoshiya0503/Flask-Best-Practices
-https://github.com/yoshiya0503/Flask-Best-Practices
-Entry file: Flask-Best-Practices/methodview.py
-Scanned: 2016-10-20 11:35:15.334768
-No vulnerabilities found.
-
-
-ThunderousFigs/Genomes
-https://github.com/ThunderousFigs/Genomes
-Entry file: Genomes/server.py
-Scanned: 2016-10-20 11:35:15.887293
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Python-Project-Simple/flask-blog
-https://github.com/Python-Project-Simple/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:35:23.458210
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-keer2345/flasky
-https://github.com/keer2345/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:35:24.973993
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PansFortress/flasktasker
-https://github.com/PansFortress/flasktasker
-Entry file: flasktasker/views.py
-Scanned: 2016-10-20 11:35:27.585828
-No vulnerabilities found.
-
-
-olegzhoglo/flasktaskr
-https://github.com/olegzhoglo/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:35:30.100612
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-adrianneperedo/flaskr
-https://github.com/adrianneperedo/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:35:38.618411
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mirukushake/flaskr
-https://github.com/mirukushake/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:35:40.129488
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-schen2011/flaskandazure
-https://github.com/schen2011/flaskandazure
-Entry file: None
-Scanned: 2016-10-20 11:35:40.687123
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DXZ/flaskr
-https://github.com/DXZ/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:35:41.196421
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tim1978/flasktaskr
-https://github.com/tim1978/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:35:42.716224
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kriordan/flasktaskr
-https://github.com/Kriordan/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:35:44.228825
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-haoweibo1987/flasker
-https://github.com/haoweibo1987/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 11:35:45.795865
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-egonvb/flaskplayground
-https://github.com/egonvb/flaskplayground
-Entry file: flaskplayground/api.py
-Scanned: 2016-10-20 11:35:47.459911
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-liteng123/flaskr
-https://github.com/liteng123/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:35:48.972461
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-salazar35/FlaskWeb
-https://github.com/salazar35/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 11:35:51.044898
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-pchartrand/FlaskTemp
-https://github.com/pchartrand/FlaskTemp
-Entry file: FlaskTemp/tempreport.py
-Scanned: 2016-10-20 11:35:52.676838
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hattwick/flask2
-https://github.com/hattwick/flask2
-Entry file: flask2/app.py
-Scanned: 2016-10-20 11:35:54.236313
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-narakai/FlaskServer
-https://github.com/narakai/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-20 11:35:54.757284
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paoloo1995/FlaskBlog
-https://github.com/paoloo1995/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 11:35:55.365431
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-julywoo/flaskWeb
-https://github.com/julywoo/flaskWeb
-Entry file: flaskWeb/flaskWeb.py
-Scanned: 2016-10-20 11:36:00.994465
-No vulnerabilities found.
-
-
-tmlima/flask-intro
-https://github.com/tmlima/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:36:01.505715
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sourcelair-blueprints/flask-mongo
-https://github.com/sourcelair-blueprints/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-20 11:36:02.011612
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mmingle/flask-blog
-https://github.com/mmingle/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:36:02.553660
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-justinwp/flask-urs
-https://github.com/justinwp/flask-urs
-Entry file: flask-urs/tests/conftest.py
-Scanned: 2016-10-20 11:36:10.240229
-No vulnerabilities found.
-
-
-SawHigh/flask_cdn
-https://github.com/SawHigh/flask_cdn
-Entry file: flask_cdn/cdn.py
-Scanned: 2016-10-20 11:36:11.567392
-No vulnerabilities found.
-
-
-crq/flask-scaffold
-https://github.com/crq/flask-scaffold
-Entry file: flask-scaffold/[appname].py
-Scanned: 2016-10-20 11:36:12.082429
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-asielen/Woodles_Flask
-https://github.com/asielen/Woodles_Flask
-Entry file: Woodles_Flask/app/__init__.py
-Scanned: 2016-10-20 11:36:15.988580
-Vulnerability 1:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-Vulnerability 2:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-
-
-amitbn/flask-docker
-https://github.com/amitbn/flask-docker
-Entry file: flask-docker/app.py
-Scanned: 2016-10-20 11:36:17.879228
-No vulnerabilities found.
-
-
-julywoo/flask_login
-https://github.com/julywoo/flask_login
-Entry file: None
-Scanned: 2016-10-20 11:36:23.900560
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/julywoo/flask_login.
-
-LovroM/Flask-test
-https://github.com/LovroM/Flask-test
-Entry file: Flask-test/webserver.py
-Scanned: 2016-10-20 11:36:26.914428
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-danleyb2/flask-cloudinary
-https://github.com/danleyb2/flask-cloudinary
-Entry file: None
-Scanned: 2016-10-20 11:36:30.482977
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary.
-
-OpenTrons/labsuite_flask
-https://github.com/OpenTrons/labsuite_flask
-Entry file: labsuite_flask/app.py
-Scanned: 2016-10-20 11:36:40.192357
-No vulnerabilities found.
-
-
-YaGiNA/study-flask
-https://github.com/YaGiNA/study-flask
-Entry file: study-flask/flaskr/__init__.py
-Scanned: 2016-10-20 11:36:45.564050
-No vulnerabilities found.
-
-
-seanhelm/flask-test
-https://github.com/seanhelm/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:36:46.121439
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-Viredery/python_flask
-https://github.com/Viredery/python_flask
-Entry file: None
-Scanned: 2016-10-20 11:36:46.637300
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Viredery/python_flask.
-
-josanabr/flask-vbox
-https://github.com/josanabr/flask-vbox
-Entry file: flask-vbox/flask-vbox.py
-Scanned: 2016-10-20 11:36:47.934870
-No vulnerabilities found.
-
-
-simeon-xx/simeon-flask
-https://github.com/simeon-xx/simeon-flask
-Entry file: simeon-flask/app/init.py
-Scanned: 2016-10-20 11:36:49.257613
-No vulnerabilities found.
-
-
-cherry-hyx/flask_t
-https://github.com/cherry-hyx/flask_t
-Entry file: None
-Scanned: 2016-10-20 11:36:49.798994
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cherry-hyx/flask_t.
-
-abcsds/flask-tests
-https://github.com/abcsds/flask-tests
-Entry file: flask-tests/streaming/stream.py
-Scanned: 2016-10-20 11:36:51.625066
-No vulnerabilities found.
-
-
-tanzhixu/Flask-oauth
-https://github.com/tanzhixu/Flask-oauth
-Entry file: Flask-oauth/app/__init__.py
-Scanned: 2016-10-20 11:36:52.923422
-Vulnerability 1:
-File: Flask-oauth/app/user_manager_views.py
- > User input at line 32, trigger word "get(":
- password = request.json.get('password', None)
-Reassigned in:
- File: Flask-oauth/app/user_manager_views.py
- > Line 38: newpasswd = pwd_context.encrypt(password)
-File: Flask-oauth/app/user_manager_views.py
- > reaches line 41, trigger word "filter(":
- query.filter(User.id == userid).update(User.password_hashnewpasswd)
-
-
-
-brandonfujii/flask-microblog
-https://github.com/brandonfujii/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 11:36:53.438971
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dylannnnn/flask_study
-https://github.com/dylannnnn/flask_study
-Entry file: flask_study/views.py
-Scanned: 2016-10-20 11:36:53.977739
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-huasu/InstantFlask
-https://github.com/huasu/InstantFlask
-Entry file: InstantFlask/app_return_values.py
-Scanned: 2016-10-20 11:36:55.722233
-No vulnerabilities found.
-
-
-maricante/flask-blog
-https://github.com/maricante/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:36:56.295426
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-christopherL91/pythonflask
-https://github.com/christopherL91/pythonflask
-Entry file: pythonflask/app/main.py
-Scanned: 2016-10-20 11:36:57.587372
-No vulnerabilities found.
-
-
-ysicing/Pangu
-https://github.com/ysicing/Pangu
-Entry file: Pangu/Pangu.py
-Scanned: 2016-10-20 11:36:59.668319
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-rbcolson9/flask4kids
-https://github.com/rbcolson9/flask4kids
-Entry file: flask4kids/hello.py
-Scanned: 2016-10-20 11:37:00.921290
-No vulnerabilities found.
-
-
-charlestondance/FlaskStartUp
-https://github.com/charlestondance/FlaskStartUp
-Entry file: FlaskStartUp/app/__init__.py
-Scanned: 2016-10-20 11:37:03.444248
-No vulnerabilities found.
-
-
-erik-farmer/flask-auth-wysiwyg-blog
-https://github.com/erik-farmer/flask-auth-wysiwyg-blog
-Entry file: flask-auth-wysiwyg-blog/app.py
-Scanned: 2016-10-20 11:37:04.731128
-No vulnerabilities found.
-
-
-guilleJB/flask-web-book
-https://github.com/guilleJB/flask-web-book
-Entry file: flask-web-book/hello.py
-Scanned: 2016-10-20 11:37:06.259783
-Vulnerability 1:
-File: flask-web-book/hello.py
- > User input at line 120, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask-web-book/hello.py
- > Line 117: name = None
-File: flask-web-book/hello.py
- > reaches line 122, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('boots.html',name=name, form=form)
-
-
-
-dongheelee1/simple_flask_wall
-https://github.com/dongheelee1/simple_flask_wall
-Entry file: simple_flask_wall/server.py
-Scanned: 2016-10-20 11:37:09.799085
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ynifamily3/CRUD-with-Flask-MVC
-https://github.com/ynifamily3/CRUD-with-Flask-MVC
-Entry file: CRUD-with-Flask-MVC/test.py
-Scanned: 2016-10-20 11:37:11.333805
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-duncan60/flask-github-api
-https://github.com/duncan60/flask-github-api
-Entry file: flask-github-api/app/__init__.py
-Scanned: 2016-10-20 11:37:13.757529
-No vulnerabilities found.
-
-
-mnzr/Flask-Blueprint-test
-https://github.com/mnzr/Flask-Blueprint-test
-Entry file: Flask-Blueprint-test/app/__init__.py
-Scanned: 2016-10-20 11:37:16.232985
-Vulnerability 1:
-File: Flask-Blueprint-test/app/users/views.py
- > User input at line 33, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Blueprint-test/app/users/views.py
- > Line 38: session['user_id'] = user.id
-File: Flask-Blueprint-test/app/users/views.py
- > reaches line 39, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-znss1989/flask_blog_ex
-https://github.com/znss1989/flask_blog_ex
-Entry file: flask_blog_ex/blog.py
-Scanned: 2016-10-20 11:37:18.362398
-No vulnerabilities found.
-
-
-aquang9124/flask_semi_restful_routes
-https://github.com/aquang9124/flask_semi_restful_routes
-Entry file: flask_semi_restful_routes/server.py
-Scanned: 2016-10-20 11:37:19.750386
-No vulnerabilities found.
-
-
-PeggyZWY/blog-with-flask
-https://github.com/PeggyZWY/blog-with-flask
-Entry file: blog-with-flask/app/__init__.py
-Scanned: 2016-10-20 11:37:23.636159
-Vulnerability 1:
-File: blog-with-flask/app/main/views.py
- > User input at line 186, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 189: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: blog-with-flask/app/main/views.py
- > Line 192: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 195: comments = pagination.items
- File: blog-with-flask/app/main/views.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-File: blog-with-flask/app/main/views.py
- > reaches line 204, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, categories=category, comments=comments, pagination=pagination)
-
-Vulnerability 2:
-File: blog-with-flask/app/main/views.py
- > User input at line 293, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 294: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 298: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: blog-with-flask/app/main/views.py
- > Line 291: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: blog-with-flask/app/main/views.py
- > reaches line 301, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='他们关注了', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 3:
-File: blog-with-flask/app/main/views.py
- > User input at line 311, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 312: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 315: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: blog-with-flask/app/main/views.py
- > Line 310: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: blog-with-flask/app/main/views.py
- > reaches line 317, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注了他们', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: blog-with-flask/app/main/views.py
- > User input at line 349, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 350: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 353: comments = pagination.items
-File: blog-with-flask/app/main/views.py
- > reaches line 354, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 5:
-File: blog-with-flask/app/main/views.py
- > User input at line 431, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 452: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 456: posts = pagination.items
-File: blog-with-flask/app/main/views.py
- > reaches line 460, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 6:
-File: blog-with-flask/app/main/views.py
- > User input at line 471, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 475: pagination = Post.query.filter_by(category_id=_category.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 478: posts = pagination.items
-File: blog-with-flask/app/main/views.py
- > reaches line 482, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination)
-
-
-
-TwilioDevEd/browser-calls-flask
-https://github.com/TwilioDevEd/browser-calls-flask
-Entry file: browser-calls-flask/browser_calls_flask/__init__.py
-Scanned: 2016-10-20 11:37:29.187629
-No vulnerabilities found.
-
-
-terryllowery/flask-hello-world
-https://github.com/terryllowery/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:37:30.310578
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-aquang9124/flask_wall_test
-https://github.com/aquang9124/flask_wall_test
-Entry file: flask_wall_test/server.py
-Scanned: 2016-10-20 11:37:31.772202
-No vulnerabilities found.
-
-
-ynejati/MyFlaskApp
-https://github.com/ynejati/MyFlaskApp
-Entry file: MyFlaskApp/MyFlaskWebApp.py
-Scanned: 2016-10-20 11:37:40.254943
-No vulnerabilities found.
-
-
-TheCypher/flask-boiler-plate
-https://github.com/TheCypher/flask-boiler-plate
-Entry file: flask-boiler-plate/app/__init__.py
-Scanned: 2016-10-20 11:37:41.670580
-Vulnerability 1:
-File: flask-boiler-plate/app/module_one/views.py
- > User input at line 30, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: flask-boiler-plate/app/module_one/views.py
- > Line 34: session['user_id'] = user.id
-File: flask-boiler-plate/app/module_one/views.py
- > reaches line 36, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-TheCypher/flask-api-test
-https://github.com/TheCypher/flask-api-test
-Entry file: flask-api-test/api.py
-Scanned: 2016-10-20 11:37:46.334714
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-api-test/lib/python2.7/genericpath.py
-
-vstanev1/heroku-flask-app
-https://github.com/vstanev1/heroku-flask-app
-Entry file: heroku-flask-app/app.py
-Scanned: 2016-10-20 11:37:50.249744
-No vulnerabilities found.
-
-
-bellcodo/bellcodo-flask-microblog
-https://github.com/bellcodo/bellcodo-flask-microblog
-Entry file: bellcodo-flask-microblog/app/__init__.py
-Scanned: 2016-10-20 11:37:52.909174
-No vulnerabilities found.
-
-
-megrela/python-flask-skeleton
-https://github.com/megrela/python-flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:37:53.440480
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/megrela/python-flask-skeleton.
-
-plablo09/minimal-flask-dev
-https://github.com/plablo09/minimal-flask-dev
-Entry file: minimal-flask-dev/hello.py
-Scanned: 2016-10-20 11:37:54.840875
-No vulnerabilities found.
-
-
-knight-zhou/Web.py_Flask
-https://github.com/knight-zhou/Web.py_Flask
-Entry file: None
-Scanned: 2016-10-20 11:37:55.908867
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shyba/browser-calls-flask
-https://github.com/shyba/browser-calls-flask
-Entry file: browser-calls-flask/browser_calls_flask/__init__.py
-Scanned: 2016-10-20 11:37:57.206539
-No vulnerabilities found.
-
-
-jdgramajo/LearningFlaskFramework
-https://github.com/jdgramajo/LearningFlaskFramework
-Entry file: LearningFlaskFramework/blog/app/app.py
-Scanned: 2016-10-20 11:37:58.502240
-No vulnerabilities found.
-
-
-liuer99cn/awesome-flask-todo
-https://github.com/liuer99cn/awesome-flask-todo
-Entry file: None
-Scanned: 2016-10-20 11:37:59.017809
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/liuer99cn/awesome-flask-todo.
-
-seiya-tsukada/instant_flask_server
-https://github.com/seiya-tsukada/instant_flask_server
-Entry file: instant_flask_server/main.py
-Scanned: 2016-10-20 11:38:00.352736
-No vulnerabilities found.
-
-
-Journo-App/flask-by-example
-https://github.com/Journo-App/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:38:01.071485
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bobquest33/testRestFlask
-https://github.com/bobquest33/testRestFlask
-Entry file: testRestFlask/testRestFlask/testRestFlask/apps/testRest/models.py
-Scanned: 2016-10-20 11:38:01.566921
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jjapp/flask-hello-world
-https://github.com/jjapp/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:38:02.118148
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-snehasankavaram/donorRegistryFlask
-https://github.com/snehasankavaram/donorRegistryFlask
-Entry file: donorRegistryFlask/run.py
-Scanned: 2016-10-20 11:38:03.410718
-No vulnerabilities found.
-
-
-ayusharma/Drug-discovery-flask
-https://github.com/ayusharma/Drug-discovery-flask
-Entry file: Drug-discovery-flask/app.py
-Scanned: 2016-10-20 11:38:04.924702
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vishaljain3991/flask_oauth_example_template
-https://github.com/vishaljain3991/flask_oauth_example_template
-Entry file: flask_oauth_example_template/app/__init__.py
-Scanned: 2016-10-20 11:38:11.376760
-No vulnerabilities found.
-
-
-F483/flask-data-migration-example
-https://github.com/F483/flask-data-migration-example
-Entry file: flask-data-migration-example/app.py
-Scanned: 2016-10-20 11:38:12.702610
-No vulnerabilities found.
-
-
-studiomezklador/flask_api_2
-https://github.com/studiomezklador/flask_api_2
-Entry file: flask_api_2/__init__.py
-Scanned: 2016-10-20 11:38:14.151695
-No vulnerabilities found.
-
-
-SarthakS93/Flask-WebApp
-https://github.com/SarthakS93/Flask-WebApp
-Entry file: Flask-WebApp/app/__init__.py
-Scanned: 2016-10-20 11:38:15.510910
-No vulnerabilities found.
-
-
-dorneanu/flask-app-template
-https://github.com/dorneanu/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-20 11:38:16.037519
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aquang9124/flask_friends_full
-https://github.com/aquang9124/flask_friends_full
-Entry file: flask_friends_full/server.py
-Scanned: 2016-10-20 11:38:18.377680
-No vulnerabilities found.
-
-
-huasu/LearningFlaskFramework
-https://github.com/huasu/LearningFlaskFramework
-Entry file: LearningFlaskFramework/hello.py
-Scanned: 2016-10-20 11:38:19.672901
-No vulnerabilities found.
-
-
-sd16spring/Toolbox-Flask
-https://github.com/sd16spring/Toolbox-Flask
-Entry file: Toolbox-Flask/hello.py
-Scanned: 2016-10-20 11:38:25.351778
-No vulnerabilities found.
-
-
-pavelrib/flask
-https://github.com/pavelrib/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:38:29.987058
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-octt/flask
-https://github.com/octt/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:38:30.696123
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Bwooklyn/flask
-https://github.com/Bwooklyn/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:38:31.314747
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-HRKpython/flask
-https://github.com/HRKpython/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:38:39.918533
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ZhenghaoZhu/Flask
-https://github.com/ZhenghaoZhu/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:38:41.454437
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SeanVaysburd/flask
-https://github.com/SeanVaysburd/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:38:47.041288
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-kartheek3011/Flask
-https://github.com/kartheek3011/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:38:47.551603
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TerbiumLabs/flask-developer-challenge
-https://github.com/TerbiumLabs/flask-developer-challenge
-Entry file: flask-developer-challenge/gistapi/gistapi.py
-Scanned: 2016-10-20 11:38:51.997913
-No vulnerabilities found.
-
-
-sunscrapers/flask-boilerplate
-https://github.com/sunscrapers/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 11:38:53.529269
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sunscrapers/flask-boilerplate.
-
-jabbalaci/DigitalOceanFlask
-https://github.com/jabbalaci/DigitalOceanFlask
-Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py
-Scanned: 2016-10-20 11:38:55.172479
-No vulnerabilities found.
-
-
-w84miracle/flask-sb-admin2
-https://github.com/w84miracle/flask-sb-admin2
-Entry file: flask-sb-admin2/sbadmin.py
-Scanned: 2016-10-20 11:38:59.268325
-No vulnerabilities found.
-
-
-pyx/flask-diced
-https://github.com/pyx/flask-diced
-Entry file: flask-diced/examples/simple/app.py
-Scanned: 2016-10-20 11:39:00.774987
-No vulnerabilities found.
-
-
-basco-johnkevin/note-taking-app
-https://github.com/basco-johnkevin/note-taking-app
-Entry file: note-taking-app/part1/main.py
-Scanned: 2016-10-20 11:39:02.055846
-No vulnerabilities found.
-
-
-Miserlou/serverless-imagehost
-https://github.com/Miserlou/serverless-imagehost
-Entry file: serverless-imagehost/my_app.py
-Scanned: 2016-10-20 11:39:03.358797
-No vulnerabilities found.
-
-
-MRamakri/flaskworkshop
-https://github.com/MRamakri/flaskworkshop
-Entry file: flaskworkshop/app.py
-Scanned: 2016-10-20 11:39:04.646332
-No vulnerabilities found.
-
-
-imhuwq/flasky
-https://github.com/imhuwq/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:39:05.161341
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coolmile23/flaskr
-https://github.com/coolmile23/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:39:05.669974
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hellohuangjin/flaskblog
-https://github.com/hellohuangjin/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 11:39:06.226518
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-zhangyuhaomei/flasky
-https://github.com/zhangyuhaomei/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:39:06.740540
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-antonsoroko/flaskapimongo
-https://github.com/antonsoroko/flaskapimongo
-Entry file: flaskapimongo/flaskapimongo/__init__.py
-Scanned: 2016-10-20 11:39:08.255445
-No vulnerabilities found.
-
-
-haoweibo1987/flasker
-https://github.com/haoweibo1987/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 11:39:08.784891
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-egonvb/flaskplayground
-https://github.com/egonvb/flaskplayground
-Entry file: flaskplayground/api.py
-Scanned: 2016-10-20 11:39:09.385818
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhkmxx9302013/flaskmysql
-https://github.com/zhkmxx9302013/flaskmysql
-Entry file: flaskmysql/flaskmysql.py
-Scanned: 2016-10-20 11:39:12.808164
-No vulnerabilities found.
-
-
-xiaomao361/flaskr
-https://github.com/xiaomao361/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:39:13.331346
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alvaro893/flaskcinemaapp
-https://github.com/alvaro893/flaskcinemaapp
-Entry file: flaskcinemaapp/FlaskWebProject/__init__.py
-Scanned: 2016-10-20 11:39:17.776452
-No vulnerabilities found.
-
-
-yuyiwei305/flaskr
-https://github.com/yuyiwei305/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:39:18.309805
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-retozero/FlaskDemo
-https://github.com/retozero/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 11:39:19.329887
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-saurabh1e/FlaskStructure
-https://github.com/saurabh1e/FlaskStructure
-Entry file: FlaskStructure/src/utils/__init__.py
-Scanned: 2016-10-20 11:39:22.765540
-No vulnerabilities found.
-
-
-uklineale/flaskTut
-https://github.com/uklineale/flaskTut
-Entry file: None
-Scanned: 2016-10-20 11:39:25.355045
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zupeiza/FlaskTaskr
-https://github.com/zupeiza/FlaskTaskr
-Entry file: FlaskTaskr/views.py
-Scanned: 2016-10-20 11:39:30.987945
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py
-
-yxun/FlaskSample
-https://github.com/yxun/FlaskSample
-Entry file: FlaskSample/hello.py
-Scanned: 2016-10-20 11:39:32.327253
-No vulnerabilities found.
-
-
-paoloo1995/FlaskBlog
-https://github.com/paoloo1995/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 11:39:32.953832
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DearX-dlx/FlaskBlog
-https://github.com/DearX-dlx/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 11:39:40.573139
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tahoe/flask-restless
-https://github.com/tahoe/flask-restless
-Entry file: flask-restless/examples/clients/jquery/__main__.py
-Scanned: 2016-10-20 11:39:42.154780
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhkmxx9302013/RPiFlask
-https://github.com/zhkmxx9302013/RPiFlask
-Entry file: RPiFlask/main.py
-Scanned: 2016-10-20 11:39:47.706193
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mkubaczyk/flask-structure
-https://github.com/mkubaczyk/flask-structure
-Entry file: flask-structure/apps/__init__.py
-Scanned: 2016-10-20 11:39:49.164470
-No vulnerabilities found.
-
-
-PavelMPD/flask_oauth
-https://github.com/PavelMPD/flask_oauth
-Entry file: flask_oauth/server.py
-Scanned: 2016-10-20 11:39:52.467569
-No vulnerabilities found.
-
-
-sourcelair-blueprints/flask-mongo
-https://github.com/sourcelair-blueprints/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-20 11:39:53.993532
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-doubtingben/flask-mongo
-https://github.com/doubtingben/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-20 11:39:54.514558
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-farridav/flask_friends
-https://github.com/farridav/flask_friends
-Entry file: flask_friends/src/friends/__init__.py
-Scanned: 2016-10-20 11:39:57.159395
-No vulnerabilities found.
-
-
-doubtingben/flask-jobs
-https://github.com/doubtingben/flask-jobs
-Entry file: flask-jobs/code/web.py
-Scanned: 2016-10-20 11:40:01.515824
-No vulnerabilities found.
-
-
-gh-tcbd/flask-test
-https://github.com/gh-tcbd/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:40:02.048756
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-askewseth/StatsFlask
-https://github.com/askewseth/StatsFlask
-Entry file: StatsFlask/run.py
-Scanned: 2016-10-20 11:40:03.583503
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bzerroug/flask_appbuilder
-https://github.com/bzerroug/flask_appbuilder
-Entry file: flask_appbuilder/meteo/__init__.py
-Scanned: 2016-10-20 11:40:04.099379
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BlackMud/flask_blog
-https://github.com/BlackMud/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:40:05.614832
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sohje/__flask_psgr
-https://github.com/sohje/__flask_psgr
-Entry file: __flask_psgr/app.py
-Scanned: 2016-10-20 11:40:06.146520
-No vulnerabilities found.
-
-
-hoikin-yiu/flask-blog
-https://github.com/hoikin-yiu/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:40:06.709505
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Cloudwick-BT/flask_project
-https://github.com/Cloudwick-BT/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 11:40:07.509454
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gyonghua/flask-blog
-https://github.com/gyonghua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:40:08.065690
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-g-rich/flask-blog
-https://github.com/g-rich/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:40:09.622956
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Zhgong/flask_microblog
-https://github.com/Zhgong/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 11:40:10.149945
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chensdream/learn-flask
-https://github.com/chensdream/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:40:12.826891
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coolmile23/flask_practice
-https://github.com/coolmile23/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 11:40:13.371097
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-k9luo/Flask-Tutorial
-https://github.com/k9luo/Flask-Tutorial
-Entry file: Flask-Tutorial/microblog-version-0.2/app/__init__.py
-Scanned: 2016-10-20 11:40:23.994155
-No vulnerabilities found.
-
-
-Harry-Yao/learn-flask
-https://github.com/Harry-Yao/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:40:24.758180
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-danleyb2/flask-cloudinary
-https://github.com/danleyb2/flask-cloudinary
-Entry file: None
-Scanned: 2016-10-20 11:40:25.274956
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary.
-
-juan-castano/todo-flask
-https://github.com/juan-castano/todo-flask
-Entry file: None
-Scanned: 2016-10-20 11:40:25.795726
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/juan-castano/todo-flask.
-
-mullaned/Flask-Test
-https://github.com/mullaned/Flask-Test
-Entry file: Flask-Test/flask_test.py
-Scanned: 2016-10-20 11:40:27.148708
-Vulnerability 1:
-File: Flask-Test/flask_test.py
- > User input at line 13, trigger word "get(":
- age = ages.get(user)
-File: Flask-Test/flask_test.py
- > reaches line 14, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users.html',user=user, age=age)
-
-
-
-zupeiza/flask-blog
-https://github.com/zupeiza/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:40:27.708882
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-shopetan/flask-api
-https://github.com/shopetan/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 11:40:31.225451
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jungkoo/flask-dmango
-https://github.com/jungkoo/flask-dmango
-Entry file: flask-dmango/sample/blueprint_find.py
-Scanned: 2016-10-20 11:40:31.769506
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-raghureddyram/flask-hello
-https://github.com/raghureddyram/flask-hello
-Entry file: flask-hello/hello.py
-Scanned: 2016-10-20 11:40:33.288028
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hrushikesh198/flask-server
-https://github.com/hrushikesh198/flask-server
-Entry file: None
-Scanned: 2016-10-20 11:40:40.802901
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hrushikesh198/flask-server.
-
-omarkurt/flask-injection
-https://github.com/omarkurt/flask-injection
-Entry file: flask-injection/index.py
-Scanned: 2016-10-20 11:40:49.188963
-No vulnerabilities found.
-
-
-Datalker/Flask_sandbox
-https://github.com/Datalker/Flask_sandbox
-Entry file: Flask_sandbox/hello.py
-Scanned: 2016-10-20 11:40:52.637251
-No vulnerabilities found.
-
-
-getsentry/demo-flask
-https://github.com/getsentry/demo-flask
-Entry file: demo-flask/app.py
-Scanned: 2016-10-20 11:40:56.142184
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-technocake/flask-eksempel
-https://github.com/technocake/flask-eksempel
-Entry file: flask-eksempel/webserver.py
-Scanned: 2016-10-20 11:41:01.676051
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wkzhu/flask_example
-https://github.com/wkzhu/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:41:02.174980
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rgsingh/flask-timetrack
-https://github.com/rgsingh/flask-timetrack
-Entry file: flask-timetrack/app/__init__.py
-Scanned: 2016-10-20 11:41:04.640149
-Vulnerability 1:
-File: flask-timetrack/app/views.py
- > User input at line 29, trigger word "get(":
- taskid = request.args.get('id')
-Reassigned in:
- File: flask-timetrack/app/views.py
- > Line 33: filtered_task = [x for x in tasks_file]
- File: flask-timetrack/app/views.py
- > Line 35: task = json.dumps(filtered_task)
-File: flask-timetrack/app/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('edittask.html',taskid=taskid, task=task)
-
-
-
-pultitom/study-flask
-https://github.com/pultitom/study-flask
-Entry file: study-flask/microblog/app/__init__.py
-Scanned: 2016-10-20 11:41:05.982453
-No vulnerabilities found.
-
-
-StarsHu/ll-flask
-https://github.com/StarsHu/ll-flask
-Entry file: ll-flask/LikeLines/server.py
-Scanned: 2016-10-20 11:41:06.501490
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-morphee31/flask_example
-https://github.com/morphee31/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:41:07.026270
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wumb0/flask-examples
-https://github.com/wumb0/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-20 11:41:07.539731
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vladimirdotk/flask-boilerplate
-https://github.com/vladimirdotk/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 11:41:08.524372
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vladimirdotk/flask-boilerplate.
-
-zubairah/Flask_App
-https://github.com/zubairah/Flask_App
-Entry file: Flask_App/Flask_App/app.py
-Scanned: 2016-10-20 11:41:10.045188
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ramwin/flask_tutorial
-https://github.com/ramwin/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:41:13.069654
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-f-guitart/progcoms3-flask
-https://github.com/f-guitart/progcoms3-flask
-Entry file: progcoms3-flask/app.py
-Scanned: 2016-10-20 11:41:18.417432
-Vulnerability 1:
-File: progcoms3-flask/app.py
- > User input at line 73, trigger word "get(":
- zone = request.form.get('area')
-Reassigned in:
- File: progcoms3-flask/app.py
- > Line 75: zone_data = get_zone_data(zone)
- File: progcoms3-flask/app.py
- > Line 71: zone_data = []
-File: progcoms3-flask/app.py
- > reaches line 76, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('zone_data_table.html',zone_data=zone_data, zones=zones)
-
-
-
-christopherL91/pythonflask
-https://github.com/christopherL91/pythonflask
-Entry file: pythonflask/app/main.py
-Scanned: 2016-10-20 11:41:19.776909
-No vulnerabilities found.
-
-
-kolapapa/blog_kola
-https://github.com/kolapapa/blog_kola
-Entry file: blog_kola/db.py
-Scanned: 2016-10-20 11:41:25.556291
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/genericpath.py
-
-jackeylu/microblog
-https://github.com/jackeylu/microblog
-Entry file: None
-Scanned: 2016-10-20 11:41:26.067743
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-garaud/pyris
-https://github.com/garaud/pyris
-Entry file: pyris/pyris/api/__init__.py
-Scanned: 2016-10-20 11:41:27.752192
-No vulnerabilities found.
-
-
-nicc777/flask-webservice-wsgi-python3-demo
-https://github.com/nicc777/flask-webservice-wsgi-python3-demo
-Entry file: flask-webservice-wsgi-python3-demo/fwsdemo/app.py
-Scanned: 2016-10-20 11:41:29.193298
-No vulnerabilities found.
-
-
-MicahSteinbrecher/mini-blog
-https://github.com/MicahSteinbrecher/mini-blog
-Entry file: mini-blog/flaskr.py
-Scanned: 2016-10-20 11:41:33.539641
-No vulnerabilities found.
-
-
-rjantos/flask-hello-world
-https://github.com/rjantos/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:41:34.094671
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-remarcbalisi/rest-demo-flask-
-https://github.com/remarcbalisi/rest-demo-flask-
-Entry file: rest-demo-flask-/app.py
-Scanned: 2016-10-20 11:41:44.051097
-No vulnerabilities found.
-
-
-duncan60/flask-github-api
-https://github.com/duncan60/flask-github-api
-Entry file: flask-github-api/app/__init__.py
-Scanned: 2016-10-20 11:41:45.489908
-No vulnerabilities found.
-
-
-merryHunter/chat-flask-socketio
-https://github.com/merryHunter/chat-flask-socketio
-Entry file: chat-flask-socketio/chat.py
-Scanned: 2016-10-20 11:41:48.257880
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mattvisco/flask_test_2
-https://github.com/mattvisco/flask_test_2
-Entry file: flask_test_2/insta.py
-Scanned: 2016-10-20 11:41:49.669630
-No vulnerabilities found.
-
-
-pavelchalyk/blackjack_on_flask
-https://github.com/pavelchalyk/blackjack_on_flask
-Entry file: blackjack_on_flask/blackjack.py
-Scanned: 2016-10-20 11:41:52.200761
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sd16spring/Toolbox-Flask
-https://github.com/sd16spring/Toolbox-Flask
-Entry file: Toolbox-Flask/hello.py
-Scanned: 2016-10-20 11:41:57.640853
-No vulnerabilities found.
-
-
-bsteinberg/flask
-https://github.com/bsteinberg/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:42:02.236063
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-HRKpython/flask
-https://github.com/HRKpython/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:42:02.829790
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ninadmhatre/zual
-https://github.com/ninadmhatre/zual
-Entry file: zual/local_mods/flask-blogging/test/__init__.py
-Scanned: 2016-10-20 11:42:10.326700
-No vulnerabilities found.
-
-
-taogeT/flask-celery
-https://github.com/taogeT/flask-celery
-Entry file: flask-celery/example/app/__init__.py
-Scanned: 2016-10-20 11:42:11.759248
-No vulnerabilities found.
-
-
-frankV/flask-sendgrid
-https://github.com/frankV/flask-sendgrid
-Entry file: flask-sendgrid/setup.py
-Scanned: 2016-10-20 11:42:13.055097
-No vulnerabilities found.
-
-
-islandev/flaskweb
-https://github.com/islandev/flaskweb
-Entry file: None
-Scanned: 2016-10-20 11:42:13.588101
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gyonghua/flasktaskr
-https://github.com/gyonghua/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:42:14.110540
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Rothschild0120/flaskyblog
-https://github.com/Rothschild0120/flaskyblog
-Entry file: flaskyblog/app/__init__.py
-Scanned: 2016-10-20 11:42:14.643065
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yuyiwei305/flaskr
-https://github.com/yuyiwei305/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:42:15.146924
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stalwart201/flaskimgupload
-https://github.com/stalwart201/flaskimgupload
-Entry file: flaskimgupload/upload.py
-Scanned: 2016-10-20 11:42:16.453545
-Vulnerability 1:
-File: flaskimgupload/upload.py
- > User input at line 19, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flaskimgupload/upload.py
- > Line 21: filename = secure_filename(file.filename)
- File: flaskimgupload/upload.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flaskimgupload/upload.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: flaskimgupload/upload.py
- > User input at line 19, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flaskimgupload/upload.py
- > Line 21: filename = secure_filename(file.filename)
- File: flaskimgupload/upload.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flaskimgupload/upload.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-zixuzhang/flasky
-https://github.com/zixuzhang/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:42:16.990342
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoobalias/Flaskr
-https://github.com/hoobalias/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 11:42:17.507432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-azureappserviceoss/FlaskAzure
-https://github.com/azureappserviceoss/FlaskAzure
-Entry file: FlaskAzure/FlaskWebProject1/__init__.py
-Scanned: 2016-10-20 11:42:25.809379
-No vulnerabilities found.
-
-
-yhappy/FlaskProjects
-https://github.com/yhappy/FlaskProjects
-Entry file: FlaskProjects/FlaskProjects.py
-Scanned: 2016-10-20 11:42:27.164442
-No vulnerabilities found.
-
-
-tajihiro/FlaskBluemix
-https://github.com/tajihiro/FlaskBluemix
-Entry file: FlaskBluemix/index.py
-Scanned: 2016-10-20 11:42:28.455911
-No vulnerabilities found.
-
-
-Leyawiin/FlaskDemo
-https://github.com/Leyawiin/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 11:42:28.978432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KotiyaSenya/FlaskLearn
-https://github.com/KotiyaSenya/FlaskLearn
-Entry file: FlaskLearn/flask_learn/__init__.py
-Scanned: 2016-10-20 11:42:30.889857
-Vulnerability 1:
-File: FlaskLearn/flask_learn/main/views/index.py
- > User input at line 10, trigger word "get(":
- user_agent = request.headers.get('User-Agent')
-File: FlaskLearn/flask_learn/main/views/index.py
- > reaches line 11, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.utcnow())
-
-
-
-Patreon/cartographer
-https://github.com/Patreon/cartographer
-Entry file: cartographer/example/generic_social_network/app/__init__.py
-Scanned: 2016-10-20 11:42:33.231775
-No vulnerabilities found.
-
-
-Ketouem/flask-boto3
-https://github.com/Ketouem/flask-boto3
-Entry file: flask-boto3/example.py
-Scanned: 2016-10-20 11:42:34.644460
-No vulnerabilities found.
-
-
-Pushould/pushould-flask-sample
-https://github.com/Pushould/pushould-flask-sample
-Entry file: pushould-flask-sample/app.py
-Scanned: 2016-10-20 11:42:36.031438
-No vulnerabilities found.
-
-
-miaoihan/qulook_flask
-https://github.com/miaoihan/qulook_flask
-Entry file: qulook_flask/qulook.py
-Scanned: 2016-10-20 11:42:36.752748
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: qulook_flask/ENV/lib/python2.7/genericpath.py
-
-rogerpence/Flask-App
-https://github.com/rogerpence/Flask-App
-Entry file: Flask-App/app/__init__.py
-Scanned: 2016-10-20 11:42:44.162963
-No vulnerabilities found.
-
-
-sandmarq/flask_test
-https://github.com/sandmarq/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:42:44.772439
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-barcai/Flask_Megatutorial
-https://github.com/barcai/Flask_Megatutorial
-Entry file: Flask_Megatutorial/app/__init__.py
-Scanned: 2016-10-20 11:42:49.252517
-No vulnerabilities found.
-
-
-kessiacastro/flask-hello
-https://github.com/kessiacastro/flask-hello
-Entry file: flask-hello/hello.py
-Scanned: 2016-10-20 11:42:52.292766
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-renaldopringle/flask_heroku
-https://github.com/renaldopringle/flask_heroku
-Entry file: flask_heroku/app.py
-Scanned: 2016-10-20 11:42:54.921421
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sunhughees/flask-blog
-https://github.com/sunhughees/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:42:56.962399
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-AVandelay/flask_blog
-https://github.com/AVandelay/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:43:02.495338
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-uyoaix/learn-flask
-https://github.com/uyoaix/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:43:03.177321
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-frenos/flask-sample
-https://github.com/frenos/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 11:43:04.704587
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gyonghua/flask-blog
-https://github.com/gyonghua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:43:11.246233
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Zhgong/flask_microblog
-https://github.com/Zhgong/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 11:43:12.764152
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhangcheng/flask-example
-https://github.com/zhangcheng/flask-example
-Entry file: flask-example/main.py
-Scanned: 2016-10-20 11:43:14.324737
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gemimarosier/flask_project
-https://github.com/gemimarosier/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 11:43:15.772340
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gchange/flask_server
-https://github.com/gchange/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-20 11:43:16.300772
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Nickyzj/flask-first
-https://github.com/Nickyzj/flask-first
-Entry file: flask-first/flask-first-notes.py
-Scanned: 2016-10-20 11:43:16.842429
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-propupul/Flask_app
-https://github.com/propupul/Flask_app
-Entry file: Flask_app/test.py
-Scanned: 2016-10-20 11:43:17.352520
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-m18664319351/Blog_Flask
-https://github.com/m18664319351/Blog_Flask
-Entry file: Blog_Flask/app.py
-Scanned: 2016-10-20 11:43:17.978567
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Blog_Flask/lib/python2.7/genericpath.py
-
-testforvln/flask-learning
-https://github.com/testforvln/flask-learning
-Entry file: flask-learning/hello.py
-Scanned: 2016-10-20 11:43:19.308869
-No vulnerabilities found.
-
-
-Unicomcat/flask_test
-https://github.com/Unicomcat/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:43:19.912842
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jidn/flask-obscure
-https://github.com/jidn/flask-obscure
-Entry file: flask-obscure/tests/test_url.py
-Scanned: 2016-10-20 11:43:21.344947
-No vulnerabilities found.
-
-
-cdaidone/small_flask
-https://github.com/cdaidone/small_flask
-Entry file: small_flask/small_flask.py
-Scanned: 2016-10-20 11:43:26.995469
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-morphee31/flask_example
-https://github.com/morphee31/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:43:28.537194
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pedrogaudencio/refunite-flask
-https://github.com/pedrogaudencio/refunite-flask
-Entry file: refunite-flask/app.py
-Scanned: 2016-10-20 11:43:30.546724
-No vulnerabilities found.
-
-
-master105/flask_server
-https://github.com/master105/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-20 11:43:31.095205
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-d3prof3t/flask-intro
-https://github.com/d3prof3t/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:43:31.666811
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zubairah/Flask_App
-https://github.com/zubairah/Flask_App
-Entry file: Flask_App/Flask_App/app.py
-Scanned: 2016-10-20 11:43:34.185234
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shinstev/flask_server
-https://github.com/shinstev/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-20 11:43:35.744813
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vramakin/LearnFlask
-https://github.com/vramakin/LearnFlask
-Entry file: LearnFlask/ex1_URL解析.py
-Scanned: 2016-10-20 11:43:37.274951
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nbeede/docker-flask
-https://github.com/nbeede/docker-flask
-Entry file: docker-flask/app.py
-Scanned: 2016-10-20 11:43:43.697848
-No vulnerabilities found.
-
-
-runningstrawberry/microblog
-https://github.com/runningstrawberry/microblog
-Entry file: None
-Scanned: 2016-10-20 11:43:45.260862
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kolapapa/blog_kola
-https://github.com/kolapapa/blog_kola
-Entry file: blog_kola/db.py
-Scanned: 2016-10-20 11:43:48.939579
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/genericpath.py
-
-B2Crypt/Random-Gamemode-
-https://github.com/B2Crypt/Random-Gamemode-
-Entry file: Random-Gamemode-/FLASK/__init__.py
-Scanned: 2016-10-20 11:43:52.987832
-No vulnerabilities found.
-
-
-Lich2013/learnflask
-https://github.com/Lich2013/learnflask
-Entry file: None
-Scanned: 2016-10-20 11:43:53.524509
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Lich2013/learnflask.
-
-jbisasky/flaskProtoBuffer
-https://github.com/jbisasky/flaskProtoBuffer
-Entry file: flaskProtoBuffer/flaskHello.py
-Scanned: 2016-10-20 11:43:55.207861
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-WangShengguang/FlaskWebDevelopment
-https://github.com/WangShengguang/FlaskWebDevelopment
-Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py
-Scanned: 2016-10-20 11:43:55.742422
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JunliuHub/FlaskWebDevelopment
-https://github.com/JunliuHub/FlaskWebDevelopment
-Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py
-Scanned: 2016-10-20 11:43:57.261239
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adrianomaringolo/py-flask-tuts
-https://github.com/adrianomaringolo/py-flask-tuts
-Entry file: None
-Scanned: 2016-10-20 11:44:02.796365
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rjantos/flask-hello-world
-https://github.com/rjantos/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:44:03.338480
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-ishwarya-iyer/nuage_proj_flask_app
-https://github.com/ishwarya-iyer/nuage_proj_flask_app
-Entry file: nuage_proj_flask_app/app.py
-Scanned: 2016-10-20 11:44:04.882144
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SamirKanaan/PlantillaFlaskREST1
-https://github.com/SamirKanaan/PlantillaFlaskREST1
-Entry file: PlantillaFlaskREST1/plantilla1.py
-Scanned: 2016-10-20 11:44:13.793613
-No vulnerabilities found.
-
-
-remarcbalisi/flask-angular-auth
-https://github.com/remarcbalisi/flask-angular-auth
-Entry file: flask-angular-auth/project/__init__.py
-Scanned: 2016-10-20 11:44:15.100738
-No vulnerabilities found.
-
-
-jarosenb/flask_ionratio_V2
-https://github.com/jarosenb/flask_ionratio_V2
-Entry file: flask_ionratio_V2/hello.py
-Scanned: 2016-10-20 11:44:16.545428
-No vulnerabilities found.
-
-
-themuppet2/flask-hello-world
-https://github.com/themuppet2/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:44:17.112377
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-kindoprec/Flask-SecureHeaders
-https://github.com/kindoprec/Flask-SecureHeaders
-Entry file: Flask-SecureHeaders/tests/core_test.py
-Scanned: 2016-10-20 11:44:18.443412
-No vulnerabilities found.
-
-
-ishwarya-iyer/nuage_flask_app
-https://github.com/ishwarya-iyer/nuage_flask_app
-Entry file: nuage_flask_app/app.py
-Scanned: 2016-10-20 11:44:19.071057
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Christomas/flask_project_skeleton
-https://github.com/Christomas/flask_project_skeleton
-Entry file: flask_project_skeleton/app/__init__.py
-Scanned: 2016-10-20 11:44:20.475278
-No vulnerabilities found.
-
-
-pranavn-cuelogic/flask_video_conference_room
-https://github.com/pranavn-cuelogic/flask_video_conference_room
-Entry file: flask_video_conference_room/video_conf/main.py
-Scanned: 2016-10-20 11:44:20.991214
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-llxxee/A-website-by-Flask
-https://github.com/llxxee/A-website-by-Flask
-Entry file: None
-Scanned: 2016-10-20 11:44:21.508392
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/llxxee/A-website-by-Flask.
-
-micah-cal-sandbox/flask-heroku-sandbox
-https://github.com/micah-cal-sandbox/flask-heroku-sandbox
-Entry file: flask-heroku-sandbox/app.py
-Scanned: 2016-10-20 11:44:22.800189
-No vulnerabilities found.
-
-
-lkpanganiban/flask-rest-example
-https://github.com/lkpanganiban/flask-rest-example
-Entry file: flask-rest-example/app.py
-Scanned: 2016-10-20 11:44:28.224403
-Vulnerability 1:
-File: flask-rest-example/app.py
- > User input at line 48, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flask-rest-example/app.py
- > reaches line 55, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-rodcox89/flask-restful-blueprint-boilerplate
-https://github.com/rodcox89/flask-restful-blueprint-boilerplate
-Entry file: flask-restful-blueprint-boilerplate/main.py
-Scanned: 2016-10-20 11:44:29.900339
-No vulnerabilities found.
-
-
-bellkev/docker-flask-browserify
-https://github.com/bellkev/docker-flask-browserify
-Entry file: docker-flask-browserify/src/python/hello.py
-Scanned: 2016-10-20 11:44:31.367934
-No vulnerabilities found.
-
-
-braddmiller/flask-by-example
-https://github.com/braddmiller/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:44:32.043229
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tych0/flask-demo-app
-https://github.com/tych0/flask-demo-app
-Entry file: flask-demo-app/app.py
-Scanned: 2016-10-20 11:44:35.062633
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-technocake/flask-user-profiles-example
-https://github.com/technocake/flask-user-profiles-example
-Entry file: flask-user-profiles-example/pyhtml.py
-Scanned: 2016-10-20 11:44:37.384821
-No vulnerabilities found.
-
-
-Christomas/i_dev_flask
-https://github.com/Christomas/i_dev_flask
-Entry file: i_dev_flask/app/__init__.py
-Scanned: 2016-10-20 11:44:38.927593
-Vulnerability 1:
-File: i_dev_flask/app/auth/views.py
- > User input at line 121, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: i_dev_flask/app/auth/views.py
- > Line 123: token = options.dump_token('reset_password', user.id)
-File: i_dev_flask/app/auth/views.py
- > reaches line 124, trigger word "url_for(":
- options.send_email(user.email, '重置密码', 'auth/mail/reset_password',user=user, url=url_for('auth.reset_confirm',token=token, _external=True))
-
-Vulnerability 2:
-File: i_dev_flask/app/auth/views.py
- > User input at line 139, trigger word "get(":
- user = models.User.query.get(user_id)
-Reassigned in:
- File: i_dev_flask/app/auth/views.py
- > Line 143: form = forms.ResetPasswordForm(email=user.email)
- File: i_dev_flask/app/auth/views.py
- > Line 147: user.password = form.password.data
- File: i_dev_flask/app/auth/views.py
- > Line 138: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login'))
- File: i_dev_flask/app/auth/views.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.lgoin'))
- File: i_dev_flask/app/auth/views.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login'))
-File: i_dev_flask/app/auth/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('auth/reset_confirm.html',form=form)
-
-
-
-paulsavala/flask_aws_demo
-https://github.com/paulsavala/flask_aws_demo
-Entry file: None
-Scanned: 2016-10-20 11:44:43.475119
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-udpcloud/flask-rest-api
-https://github.com/udpcloud/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-20 11:44:46.043627
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AndersonQ/appengine-flask-contacts-api
-https://github.com/AndersonQ/appengine-flask-contacts-api
-Entry file: appengine-flask-contacts-api/application/__init__.py
-Scanned: 2016-10-20 11:44:51.472941
-No vulnerabilities found.
-
-
-dhiraka/flask_basic_app
-https://github.com/dhiraka/flask_basic_app
-Entry file: flask_basic_app/test_rest_app.py
-Scanned: 2016-10-20 11:44:52.794835
-No vulnerabilities found.
-
-
-aaronja38/assignment10-flask
-https://github.com/aaronja38/assignment10-flask
-Entry file: assignment10-flask/winners.py
-Scanned: 2016-10-20 11:44:54.441241
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: assignment10-flask/env/lib/python2.7/genericpath.py
-
-avikantz/Flask-API-Demo
-https://github.com/avikantz/Flask-API-Demo
-Entry file: Flask-API-Demo/app/__init__.py
-Scanned: 2016-10-20 11:44:57.756482
-No vulnerabilities found.
-
-
-deenaacree/flask_app1
-https://github.com/deenaacree/flask_app1
-Entry file: flask_app1/songsapp.py
-Scanned: 2016-10-20 11:44:58.403494
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_app1/env/lib/python2.7/genericpath.py
-
-AMontalva/flask_hello_world
-https://github.com/AMontalva/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 11:44:58.914686
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AMontalva/flask_hello_world.
-
-xiewenlongs/Flask-CacheOBJ
-https://github.com/xiewenlongs/Flask-CacheOBJ
-Entry file: Flask-CacheOBJ/tests.py
-Scanned: 2016-10-20 11:45:04.652870
-No vulnerabilities found.
-
-
-thefunkjunky/python-flask-boilerplate
-https://github.com/thefunkjunky/python-flask-boilerplate
-Entry file: python-flask-boilerplate/mainapp/__init__.py
-Scanned: 2016-10-20 11:45:06.055657
-No vulnerabilities found.
-
-
-harryoh/flask-rest-api
-https://github.com/harryoh/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-20 11:45:06.585333
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DanBlakeman/flask-deploy-practice
-https://github.com/DanBlakeman/flask-deploy-practice
-Entry file: flask-deploy-practice/src/app.py
-Scanned: 2016-10-20 11:45:12.945361
-No vulnerabilities found.
-
-
-MoxmiNu/flask-mongo-test
-https://github.com/MoxmiNu/flask-mongo-test
-Entry file: flask-mongo-test/provisioning/files/dr-app.py
-Scanned: 2016-10-20 11:45:30.163768
-No vulnerabilities found.
-
-
-medev21/Social-Network---Flask
-https://github.com/medev21/Social-Network---Flask
-Entry file: Social-Network---Flask/app.py
-Scanned: 2016-10-20 11:45:31.738882
-No vulnerabilities found.
-
-
-sealzjh/flask-celery-test
-https://github.com/sealzjh/flask-celery-test
-Entry file: None
-Scanned: 2016-10-20 11:45:32.276707
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sealzjh/flask-celery-test.
-
-Glaun/flask-hello-world
-https://github.com/Glaun/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:45:32.819936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-PushpakPati/flask-by-example
-https://github.com/PushpakPati/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:45:33.505594
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aintmetho/flask
-https://github.com/aintmetho/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:45:35.492073
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-acouderc/flask
-https://github.com/acouderc/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:45:36.077047
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-MapEntryManagement/flask
-https://github.com/MapEntryManagement/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:45:36.647749
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-klen/flask-pw
-https://github.com/klen/flask-pw
-Entry file: flask-pw/tests.py
-Scanned: 2016-10-20 11:45:38.228035
-No vulnerabilities found.
-
-
-KujiraProject/Flask-PAM
-https://github.com/KujiraProject/Flask-PAM
-Entry file: Flask-PAM/example/www.py
-Scanned: 2016-10-20 11:45:39.766944
-No vulnerabilities found.
-
-
-colingorrie/flask-boilerplate
-https://github.com/colingorrie/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 11:45:40.288712
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate.
-
-TwilioDevEd/automated-survey-flask
-https://github.com/TwilioDevEd/automated-survey-flask
-Entry file: automated-survey-flask/automated_survey_flask/__init__.py
-Scanned: 2016-10-20 11:45:45.550497
-No vulnerabilities found.
-
-
-wangxuan007/flasky
-https://github.com/wangxuan007/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:45:46.112520
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lambdaplus/flasko
-https://github.com/lambdaplus/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-20 11:45:46.840921
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py
-
-xiaohu2015/Flasky
-https://github.com/xiaohu2015/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 11:45:47.355217
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yu66s/flaskr
-https://github.com/yu66s/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:45:47.874416
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cwywang/flasky
-https://github.com/cwywang/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:45:48.399399
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gene1wood/flaskoktaapp
-https://github.com/gene1wood/flaskoktaapp
-Entry file: flaskoktaapp/flaskoktaapp/__init__.py
-Scanned: 2016-10-20 11:45:49.945351
-Vulnerability 1:
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > User input at line 201, trigger word "form[":
- url = request.form['RelayState']
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > reaches line 196, trigger word "url_for(":
- url = url_for('user')
-
-Vulnerability 2:
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > User input at line 201, trigger word "form[":
- url = request.form['RelayState']
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > reaches line 204, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url)
-
-
-
-SSUHan/flasktutorial
-https://github.com/SSUHan/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 11:45:50.469065
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ma53192190/flaskwork
-https://github.com/ma53192190/flaskwork
-Entry file: flaskwork/flaskwork.py
-Scanned: 2016-10-20 11:45:51.895729
-No vulnerabilities found.
-
-
-hoobalias/Flaskr
-https://github.com/hoobalias/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 11:45:52.410678
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NapoleonYoung/FlaskWeb
-https://github.com/NapoleonYoung/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 11:45:54.983868
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-zhouyang2640/FlaskInit
-https://github.com/zhouyang2640/FlaskInit
-Entry file: FlaskInit/hello.py
-Scanned: 2016-10-20 11:45:57.416953
-No vulnerabilities found.
-
-
-s3c0nDD/FlaskTutorial
-https://github.com/s3c0nDD/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 11:45:58.937711
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ZaighumRajput/flaskPractice
-https://github.com/ZaighumRajput/flaskPractice
-Entry file: flaskPractice/chapter3/hello.py
-Scanned: 2016-10-20 11:46:00.400868
-No vulnerabilities found.
-
-
-rmotr/flask-api-example
-https://github.com/rmotr/flask-api-example
-Entry file: flask-api-example/api/_04_delete_method.py
-Scanned: 2016-10-20 11:46:06.242501
-No vulnerabilities found.
-
-
-frankpiva/mastering-flask
-https://github.com/frankpiva/mastering-flask
-Entry file: mastering-flask/main.py
-Scanned: 2016-10-20 11:46:13.058826
-No vulnerabilities found.
-
-
-sandmarq/flask_test
-https://github.com/sandmarq/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:46:13.669869
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-barcai/Flask_Megatutorial
-https://github.com/barcai/Flask_Megatutorial
-Entry file: Flask_Megatutorial/app/__init__.py
-Scanned: 2016-10-20 11:46:32.210770
-No vulnerabilities found.
-
-
-kosen10spajam/f-flask
-https://github.com/kosen10spajam/f-flask
-Entry file: f-flask/main.py
-Scanned: 2016-10-20 11:46:33.643798
-Vulnerability 1:
-File: f-flask/main.py
- > User input at line 132, trigger word "get(":
- since = int(request.args.get('since'))
-File: f-flask/main.py
- > reaches line 134, trigger word "execute(":
- sql.execute('SELECT time, animal, message FROM messages WHERE time >= %d' % since)
-
-Vulnerability 2:
-File: f-flask/main.py
- > User input at line 142, trigger word "get(":
- animal = request.values.get('animal')
-File: f-flask/main.py
- > reaches line 146, trigger word "execute(":
- sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message))
-
-Vulnerability 3:
-File: f-flask/main.py
- > User input at line 143, trigger word "get(":
- message = request.values.get('message')
-File: f-flask/main.py
- > reaches line 146, trigger word "execute(":
- sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message))
-
-Vulnerability 4:
-File: f-flask/main.py
- > User input at line 144, trigger word "get(":
- time = int(request.values.get('time'))
-File: f-flask/main.py
- > reaches line 146, trigger word "execute(":
- sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message))
-
-
-
-jjapp/flask-blog
-https://github.com/jjapp/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:46:34.224348
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-engfilipe/curso_flask
-https://github.com/engfilipe/curso_flask
-Entry file: curso_flask/photolog/__init__.py
-Scanned: 2016-10-20 11:46:43.022211
-Vulnerability 1:
-File: curso_flask/photolog/login_view.py
- > User input at line 39, trigger word "get(":
- next_ = request.args.get('next')
-Reassigned in:
- File: curso_flask/photolog/login_view.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect('/index')
- File: curso_flask/photolog/login_view.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Autenticação', form=form)
- File: curso_flask/photolog/login_view.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: curso_flask/photolog/login_view.py
- > reaches line 40, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_ or url_for('lista'))
-
-Vulnerability 2:
-File: curso_flask/photolog/login_view.py
- > User input at line 39, trigger word "get(":
- next_ = request.args.get('next')
-Reassigned in:
- File: curso_flask/photolog/login_view.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect('/index')
- File: curso_flask/photolog/login_view.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Autenticação', form=form)
- File: curso_flask/photolog/login_view.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: curso_flask/photolog/login_view.py
- > reaches line 40, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_ or url_for('lista'))
-
-
-
-zhang-zhang/learning-flask
-https://github.com/zhang-zhang/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 11:46:43.674059
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mihai011/flask_server
-https://github.com/mihai011/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-20 11:46:44.184170
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-morganvdavis/boilerplate-flask
-https://github.com/morganvdavis/boilerplate-flask
-Entry file: None
-Scanned: 2016-10-20 11:46:44.693651
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/morganvdavis/boilerplate-flask.
-
-jwg4/flask_converter
-https://github.com/jwg4/flask_converter
-Entry file: flask_converter/examples/app_with_constructor.py
-Scanned: 2016-10-20 11:46:46.156503
-No vulnerabilities found.
-
-
-AVandelay/flask_blog
-https://github.com/AVandelay/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:46:46.688693
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Davidthecoolsmartguy/weasyprint-Flask
-https://github.com/Davidthecoolsmartguy/weasyprint-Flask
-Entry file: weasyprint-Flask/app.py
-Scanned: 2016-10-20 11:46:47.998172
-No vulnerabilities found.
-
-
-rajdeepd/flask-helloworld
-https://github.com/rajdeepd/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-20 11:46:55.613529
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-helloworld/venv/lib/python2.7/genericpath.py
-
-honeeWong/Flask-Blog
-https://github.com/honeeWong/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 11:46:56.590231
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-frenos/flask-sample
-https://github.com/frenos/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 11:46:57.114142
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lockie/flask_ldap
-https://github.com/lockie/flask_ldap
-Entry file: flask_ldap/index.py
-Scanned: 2016-10-20 11:46:58.501002
-Vulnerability 1:
-File: flask_ldap/index.py
- > User input at line 28, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask_ldap/index.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask_ldap/index.py
- > reaches line 29, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-Vulnerability 2:
-File: flask_ldap/index.py
- > User input at line 28, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask_ldap/index.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask_ldap/index.py
- > reaches line 29, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-
-
-AndreyBalandin/flask-test
-https://github.com/AndreyBalandin/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:46:59.034904
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-kessiacastro/imdb-flask
-https://github.com/kessiacastro/imdb-flask
-Entry file: imdb-flask/app.py
-Scanned: 2016-10-20 11:47:06.609505
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-Y-Rookie/flask_blog
-https://github.com/Y-Rookie/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:47:07.757330
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lizmeister321/flask_practice
-https://github.com/lizmeister321/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 11:47:08.286756
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AmI-2016/python-Flask
-https://github.com/AmI-2016/python-Flask
-Entry file: python-Flask/PYTHON_FLASK/friends/server.py
-Scanned: 2016-10-20 11:47:08.883472
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py
-
-phillip-hopper/flask-test
-https://github.com/phillip-hopper/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:47:09.409155
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-thewhitedingo/MenuFlask
-https://github.com/thewhitedingo/MenuFlask
-Entry file: MenuFlask/flaskserver.py
-Scanned: 2016-10-20 11:47:11.453803
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-anazard/zardify_flask
-https://github.com/anazard/zardify_flask
-Entry file: zardify_flask/main/__init__.py
-Scanned: 2016-10-20 11:47:19.599543
-No vulnerabilities found.
-
-
-anazard/flask_project
-https://github.com/anazard/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 11:47:20.411781
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-buckeye76guy/learning-flask
-https://github.com/buckeye76guy/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 11:47:20.989097
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wkqzxh/flask_leaklib
-https://github.com/wkqzxh/flask_leaklib
-Entry file: flask_leaklib/flask_leaklib/leaklib_app/__init__.py
-Scanned: 2016-10-20 11:47:22.441753
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brightforme/flask-sqlalchemy
-https://github.com/brightforme/flask-sqlalchemy
-Entry file: flask-sqlalchemy/run.py
-Scanned: 2016-10-20 11:47:23.449132
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pedrogaudencio/refunite-flask
-https://github.com/pedrogaudencio/refunite-flask
-Entry file: refunite-flask/app.py
-Scanned: 2016-10-20 11:47:33.447613
-No vulnerabilities found.
-
-
-holmandw/flask-arduino
-https://github.com/holmandw/flask-arduino
-Entry file: flask-arduino/app/__init__.py
-Scanned: 2016-10-20 11:47:35.395762
-No vulnerabilities found.
-
-
-zenyui/flask-test
-https://github.com/zenyui/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:47:35.957299
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-vobine/JobFlask
-https://github.com/vobine/JobFlask
-Entry file: None
-Scanned: 2016-10-20 11:47:37.594739
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vobine/JobFlask.
-
-Lobster1991/learn_flask
-https://github.com/Lobster1991/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:47:44.119361
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SarahJaine/flask-tutorial
-https://github.com/SarahJaine/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:47:44.626875
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vatseek/flask_lessons
-https://github.com/vatseek/flask_lessons
-Entry file: flask_lessons/app/__init__.py
-Scanned: 2016-10-20 11:47:46.064443
-No vulnerabilities found.
-
-
-Michael-F-Bryan/flask_template
-https://github.com/Michael-F-Bryan/flask_template
-Entry file: None
-Scanned: 2016-10-20 11:47:46.585388
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Michael-F-Bryan/flask_template.
-
-ol3j/azureday-flask
-https://github.com/ol3j/azureday-flask
-Entry file: azureday-flask/FlaskWebProject/__init__.py
-Scanned: 2016-10-20 11:47:49.945825
-Vulnerability 1:
-File: azureday-flask/FlaskWebProject/views.py
- > User input at line 57, trigger word "form[":
- mobile = request.form['yourmobile']
-Reassigned in:
- File: azureday-flask/FlaskWebProject/views.py
- > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename
- File: azureday-flask/FlaskWebProject/views.py
- > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename)
-File: azureday-flask/FlaskWebProject/views.py
- > reaches line 86, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric)
-
-Vulnerability 2:
-File: azureday-flask/FlaskWebProject/views.py
- > User input at line 58, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: azureday-flask/FlaskWebProject/views.py
- > Line 59: basename = file.filename
- File: azureday-flask/FlaskWebProject/views.py
- > Line 61: filename = '_'.join([suffix, basename])
- File: azureday-flask/FlaskWebProject/views.py
- > Line 68: url = blob_service.make_blob_url(https://github.com/container_name='images',%20blob_name=filename)
- File: azureday-flask/FlaskWebProject/views.py
- > Line 72: body = json.dumps('suffix''image'str(suffix)str(url))
- File: azureday-flask/FlaskWebProject/views.py
- > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename
- File: azureday-flask/FlaskWebProject/views.py
- > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename)
-File: azureday-flask/FlaskWebProject/views.py
- > reaches line 86, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric)
-
-
-
-runningstrawberry/microblog
-https://github.com/runningstrawberry/microblog
-Entry file: None
-Scanned: 2016-10-20 11:47:50.468265
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ShivamMahajan/my_first_flask_project
-https://github.com/ShivamMahajan/my_first_flask_project
-Entry file: my_first_flask_project/hello.py
-Scanned: 2016-10-20 11:48:04.411840
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_first_flask_project/venv/lib/python2.7/genericpath.py
-
-sakib3/flask_Cartridge_openshift
-https://github.com/sakib3/flask_Cartridge_openshift
-Entry file: flask_Cartridge_openshift/flaskapp.py
-Scanned: 2016-10-20 11:48:05.745820
-No vulnerabilities found.
-
-
-AdamHumphrey/housing2016flask
-https://github.com/AdamHumphrey/housing2016flask
-Entry file: None
-Scanned: 2016-10-20 11:48:07.590194
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AdamHumphrey/housing2016flask.
-
-sakib3/flask_cartridge_Heroku
-https://github.com/sakib3/flask_cartridge_Heroku
-Entry file: flask_cartridge_Heroku/app.py
-Scanned: 2016-10-20 11:48:08.896464
-No vulnerabilities found.
-
-
-gclabon/Twilio-Flask-CSV
-https://github.com/gclabon/Twilio-Flask-CSV
-Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py
-Scanned: 2016-10-20 11:48:10.343014
-No vulnerabilities found.
-
-
-mfyock/flask_hello_world
-https://github.com/mfyock/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 11:48:10.874759
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mfyock/flask_hello_world.
-
-SamirKanaan/PlantillaFlaskREST2
-https://github.com/SamirKanaan/PlantillaFlaskREST2
-Entry file: PlantillaFlaskREST2/inicia.py
-Scanned: 2016-10-20 11:48:12.311389
-No vulnerabilities found.
-
-
-3130000547/musicbox-base-on-flask
-https://github.com/3130000547/musicbox-base-on-flask
-Entry file: musicbox-base-on-flask/musicbox.py
-Scanned: 2016-10-20 11:48:13.860956
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AjithPanneerselvam/my_flask_project
-https://github.com/AjithPanneerselvam/my_flask_project
-Entry file: my_flask_project/project.py
-Scanned: 2016-10-20 11:48:15.281538
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pravinthsam/MnistFlaskKeras
-https://github.com/pravinthsam/MnistFlaskKeras
-Entry file: MnistFlaskKeras/flaskserver.py
-Scanned: 2016-10-20 11:48:16.699129
-No vulnerabilities found.
-
-
-rfmapp/flask-by-example
-https://github.com/rfmapp/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 11:48:17.384554
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-macloo/flask_project1
-https://github.com/macloo/flask_project1
-Entry file: flask_project1/winners_BAK.py
-Scanned: 2016-10-20 11:48:18.797894
-No vulnerabilities found.
-
-
-dschuler36/SimpleFlaskBlog
-https://github.com/dschuler36/SimpleFlaskBlog
-Entry file: SimpleFlaskBlog/main.py
-Scanned: 2016-10-20 11:48:27.960722
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-avikantz/Flask-API-Demo
-https://github.com/avikantz/Flask-API-Demo
-Entry file: Flask-API-Demo/app/__init__.py
-Scanned: 2016-10-20 11:48:30.248494
-No vulnerabilities found.
-
-
-dengjonathan/flask_first_project
-https://github.com/dengjonathan/flask_first_project
-Entry file: flask_first_project/final_project.py
-Scanned: 2016-10-20 11:48:34.038717
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-boyombo/asterisk-pycall-flask
-https://github.com/boyombo/asterisk-pycall-flask
-Entry file: asterisk-pycall-flask/calldemo/app.py
-Scanned: 2016-10-20 11:48:35.436761
-No vulnerabilities found.
-
-
-kaslemr/sample_flask_project
-https://github.com/kaslemr/sample_flask_project
-Entry file: sample_flask_project/app2.py
-Scanned: 2016-10-20 11:48:36.919097
-Vulnerability 1:
-File: sample_flask_project/app.py
- > User input at line 81, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: sample_flask_project/app.py
- > reaches line 88, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201)
-
-Vulnerability 2:
-File: sample_flask_project/app2.py
- > User input at line 129, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: sample_flask_project/app2.py
- > Line 135: user = User(username=username)
-File: sample_flask_project/app2.py
- > reaches line 139, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: sample_flask_project/app2.py
- > User input at line 129, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: sample_flask_project/app2.py
- > Line 135: user = User(username=username)
-File: sample_flask_project/app2.py
- > reaches line 139, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 4:
-File: sample_flask_project/app2.py
- > User input at line 145, trigger word "get(":
- user = User.query.get(id)
-File: sample_flask_project/app2.py
- > reaches line 148, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username)
-
-
-
-mapingfan/Flask-Mail-Test
-https://github.com/mapingfan/Flask-Mail-Test
-Entry file: Flask-Mail-Test/Mail-Test.py
-Scanned: 2016-10-20 11:48:39.306433
-No vulnerabilities found.
-
-
-4Catalyzer/flask-resty-tenants
-https://github.com/4Catalyzer/flask-resty-tenants
-Entry file: flask-resty-tenants/tests/conftest.py
-Scanned: 2016-10-20 11:48:40.977661
-No vulnerabilities found.
-
-
-lucaswadedavis/iguanodon
-https://github.com/lucaswadedavis/iguanodon
-Entry file: iguanodon/server.py
-Scanned: 2016-10-20 11:48:43.165765
-No vulnerabilities found.
-
-
-ederavilaprado/paas-app-example-python-flask
-https://github.com/ederavilaprado/paas-app-example-python-flask
-Entry file: paas-app-example-python-flask/app.py
-Scanned: 2016-10-20 11:48:45.958243
-No vulnerabilities found.
-
-
-afh/yabab
-https://github.com/afh/yabab
-Entry file: yabab/yabab/__init__.py
-Scanned: 2016-10-20 11:48:47.848623
-No vulnerabilities found.
-
-
-Michael-F-Bryan/mfb_website
-https://github.com/Michael-F-Bryan/mfb_website
-Entry file: mfb_website/app/__init__.py
-Scanned: 2016-10-20 11:48:49.271442
-No vulnerabilities found.
-
-
-Yelloworking/SlackWebservice
-https://github.com/Yelloworking/SlackWebservice
-Entry file: None
-Scanned: 2016-10-20 11:48:51.543547
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Yelloworking/SlackWebservice.
-
-TrailBlazerZ/imgaptcha--api
-https://github.com/TrailBlazerZ/imgaptcha--api
-Entry file: imgaptcha--api/app.py
-Scanned: 2016-10-20 11:48:54.286516
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NSBum/AnkiStatsServer
-https://github.com/NSBum/AnkiStatsServer
-Entry file: AnkiStatsServer/app.py
-Scanned: 2016-10-20 11:48:58.241346
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yobuntu/laboratory
-https://github.com/yobuntu/laboratory
-Entry file: laboratory/laboratory/fooflask.py
-Scanned: 2016-10-20 11:49:06.663150
-Vulnerability 1:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 5, trigger word "get(":
- response = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 5, trigger word "url_for(":
- response = client.get(url_for('hello'))
-
-Vulnerability 2:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 11, trigger word "get(":
- r = client.get(url_for('add',name='test'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 11, trigger word "url_for(":
- r = client.get(url_for('add',name='test'))
-
-Vulnerability 3:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 12, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 11, trigger word "url_for(":
- r = client.get(url_for('add',name='test'))
-
-Vulnerability 4:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 11, trigger word "get(":
- r = client.get(url_for('add',name='test'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 12, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 5:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 12, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 12, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 6:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 19, trigger word "get(":
- response = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 19, trigger word "url_for(":
- response = client.get(url_for('hello'))
-
-Vulnerability 7:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 26, trigger word "get(":
- r = client.get(url_for('add',name='test0'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 26, trigger word "url_for(":
- r = client.get(url_for('add',name='test0'))
-
-Vulnerability 8:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 27, trigger word "get(":
- r = client.get(url_for('add',name='test1'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 26, trigger word "url_for(":
- r = client.get(url_for('add',name='test0'))
-
-Vulnerability 9:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 28, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 26, trigger word "url_for(":
- r = client.get(url_for('add',name='test0'))
-
-Vulnerability 10:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 26, trigger word "get(":
- r = client.get(url_for('add',name='test0'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 27, trigger word "url_for(":
- r = client.get(url_for('add',name='test1'))
-
-Vulnerability 11:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 27, trigger word "get(":
- r = client.get(url_for('add',name='test1'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 27, trigger word "url_for(":
- r = client.get(url_for('add',name='test1'))
-
-Vulnerability 12:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 28, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 27, trigger word "url_for(":
- r = client.get(url_for('add',name='test1'))
-
-Vulnerability 13:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 26, trigger word "get(":
- r = client.get(url_for('add',name='test0'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 28, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 14:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 27, trigger word "get(":
- r = client.get(url_for('add',name='test1'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 28, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 15:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 28, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 28, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 16:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 36, trigger word "get(":
- response = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 36, trigger word "url_for(":
- response = client.get(url_for('hello'))
-
-
-
-hkalexling/Twitter-Like-Count
-https://github.com/hkalexling/Twitter-Like-Count
-Entry file: Twitter-Like-Count/__init__.py
-Scanned: 2016-10-20 11:49:08.474805
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ljxxcaijing/flask
-https://github.com/ljxxcaijing/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:49:10.393134
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-migrateup/flaskr
-https://github.com/migrateup/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:49:10.901974
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PacktPublishing/Mastering-Flask
-https://github.com/PacktPublishing/Mastering-Flask
-Entry file: Mastering-Flask/Chapter 4_Code/chapter_4/main.py
-Scanned: 2016-10-20 11:49:14.729167
-No vulnerabilities found.
-
-
-reparadocs/Flask-HelloWorldBot
-https://github.com/reparadocs/Flask-HelloWorldBot
-Entry file: Flask-HelloWorldBot/HelloWorldBot.py
-Scanned: 2016-10-20 11:49:16.060135
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-singingwolfboy/flask-sse
-https://github.com/singingwolfboy/flask-sse
-Entry file: flask-sse/tests/conftest.py
-Scanned: 2016-10-20 11:49:17.573778
-No vulnerabilities found.
-
-
-pankajpant22/flask
-https://github.com/pankajpant22/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:49:18.168127
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-underdogio/flask-graylog
-https://github.com/underdogio/flask-graylog
-Entry file: flask-graylog/example/app.py
-Scanned: 2016-10-20 11:49:19.465636
-No vulnerabilities found.
-
-
-adyouri/flask-basics
-https://github.com/adyouri/flask-basics
-Entry file: flask-basics/hello.py
-Scanned: 2016-10-20 11:49:20.011116
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KujiraProject/Flask-PAM
-https://github.com/KujiraProject/Flask-PAM
-Entry file: Flask-PAM/example/www.py
-Scanned: 2016-10-20 11:49:21.549470
-No vulnerabilities found.
-
-
-gucxufangling/flask--
-https://github.com/gucxufangling/flask--
-Entry file: flask--/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 11:49:37.592631
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TwilioDevEd/automated-survey-flask
-https://github.com/TwilioDevEd/automated-survey-flask
-Entry file: automated-survey-flask/automated_survey_flask/__init__.py
-Scanned: 2016-10-20 11:49:42.810311
-No vulnerabilities found.
-
-
-pragmaticcoders/flask-react-seed
-https://github.com/pragmaticcoders/flask-react-seed
-Entry file: None
-Scanned: 2016-10-20 11:49:44.355024
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed.
-
-jinxiaoyuan/flaskr
-https://github.com/jinxiaoyuan/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:49:44.865187
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fkirwin/flaskhelloworld
-https://github.com/fkirwin/flaskhelloworld
-Entry file: flaskhelloworld/hello_world.py
-Scanned: 2016-10-20 11:49:51.600904
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wang7lu6qiang5/flasky
-https://github.com/wang7lu6qiang5/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:49:52.106237
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ak042/flasktaskr
-https://github.com/ak042/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:49:52.619167
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ailtoncsf/flasklearn
-https://github.com/ailtoncsf/flasklearn
-Entry file: flasklearn/flask-basics/app.py
-Scanned: 2016-10-20 11:50:02.026335
-No vulnerabilities found.
-
-
-VimDong/flaskme
-https://github.com/VimDong/flaskme
-Entry file: flaskme/app/__init__.py
-Scanned: 2016-10-20 11:50:03.794710
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-annoys-parrot/flaskbook
-https://github.com/annoys-parrot/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 11:50:04.342924
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-axavio/flasky
-https://github.com/axavio/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:50:04.869110
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-danil3d/flaskblog
-https://github.com/danil3d/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 11:50:05.632994
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-wanghaa/flasky
-https://github.com/wanghaa/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:50:06.144498
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-omshankar1/flaskapp
-https://github.com/omshankar1/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:50:06.648732
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/omshankar1/flaskapp.
-
-maxwang051/flasktaskr
-https://github.com/maxwang051/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:50:07.147439
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-NapoleonYoung/FlaskWeb
-https://github.com/NapoleonYoung/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 11:50:07.720508
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-joanna-solomiewicz/FlaskWorkshop
-https://github.com/joanna-solomiewicz/FlaskWorkshop
-Entry file: FlaskWorkshop/app.py
-Scanned: 2016-10-20 11:50:14.481640
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWorkshop/venv/lib/python3.5/struct.py
-
-rmGuarachi/flaskTutorial
-https://github.com/rmGuarachi/flaskTutorial
-Entry file: flaskTutorial/flaskr.py
-Scanned: 2016-10-20 11:50:15.102868
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTutorial/venv/lib/python2.7/genericpath.py
-
-mion00/flaskSQLAlchemy
-https://github.com/mion00/flaskSQLAlchemy
-Entry file: flaskSQLAlchemy/app.py
-Scanned: 2016-10-20 11:50:16.875812
-Vulnerability 1:
-File: flaskSQLAlchemy/app.py
- > User input at line 32, trigger word "get(":
- service = request.args.get('service')
-File: flaskSQLAlchemy/app.py
- > reaches line 34, trigger word "filter(":
- users = User.query.filter(User.json.has_key(service)).all()
-
-
-
-GriMel/FlaskFirst
-https://github.com/GriMel/FlaskFirst
-Entry file: FlaskFirst/app/__init__.py
-Scanned: 2016-10-20 11:50:18.198775
-No vulnerabilities found.
-
-
-Pazoles/Geocoder
-https://github.com/Pazoles/Geocoder
-Entry file: Geocoder/app.py
-Scanned: 2016-10-20 11:50:25.371265
-No vulnerabilities found.
-
-
-NixonInnes/Flask-Blueprints
-https://github.com/NixonInnes/Flask-Blueprints
-Entry file: Flask-Blueprints/app/__init__.py
-Scanned: 2016-10-20 11:50:27.986451
-No vulnerabilities found.
-
-
-isichkodmitry/flask-caesar
-https://github.com/isichkodmitry/flask-caesar
-Entry file: flask-caesar/app/__init__.py
-Scanned: 2016-10-20 11:50:29.582582
-No vulnerabilities found.
-
-
-zhang-zhang/learning-flask
-https://github.com/zhang-zhang/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 11:50:30.174261
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tyrelsouza/flask_vagrant
-https://github.com/tyrelsouza/flask_vagrant
-Entry file: flask_vagrant/code/src/app.py
-Scanned: 2016-10-20 11:50:31.750130
-No vulnerabilities found.
-
-
-SShayashi/flask-test
-https://github.com/SShayashi/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:50:32.335556
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-ak042/flask-blog
-https://github.com/ak042/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:50:32.886171
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-and3rson/flask-testsite
-https://github.com/and3rson/flask-testsite
-Entry file: flask-testsite/app.py
-Scanned: 2016-10-20 11:50:34.171562
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-spring3th/flask-blogdemo
-https://github.com/spring3th/flask-blogdemo
-Entry file: flask-blogdemo/app/__init__.py
-Scanned: 2016-10-20 11:50:36.544923
-Vulnerability 1:
-File: flask-blogdemo/app/main/views.py
- > User input at line 27, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 35: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_POSTS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 38: posts = pagination.items
- File: flask-blogdemo/app/main/views.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask-blogdemo/app/main/views.py
- > User input at line 30, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 28: show_followed = False
- File: flask-blogdemo/app/main/views.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask-blogdemo/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 45: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['SIKA_USERS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 46: alluser = pagination.items
-File: flask-blogdemo/app/main/views.py
- > reaches line 47, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('alluser.html',alluser=alluser, pagination=pagination, page=page)
-
-Vulnerability 4:
-File: flask-blogdemo/app/main/views.py
- > User input at line 106, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 108: page = post.comments.count() - 1 // current_app.config['SIKA_COMMENTS_PER_PAGE'] + 1
- File: flask-blogdemo/app/main/views.py
- > Line 110: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 111: comments = pagination.items
- File: flask-blogdemo/app/main/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask-blogdemo/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask-blogdemo/app/main/views.py
- > User input at line 184, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 185: pagination = user.followers.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 188: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-blogdemo/app/main/views.py
- > Line 183: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 190, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask-blogdemo/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 202: pagination = user.followed.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 205: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-blogdemo/app/main/views.py
- > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask-blogdemo/app/main/views.py
- > User input at line 230, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 231: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 232: comments = pagination.items
-File: flask-blogdemo/app/main/views.py
- > reaches line 233, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-syniuhin/storyteller-flask
-https://github.com/syniuhin/storyteller-flask
-Entry file: storyteller-flask/app/__init__.py
-Scanned: 2016-10-20 11:50:38.700123
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arushijain/flask_tutorial
-https://github.com/arushijain/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 11:50:39.276000
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-iooop/flask-blog
-https://github.com/iooop/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:50:43.827708
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-AndreyBalandin/flask-test
-https://github.com/AndreyBalandin/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:50:45.357784
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-mastershao/lening-flask
-https://github.com/mastershao/lening-flask
-Entry file: None
-Scanned: 2016-10-20 11:50:53.274447
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask.
-
-markchodges/mastering-flask
-https://github.com/markchodges/mastering-flask
-Entry file: mastering-flask/webapp/__init__.py
-Scanned: 2016-10-20 11:51:00.407518
-Vulnerability 1:
-File: mastering-flask/webapp/controllers/blog.py
- > User input at line 71, trigger word ".data":
- filename = secure_filename(form.photo.data.filename)
-Reassigned in:
- File: mastering-flask/webapp/controllers/blog.py
- > Line 74: filename = None
-File: mastering-flask/webapp/controllers/blog.py
- > reaches line 75, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('upload.html',form=form, filename=filename)
-
-
-
-keeleys/flask_RESTful
-https://github.com/keeleys/flask_RESTful
-Entry file: flask_RESTful/api/__init__.py
-Scanned: 2016-10-20 11:51:01.740495
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AmI-2016/python-Flask
-https://github.com/AmI-2016/python-Flask
-Entry file: python-Flask/PYTHON_FLASK/friends/server.py
-Scanned: 2016-10-20 11:51:04.794935
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py
-
-SorenPeterson/flask-intro
-https://github.com/SorenPeterson/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:51:05.341200
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-an5rag/flask-tutorial
-https://github.com/an5rag/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:51:05.845480
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sugarguo/Flask_Blog
-https://github.com/sugarguo/Flask_Blog
-Entry file: Flask_Blog/Blog/blog.py
-Scanned: 2016-10-20 11:51:08.011946
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andresgariglio/poc-flask
-https://github.com/andresgariglio/poc-flask
-Entry file: poc-flask/poc-flask/flask_rest_service/__init__.py
-Scanned: 2016-10-20 11:51:09.317331
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Datamine/PokerTexter
-https://github.com/Datamine/PokerTexter
-Entry file: PokerTexter/run-pokertexter.py
-Scanned: 2016-10-20 11:51:11.588921
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stuncyilmaz/flask_init
-https://github.com/stuncyilmaz/flask_init
-Entry file: None
-Scanned: 2016-10-20 11:51:12.093597
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/stuncyilmaz/flask_init.
-
-mrpatiwi/flask-starter
-https://github.com/mrpatiwi/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 11:51:15.601579
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jmccutchan/raspi_flask
-https://github.com/jmccutchan/raspi_flask
-Entry file: raspi_flask/app.py
-Scanned: 2016-10-20 11:51:23.503423
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-priyankt68/flask_example
-https://github.com/priyankt68/flask_example
-Entry file: None
-Scanned: 2016-10-20 11:51:23.995704
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zeratullich/flask_maizi
-https://github.com/zeratullich/flask_maizi
-Entry file: flask_maizi/app/__init__.py
-Scanned: 2016-10-20 11:51:29.742515
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mtimebombm/python-flask
-https://github.com/mtimebombm/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 11:51:30.258566
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Lobster1991/learn_flask
-https://github.com/Lobster1991/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:51:30.767375
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JessyHurbain/Flask_test
-https://github.com/JessyHurbain/Flask_test
-Entry file: Flask_test/coucou.py
-Scanned: 2016-10-20 11:51:32.104940
-No vulnerabilities found.
-
-
-achinnac/microblog-flask
-https://github.com/achinnac/microblog-flask
-Entry file: None
-Scanned: 2016-10-20 11:51:32.639952
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jpirih/Flask-Blog
-https://github.com/jpirih/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 11:51:33.178510
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhaokefei/web_flask
-https://github.com/zhaokefei/web_flask
-Entry file: web_flask/app/__init__.py
-Scanned: 2016-10-20 11:51:35.543871
-Vulnerability 1:
-File: web_flask/app/main/views.py
- > User input at line 24, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: web_flask/app/main/views.py
- > Line 25: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: web_flask/app/main/views.py
- > Line 28: posts = pagination.items
- File: web_flask/app/main/views.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: web_flask/app/main/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-
-
-BaichuanWu/Blog_flask
-https://github.com/BaichuanWu/Blog_flask
-Entry file: Blog_flask/flaskpractise.py
-Scanned: 2016-10-20 11:51:36.843515
-No vulnerabilities found.
-
-
-sreyemnayr/jss-flask
-https://github.com/sreyemnayr/jss-flask
-Entry file: jss-flask/jss-flask.py
-Scanned: 2016-10-20 11:51:38.146292
-No vulnerabilities found.
-
-
-hectorip/TinyFlaskExperiment
-https://github.com/hectorip/TinyFlaskExperiment
-Entry file: TinyFlaskExperiment/hello.py
-Scanned: 2016-10-20 11:51:39.420072
-No vulnerabilities found.
-
-
-WhiteShirts/windowsflask
-https://github.com/WhiteShirts/windowsflask
-Entry file: windowsflask/flasky/app/__init__.py
-Scanned: 2016-10-20 11:51:42.313259
-Vulnerability 1:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 27, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 37: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 40: posts = pagination.items
- File: windowsflask/flasky/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 32, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 30: show_followed = False
- File: windowsflask/flasky/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 67, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 68: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 71: posts = pagination.items
-File: windowsflask/flasky/app/main/views.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 135, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 137: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: windowsflask/flasky/app/main/views.py
- > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 142: comments = pagination.items
- File: windowsflask/flasky/app/main/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 143, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: windowsflask/flasky/app/main/views.py
- > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 217, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 218: pagination = user.followed.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 221: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: windowsflask/flasky/app/main/views.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 223, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 231, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 235: comments = pagination.items
-File: windowsflask/flasky/app/main/views.py
- > reaches line 236, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: windowsflask/flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: windowsflask/flasky/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: windowsflask/flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: windowsflask/flasky/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: windowsflask/flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: windowsflask/flasky/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-ptomelle/appflask
-https://github.com/ptomelle/appflask
-Entry file: appflask/wsgi/myflaskapp.py
-Scanned: 2016-10-20 11:51:44.270870
-No vulnerabilities found.
-
-
-globocom/gbix
-https://github.com/globocom/gbix
-Entry file: gbix/src/server_jsonrpc.py
-Scanned: 2016-10-20 11:51:45.691916
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-martinpeck/bedlam-slack
-https://github.com/martinpeck/bedlam-slack
-Entry file: bedlam-slack/bedlam_slack/__init__.py
-Scanned: 2016-10-20 11:51:47.202666
-Vulnerability 1:
-File: bedlam-slack/bedlam_slack/ud.py
- > User input at line 11, trigger word "get(":
- phrase = parse.quote_plus(request.values.get('text').strip())
-Reassigned in:
- File: bedlam-slack/bedlam_slack/ud.py
- > Line 13: response = 'response_type''text''unfurl_links''in_channel''http://www.urbandictionary.com/define.php?term=' + phrase'true'
-File: bedlam-slack/bedlam_slack/ud.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-kud-i/FlaskRestAPI
-https://github.com/kud-i/FlaskRestAPI
-Entry file: FlaskRestAPI/REST_API.py
-Scanned: 2016-10-20 11:51:48.502881
-Vulnerability 1:
-File: FlaskRestAPI/REST_API.py
- > User input at line 75, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: FlaskRestAPI/REST_API.py
- > reaches line 82, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-kriesbeck/flask_heroku_practice
-https://github.com/kriesbeck/flask_heroku_practice
-Entry file: flask_heroku_practice/app/__init__.py
-Scanned: 2016-10-20 11:51:55.879031
-No vulnerabilities found.
-
-
-opendatakosovo/flask-app-framework
-https://github.com/opendatakosovo/flask-app-framework
-Entry file: flask-app-framework/app/__init__.py
-Scanned: 2016-10-20 11:52:02.316292
-No vulnerabilities found.
-
-
-ZAGJAB/Flask_OAuth2
-https://github.com/ZAGJAB/Flask_OAuth2
-Entry file: Flask_OAuth2/app.py
-Scanned: 2016-10-20 11:52:04.656150
-Vulnerability 1:
-File: Flask_OAuth2/app.py
- > User input at line 75, trigger word "get(":
- code = request.args.get('code')
-Reassigned in:
- File: Flask_OAuth2/app.py
- > Line 76: uri = 'http://localhost:5000/oauth?response_type=%s&client_id=%s&redirect_uri=%s' % (code, client_id, redirect_uri)
-File: Flask_OAuth2/app.py
- > reaches line 77, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(uri)
-
-
-
-k-funk/flask-bower-bootstrap-compass
-https://github.com/k-funk/flask-bower-bootstrap-compass
-Entry file: flask-bower-bootstrap-compass/app_name/__init__.py
-Scanned: 2016-10-20 11:52:05.939330
-No vulnerabilities found.
-
-
-cbeasley92/Flask-REST-API-Testing
-https://github.com/cbeasley92/Flask-REST-API-Testing
-Entry file: Flask-REST-API-Testing/rest_api.py
-Scanned: 2016-10-20 11:52:07.371735
-Vulnerability 1:
-File: Flask-REST-API-Testing/rest_api.py
- > User input at line 88, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: Flask-REST-API-Testing/rest_api.py
- > reaches line 95, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-cruor99/heartbeat-flask-app
-https://github.com/cruor99/heartbeat-flask-app
-Entry file: heartbeat-flask-app/flaskheartbeat/__init__.py
-Scanned: 2016-10-20 11:52:09.812045
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sakib3/flask_cartridge_Heroku
-https://github.com/sakib3/flask_cartridge_Heroku
-Entry file: flask_cartridge_Heroku/app.py
-Scanned: 2016-10-20 11:52:11.073371
-No vulnerabilities found.
-
-
-SamirKanaan/PlantillaFlaskREST3
-https://github.com/SamirKanaan/PlantillaFlaskREST3
-Entry file: PlantillaFlaskREST3/inicia.py
-Scanned: 2016-10-20 11:52:12.472564
-No vulnerabilities found.
-
-
-zelinlee0303/python-flask-mysql
-https://github.com/zelinlee0303/python-flask-mysql
-Entry file: python-flask-mysql/app/__init__.py
-Scanned: 2016-10-20 11:52:14.279039
-Vulnerability 1:
-File: python-flask-mysql/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 26: posts = pagination.items
- File: python-flask-mysql/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: python-flask-mysql/app/main/views.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 42: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 45: posts = pagination.items
- File: python-flask-mysql/app/main/views.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 46, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('mindtrace.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 3:
-File: python-flask-mysql/app/main/views.py
- > User input at line 118, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 119: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 122: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: python-flask-mysql/app/main/views.py
- > Line 117: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 124, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='被', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: python-flask-mysql/app/main/views.py
- > User input at line 135, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 136: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 139: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: python-flask-mysql/app/main/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: python-flask-mysql/app/main/views.py
- > User input at line 154, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 155: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 158: posts = pagination.items
-File: python-flask-mysql/app/main/views.py
- > reaches line 159, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-mapingfan/Flask-Web-Dev
-https://github.com/mapingfan/Flask-Web-Dev
-Entry file: Flask-Web-Dev/app.py
-Scanned: 2016-10-20 11:52:20.515317
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gclabon/Twilio-Flask-CSV
-https://github.com/gclabon/Twilio-Flask-CSV
-Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py
-Scanned: 2016-10-20 11:52:22.078796
-No vulnerabilities found.
-
-
-ak042/flask-hello-world
-https://github.com/ak042/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 11:52:22.643328
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-king100/Flask-Hello-World-
-https://github.com/king100/Flask-Hello-World-
-Entry file: Flask-Hello-World-/app.py
-Scanned: 2016-10-20 11:52:30.382493
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Hello-World-/flask/lib/python2.7/genericpath.py
-
-MMohan1/Flask_with_celery
-https://github.com/MMohan1/Flask_with_celery
-Entry file: Flask_with_celery/flask_app/edge/__init__.py
-Scanned: 2016-10-20 11:52:31.912291
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jhelgren/flask_movie_reviews
-https://github.com/jhelgren/flask_movie_reviews
-Entry file: flask_movie_reviews/server.py
-Scanned: 2016-10-20 11:52:33.220884
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NixonInnes/Flask-Blueprints-Logins
-https://github.com/NixonInnes/Flask-Blueprints-Logins
-Entry file: Flask-Blueprints-Logins/app/__init__.py
-Scanned: 2016-10-20 11:52:35.936361
-No vulnerabilities found.
-
-
-nejohnson2/flask-template-app
-https://github.com/nejohnson2/flask-template-app
-Entry file: flask-template-app/app.py
-Scanned: 2016-10-20 11:52:37.277181
-No vulnerabilities found.
-
-
-xlmn/DiplomFlaskAngular
-https://github.com/xlmn/DiplomFlaskAngular
-Entry file: DiplomFlaskAngular/app/__init__.py
-Scanned: 2016-10-20 11:52:40.654728
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AMontalva/flask-thinkful-api
-https://github.com/AMontalva/flask-thinkful-api
-Entry file: flask-thinkful-api/posts/__init__.py
-Scanned: 2016-10-20 11:52:42.019591
-Vulnerability 1:
-File: flask-thinkful-api/posts/api.py
- > User input at line 16, trigger word "get(":
- title_like = request.args.get('title_like')
-Reassigned in:
- File: flask-thinkful-api/posts/api.py
- > Line 22: posts = posts.order_by(models.Post.id)
- File: flask-thinkful-api/posts/api.py
- > Line 25: data = json.dumps([post.as_dictionary() for post in posts])
- File: flask-thinkful-api/posts/api.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json')
- File: flask-thinkful-api/posts/api.py
- > Line 19: posts = session.query(models.Post)
-File: flask-thinkful-api/posts/api.py
- > reaches line 21, trigger word "filter(":
- posts = posts.filter(models.Post.title.contains(title_like))
-
-
-
-davidnuon/flask-falcon-example
-https://github.com/davidnuon/flask-falcon-example
-Entry file: flask-falcon-example/flask-demo.py
-Scanned: 2016-10-20 11:52:43.440970
-No vulnerabilities found.
-
-
-genedex/flask-neo4j
-https://github.com/genedex/flask-neo4j
-Entry file: flask-neo4j/blog/views.py
-Scanned: 2016-10-20 11:52:44.757242
-No vulnerabilities found.
-
-
-yazquez/example-rest-flask.python
-https://github.com/yazquez/example-rest-flask.python
-Entry file: None
-Scanned: 2016-10-20 11:52:46.677229
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yazquez/example-rest-flask.python.
-
-sceene/test-flask-app
-https://github.com/sceene/test-flask-app
-Entry file: None
-Scanned: 2016-10-20 11:52:48.108165
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sceene/test-flask-app.
-
-mtnriver/docker-flask-app
-https://github.com/mtnriver/docker-flask-app
-Entry file: docker-flask-app/app.py
-Scanned: 2016-10-20 11:52:49.395505
-No vulnerabilities found.
-
-
-josephmuli/Flask
-https://github.com/josephmuli/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:52:51.321361
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-janukobytsch/flask-autofixture
-https://github.com/janukobytsch/flask-autofixture
-Entry file: flask-autofixture/tests/conftest.py
-Scanned: 2016-10-20 11:52:53.462001
-No vulnerabilities found.
-
-
-paceko/shopping-site
-https://github.com/paceko/shopping-site
-Entry file: shopping-site/shoppingsite.py
-Scanned: 2016-10-20 11:52:57.541038
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pragmaticcoders/flask-react-seed
-https://github.com/pragmaticcoders/flask-react-seed
-Entry file: None
-Scanned: 2016-10-20 11:53:02.060839
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed.
-
-fkirwin/flaskhelloworld
-https://github.com/fkirwin/flaskhelloworld
-Entry file: flaskhelloworld/hello_world.py
-Scanned: 2016-10-20 11:53:04.758311
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thedrew82/flaskr
-https://github.com/thedrew82/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:53:05.264088
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulballal/flasktemplate
-https://github.com/rahulballal/flasktemplate
-Entry file: flasktemplate/app.py
-Scanned: 2016-10-20 11:53:07.687364
-No vulnerabilities found.
-
-
-dimdal/flasktutorial
-https://github.com/dimdal/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 11:53:08.198692
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-axavio/flasky
-https://github.com/axavio/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:53:10.698115
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bspaans/flaskal
-https://github.com/bspaans/flaskal
-Entry file: flaskal/flaskal/imports.py
-Scanned: 2016-10-20 11:53:13.137742
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stoodsteal/flasky
-https://github.com/stoodsteal/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:53:13.645121
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-allergier/flaskr
-https://github.com/allergier/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:53:15.155249
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shenmj053/flaskr
-https://github.com/shenmj053/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:53:21.673437
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zverxw13/flaskr
-https://github.com/zverxw13/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:53:23.211160
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-liuhuai0217/flasky
-https://github.com/liuhuai0217/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:53:23.740769
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-erk52/FlaskDynamics
-https://github.com/erk52/FlaskDynamics
-Entry file: FlaskDynamics/view.py
-Scanned: 2016-10-20 11:53:32.346688
-Vulnerability 1:
-File: FlaskDynamics/view.py
- > User input at line 18, trigger word ".data":
- result = phasePlot(form.XPrime.data, form.YPrime.data)
-Reassigned in:
- File: FlaskDynamics/view.py
- > Line 20: result = None
-File: FlaskDynamics/view.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('new_view.html',form=form, result=result)
-
-
-
-KentaYamada/flaskr2
-https://github.com/KentaYamada/flaskr2
-Entry file: flaskr2/__init__.py
-Scanned: 2016-10-20 11:53:33.651387
-No vulnerabilities found.
-
-
-HaarisKhan/FlaskDemos
-https://github.com/HaarisKhan/FlaskDemos
-Entry file: None
-Scanned: 2016-10-20 11:53:41.027686
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gnu4cn/flaskLearnings
-https://github.com/gnu4cn/flaskLearnings
-Entry file: flaskLearnings/demos/sessions.py
-Scanned: 2016-10-20 11:53:50.525062
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pepemontana7/flaskFinal
-https://github.com/pepemontana7/flaskFinal
-Entry file: flaskFinal/firstapp/hello.py
-Scanned: 2016-10-20 11:53:51.839875
-No vulnerabilities found.
-
-
-marvelaz/Flask_python
-https://github.com/marvelaz/Flask_python
-Entry file: Flask_python/app.py
-Scanned: 2016-10-20 11:53:53.126402
-Vulnerability 1:
-File: Flask_python/app.py
- > User input at line 30, trigger word ".data":
- url = form.url.data
-File: Flask_python/app.py
- > reaches line 33, trigger word "flash(":
- flash('Stored bookmark '{}''.format(url))
-
-
-
-rishilification/Flask_Sql
-https://github.com/rishilification/Flask_Sql
-Entry file: Flask_Sql/app.py
-Scanned: 2016-10-20 11:53:55.178060
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-filiplasak/flask-skeleton
-https://github.com/filiplasak/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 11:53:55.688105
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/filiplasak/flask-skeleton.
-
-groovycol/flask-intro
-https://github.com/groovycol/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:53:56.196640
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lyoness1/flask-intro
-https://github.com/lyoness1/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:53:56.722655
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kelseyoo14/flask-intro
-https://github.com/kelseyoo14/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:53:57.232371
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Topytops/nice-flask
-https://github.com/Topytops/nice-flask
-Entry file: nice-flask/nice.py
-Scanned: 2016-10-20 11:53:58.529319
-No vulnerabilities found.
-
-
-Bluepig/flask-blog
-https://github.com/Bluepig/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:53:59.087646
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-HBKO/flask-test
-https://github.com/HBKO/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:53:59.631835
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-tyrelsouza/flask_vagrant
-https://github.com/tyrelsouza/flask_vagrant
-Entry file: flask_vagrant/code/src/app.py
-Scanned: 2016-10-20 11:54:01.033836
-No vulnerabilities found.
-
-
-wolfram74/flask_exploration
-https://github.com/wolfram74/flask_exploration
-Entry file: flask_exploration/app2.py
-Scanned: 2016-10-20 11:54:07.780864
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-HDking/flask-blog
-https://github.com/HDking/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:54:08.354250
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-CrustyBarnacle/flask_app
-https://github.com/CrustyBarnacle/flask_app
-Entry file: None
-Scanned: 2016-10-20 11:54:08.850914
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/CrustyBarnacle/flask_app.
-
-Weilor/learn_flask
-https://github.com/Weilor/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:54:09.350729
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cristinamclarkin/flask-intro
-https://github.com/cristinamclarkin/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:09.865259
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-emilydowgialo/flask-intro
-https://github.com/emilydowgialo/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:10.366562
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-roboticmonkey/flask-intro
-https://github.com/roboticmonkey/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:10.884904
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sarahcstringer/flask-intro
-https://github.com/sarahcstringer/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:11.392442
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-askiefer/flask-intro
-https://github.com/askiefer/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:11.898287
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lachilles/flask-intro
-https://github.com/lachilles/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:12.408645
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dencynluv/Flask--Intro
-https://github.com/dencynluv/Flask--Intro
-Entry file: Flask--Intro/nice.py
-Scanned: 2016-10-20 11:54:14.745432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-holmandw/flask-pi
-https://github.com/holmandw/flask-pi
-Entry file: flask-pi/app/__init__.py
-Scanned: 2016-10-20 11:54:16.722628
-No vulnerabilities found.
-
-
-amiceli/flask-blog
-https://github.com/amiceli/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:54:22.295979
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-kellyhiggins/flask-intro
-https://github.com/kellyhiggins/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:23.819990
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hollywoodno/flask-intro
-https://github.com/hollywoodno/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:24.322521
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-k-hub/flask-intro
-https://github.com/k-hub/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:31.848169
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sunshine-water/Flask_Exercise
-https://github.com/sunshine-water/Flask_Exercise
-Entry file: Flask_Exercise/nice.py
-Scanned: 2016-10-20 11:54:34.175064
-No vulnerabilities found.
-
-
-loopDelicious/flask-intro
-https://github.com/loopDelicious/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:54:34.689666
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mastershao/lening-flask
-https://github.com/mastershao/lening-flask
-Entry file: None
-Scanned: 2016-10-20 11:54:42.275952
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask.
-
-bulain/flask-demo
-https://github.com/bulain/flask-demo
-Entry file: None
-Scanned: 2016-10-20 11:54:51.793848
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bulain/flask-demo.
-
-diannaowa/flask-blog
-https://github.com/diannaowa/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:54:53.359084
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-hyhlinux/stu_flask
-https://github.com/hyhlinux/stu_flask
-Entry file: None
-Scanned: 2016-10-20 11:55:02.605172
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wOstensen/flask-first
-https://github.com/wOstensen/flask-first
-Entry file: flask-first/flask-first-notes.py
-Scanned: 2016-10-20 11:55:03.148816
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Tacolizard/flask-kott
-https://github.com/Tacolizard/flask-kott
-Entry file: flask-kott/kott.py
-Scanned: 2016-10-20 11:55:04.452257
-No vulnerabilities found.
-
-
-yaoice/flask-micblog
-https://github.com/yaoice/flask-micblog
-Entry file: flask-micblog/micblog/app/__init__.py
-Scanned: 2016-10-20 11:55:05.898586
-Vulnerability 1:
-File: flask-micblog/micblog/app/views.py
- > User input at line 92, trigger word "get(":
- user_name = request.form.get('user_name')
-Reassigned in:
- File: flask-micblog/micblog/app/views.py
- > Line 102: user.nickname = user_name
-File: flask-micblog/micblog/app/views.py
- > reaches line 95, trigger word "filter(":
- register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first()
-
-Vulnerability 2:
-File: flask-micblog/micblog/app/views.py
- > User input at line 93, trigger word "get(":
- user_email = request.form.get('user_email')
-Reassigned in:
- File: flask-micblog/micblog/app/views.py
- > Line 103: user.email = user_email
-File: flask-micblog/micblog/app/views.py
- > reaches line 95, trigger word "filter(":
- register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first()
-
-
-
-an5rag/flask-tutorial
-https://github.com/an5rag/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:55:06.415041
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sugarguo/Flask_Blog
-https://github.com/sugarguo/Flask_Blog
-Entry file: Flask_Blog/Blog/blog.py
-Scanned: 2016-10-20 11:55:08.027738
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-glasses4days/flask-intro
-https://github.com/glasses4days/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:08.586887
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kjlundsgaard/flask-intro
-https://github.com/kjlundsgaard/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:09.087810
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laurensila/flask-intro
-https://github.com/laurensila/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:09.598540
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tlwlmy/flask_base
-https://github.com/tlwlmy/flask_base
-Entry file: flask_base/app/__init__.py
-Scanned: 2016-10-20 11:55:11.163021
-No vulnerabilities found.
-
-
-maheskett/flask-intro
-https://github.com/maheskett/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:11.672527
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kelly4strength/flask-lab
-https://github.com/kelly4strength/flask-lab
-Entry file: flask-lab/nice.py
-Scanned: 2016-10-20 11:55:12.954382
-No vulnerabilities found.
-
-
-themuppet2/flask-blog
-https://github.com/themuppet2/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:55:13.558905
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Aaver69/Python-Flask
-https://github.com/Aaver69/Python-Flask
-Entry file: None
-Scanned: 2016-10-20 11:55:16.356358
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Aaver69/Python-Flask.
-
-ak042/flask-bdd
-https://github.com/ak042/flask-bdd
-Entry file: flask-bdd/flaskr.py
-Scanned: 2016-10-20 11:55:17.691327
-No vulnerabilities found.
-
-
-nanoha25/flask_local
-https://github.com/nanoha25/flask_local
-Entry file: flask_local/setup.py
-Scanned: 2016-10-20 11:55:24.759385
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dflee/flask-intro
-https://github.com/dflee/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:25.276727
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wattanar/flask-sample
-https://github.com/wattanar/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 11:55:25.785882
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Aperyon/flask-base
-https://github.com/Aperyon/flask-base
-Entry file: None
-Scanned: 2016-10-20 11:55:26.296879
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Aperyon/flask-base.
-
-rpalo/flask-headlines
-https://github.com/rpalo/flask-headlines
-Entry file: flask-headlines/headlines.py
-Scanned: 2016-10-20 11:55:28.588873
-No vulnerabilities found.
-
-
-stanliski/flask_dev
-https://github.com/stanliski/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 11:55:29.163698
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-k-wiz/flask-intro
-https://github.com/k-wiz/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:29.704774
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Munnu/flask-intro
-https://github.com/Munnu/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:32.215544
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Wynndow/flask_skeleton
-https://github.com/Wynndow/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 11:55:33.729072
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-chiubaca/flask-app
-https://github.com/chiubaca/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 11:55:35.272966
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-afarges/flask-intro
-https://github.com/afarges/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:42.816218
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paceko/flask-intro
-https://github.com/paceko/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:55:52.334540
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ucgyyf/yaoke-flask
-https://github.com/ucgyyf/yaoke-flask
-Entry file: yaoke-flask/app/__init__.py
-Scanned: 2016-10-20 11:55:54.763108
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SethHWeidman/flask-test
-https://github.com/SethHWeidman/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:56:03.775237
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-rpalo/flask-firstapp
-https://github.com/rpalo/flask-firstapp
-Entry file: flask-firstapp/hello.py
-Scanned: 2016-10-20 11:56:05.101450
-No vulnerabilities found.
-
-
-Jar-win/Flask-Pratice
-https://github.com/Jar-win/Flask-Pratice
-Entry file: Flask-Pratice/4c-flashing/hello.py
-Scanned: 2016-10-20 11:56:06.684818
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stuncyilmaz/flask_init
-https://github.com/stuncyilmaz/flask_init
-Entry file: None
-Scanned: 2016-10-20 11:56:07.181075
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/stuncyilmaz/flask_init.
-
-tageee/test_Flask
-https://github.com/tageee/test_Flask
-Entry file: test_Flask/hello.py
-Scanned: 2016-10-20 11:56:10.037077
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Aisling-Dempsey/flask-intro
-https://github.com/Aisling-Dempsey/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:56:10.554281
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tkahnhau/flask-intro
-https://github.com/tkahnhau/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:56:11.064192
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ubermelon/Flask_exercise
-https://github.com/ubermelon/Flask_exercise
-Entry file: Flask_exercise/nice.py
-Scanned: 2016-10-20 11:56:12.355346
-No vulnerabilities found.
-
-
-lsylk/flask-intro
-https://github.com/lsylk/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:56:12.902508
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-minyisme/flask-intro
-https://github.com/minyisme/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 11:56:13.406776
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-allisonscofield/flask-lab
-https://github.com/allisonscofield/flask-lab
-Entry file: flask-lab/nice.py
-Scanned: 2016-10-20 11:56:14.694918
-No vulnerabilities found.
-
-
-TiyaBelay/Flask-intro
-https://github.com/TiyaBelay/Flask-intro
-Entry file: Flask-intro/nice.py
-Scanned: 2016-10-20 11:56:15.215687
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chck/flask-sandbox
-https://github.com/chck/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-20 11:56:15.738405
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NixonInnes/Flask-Calendar
-https://github.com/NixonInnes/Flask-Calendar
-Entry file: Flask-Calendar/app/__init__.py
-Scanned: 2016-10-20 11:56:19.607683
-Vulnerability 1:
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > User input at line 30, trigger word ".data":
- calendar = Calendar(author_id=current_user.id, name=form.name.data)
-Reassigned in:
- File: Flask-Calendar/app/blueprints/calendar/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form)
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > reaches line 37, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id))
-
-Vulnerability 2:
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > User input at line 30, trigger word ".data":
- calendar = Calendar(author_id=current_user.id, name=form.name.data)
-Reassigned in:
- File: Flask-Calendar/app/blueprints/calendar/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form)
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > reaches line 37, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id))
-
-
-
-aurigadl/flask-base
-https://github.com/aurigadl/flask-base
-Entry file: None
-Scanned: 2016-10-20 11:56:20.122739
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/aurigadl/flask-base.
-
-tageee/Blog
-https://github.com/tageee/Blog
-Entry file: Blog/app/__init__.py
-Scanned: 2016-10-20 11:56:28.236811
-Vulnerability 1:
-File: Blog/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Blog/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 23: show_followed = False
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Blog/app/main/views.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 63: posts = pagination.items
-File: Blog/app/main/views.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Blog/app/main/views.py
- > User input at line 122, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Blog/app/main/views.py
- > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 129: comments = pagination.items
- File: Blog/app/main/views.py
- > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Blog/app/main/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Blog/app/main/views.py
- > User input at line 189, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Blog/app/main/views.py
- > User input at line 206, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 212, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Blog/app/main/views.py
- > User input at line 221, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 225: comments = pagination.items
-File: Blog/app/main/views.py
- > reaches line 226, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-od210291jpv/flask
-https://github.com/od210291jpv/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:56:30.412997
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Goomah/flask
-https://github.com/Goomah/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:56:31.008192
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ultramarine7/flask
-https://github.com/ultramarine7/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:56:31.561569
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-amateurPotato/flask
-https://github.com/amateurPotato/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:56:32.173894
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ahdrage/flask
-https://github.com/ahdrage/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:56:32.774281
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-MonPower/Flask
-https://github.com/MonPower/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 11:56:33.325861
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wenzi0595/flask
-https://github.com/wenzi0595/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 11:56:33.909400
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-singingwolfboy/build-a-flask-api
-https://github.com/singingwolfboy/build-a-flask-api
-Entry file: build-a-flask-api/step11/puppy.py
-Scanned: 2016-10-20 11:56:38.599669
-No vulnerabilities found.
-
-
-sunary/flask-optimize
-https://github.com/sunary/flask-optimize
-Entry file: flask-optimize/tests/flask_app.py
-Scanned: 2016-10-20 11:56:40.013781
-No vulnerabilities found.
-
-
-kashyap32/flask-REST
-https://github.com/kashyap32/flask-REST
-Entry file: None
-Scanned: 2016-10-20 11:56:53.863961
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kashyap32/flask-REST.
-
-baloo98/flasky
-https://github.com/baloo98/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:56:55.863027
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sanketg10/flaskapp
-https://github.com/sanketg10/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:57:04.414192
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanketg10/flaskapp.
-
-Julzmbugua/flasky
-https://github.com/Julzmbugua/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:57:04.942840
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rsk7/flaskapp
-https://github.com/rsk7/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:57:06.461916
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rsk7/flaskapp.
-
-Sarmacid/flaskr
-https://github.com/Sarmacid/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 11:57:07.970764
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-skhe/flasky
-https://github.com/skhe/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 11:57:08.473197
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neotrinity/flaskavro
-https://github.com/neotrinity/flaskavro
-Entry file: flaskavro/main.py
-Scanned: 2016-10-20 11:57:11.899427
-No vulnerabilities found.
-
-
-zeroisme/flaskblog
-https://github.com/zeroisme/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 11:57:12.427267
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-Mendurim/flasktut
-https://github.com/Mendurim/flasktut
-Entry file: flasktut/hello.py
-Scanned: 2016-10-20 11:57:13.758196
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-HDking/flasktaskr
-https://github.com/HDking/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 11:57:14.305902
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gjcooper/flaskprac
-https://github.com/gjcooper/flaskprac
-Entry file: flaskprac/app/__init__.py
-Scanned: 2016-10-20 11:57:15.716479
-No vulnerabilities found.
-
-
-deliveryyyyguy/flaskapp
-https://github.com/deliveryyyyguy/flaskapp
-Entry file: None
-Scanned: 2016-10-20 11:57:16.229830
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/deliveryyyyguy/flaskapp.
-
-aaron077/flaskblog
-https://github.com/aaron077/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 11:57:16.803453
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-DaBaiLi/FlaskBlog
-https://github.com/DaBaiLi/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 11:57:17.430582
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cs207-project/FlaskAPI
-https://github.com/cs207-project/FlaskAPI
-Entry file: None
-Scanned: 2016-10-20 11:57:17.935850
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cs207-project/FlaskAPI.
-
-Thetides/FlaskyTut
-https://github.com/Thetides/FlaskyTut
-Entry file: FlaskyTut/app.py
-Scanned: 2016-10-20 11:57:21.289929
-No vulnerabilities found.
-
-
-prrateekk/FlaskTesting
-https://github.com/prrateekk/FlaskTesting
-Entry file: FlaskTesting/hello.py
-Scanned: 2016-10-20 11:57:31.888189
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTesting/venv/lib/python2.7/genericpath.py
-
-kolapapa/flasky2
-https://github.com/kolapapa/flasky2
-Entry file: flasky2/app/__init__.py
-Scanned: 2016-10-20 11:57:33.363567
-No vulnerabilities found.
-
-
-argenis2021/FlaskTutorial
-https://github.com/argenis2021/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 11:57:33.891295
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-konglx90/flask_study
-https://github.com/konglx90/flask_study
-Entry file: flask_study/views.py
-Scanned: 2016-10-20 11:57:34.410582
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-datademofun/congress-flask
-https://github.com/datademofun/congress-flask
-Entry file: congress-flask/app.py
-Scanned: 2016-10-20 11:57:37.427969
-No vulnerabilities found.
-
-
-ifwenvlook/flask-celery
-https://github.com/ifwenvlook/flask-celery
-Entry file: flask-celery/app.py
-Scanned: 2016-10-20 11:57:38.835558
-Vulnerability 1:
-File: flask-celery/app.py
- > User input at line 66, trigger word "form[":
- email = request.form['email']
-Reassigned in:
- File: flask-celery/app.py
- > Line 67: session['email'] = email
-File: flask-celery/app.py
- > reaches line 76, trigger word "flash(":
- flash('Sending email to {0}'.format(email))
-
-Vulnerability 2:
-File: flask-celery/app.py
- > User input at line 66, trigger word "form[":
- email = request.form['email']
-Reassigned in:
- File: flask-celery/app.py
- > Line 67: session['email'] = email
-File: flask-celery/app.py
- > reaches line 80, trigger word "flash(":
- flash('An email will be sent to {0} in one minute'.format(email))
-
-Vulnerability 3:
-File: flask-celery/app.py
- > User input at line 103, trigger word "get(":
- response = 'state''current''total''status'task.statetask.info.get('current', 0)task.info.get('total', 1)task.info.get('status', '')
-Reassigned in:
- File: flask-celery/app.py
- > Line 96: response = 'state''current''total''status'task.state01'Pending...'
- File: flask-celery/app.py
- > Line 113: response = 'state''current''total''status'task.state11str(task.info)
-File: flask-celery/app.py
- > reaches line 119, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-jonalligood/flask-diary
-https://github.com/jonalligood/flask-diary
-Entry file: flask-diary/flask/lib/python3.5/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 11:57:56.328018
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-HDking/flask-blog
-https://github.com/HDking/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:57:56.938577
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-sugarguo/flask-login
-https://github.com/sugarguo/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-20 11:58:05.922335
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Afghary/bloggingFlask
-https://github.com/Afghary/bloggingFlask
-Entry file: bloggingFlask/src/app.py
-Scanned: 2016-10-20 11:58:07.259621
-No vulnerabilities found.
-
-
-abaratif/flask_sms
-https://github.com/abaratif/flask_sms
-Entry file: flask_sms/app.py
-Scanned: 2016-10-20 11:58:08.555222
-No vulnerabilities found.
-
-
-full-stakk/flask-rest
-https://github.com/full-stakk/flask-rest
-Entry file: flask-rest/haystack/core.py
-Scanned: 2016-10-20 11:58:09.075670
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ikolito/flask-yahoomarket
-https://github.com/ikolito/flask-yahoomarket
-Entry file: None
-Scanned: 2016-10-20 11:58:10.351797
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ikolito/flask-yahoomarket.
-
-kunalj101/flask-blog
-https://github.com/kunalj101/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 11:58:10.915548
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-RiverAge/flask-mongodb
-https://github.com/RiverAge/flask-mongodb
-Entry file: flask-mongodb/app/__init__.py
-Scanned: 2016-10-20 11:58:12.231064
-No vulnerabilities found.
-
-
-natedoyle/flask-cyoa
-https://github.com/natedoyle/flask-cyoa
-Entry file: flask-cyoa/src/app.py
-Scanned: 2016-10-20 11:58:13.524233
-No vulnerabilities found.
-
-
-ShakedFadi/flask_blog
-https://github.com/ShakedFadi/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:58:14.041854
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-makensy/flask_alchemy
-https://github.com/makensy/flask_alchemy
-Entry file: flask_alchemy/app/__init__.py
-Scanned: 2016-10-20 11:58:15.433916
-No vulnerabilities found.
-
-
-28sui/dao-flask
-https://github.com/28sui/dao-flask
-Entry file: dao-flask/app.py
-Scanned: 2016-10-20 11:58:16.777536
-No vulnerabilities found.
-
-
-quvide/docker-flask
-https://github.com/quvide/docker-flask
-Entry file: docker-flask/flask/app/main.py
-Scanned: 2016-10-20 11:58:18.213408
-No vulnerabilities found.
-
-
-carlsagan21/flask-crawler
-https://github.com/carlsagan21/flask-crawler
-Entry file: flask-crawler/flask-crawler.py
-Scanned: 2016-10-20 11:58:19.531198
-No vulnerabilities found.
-
-
-Ouro130Ros/LearningFlask
-https://github.com/Ouro130Ros/LearningFlask
-Entry file: LearningFlask/1-HelloWorld/helloWorld.py
-Scanned: 2016-10-20 11:58:20.843855
-No vulnerabilities found.
-
-
-mandshaw/flask_microbrewery
-https://github.com/mandshaw/flask_microbrewery
-Entry file: flask_microbrewery/flask_microbrewery/run.py
-Scanned: 2016-10-20 11:58:22.353389
-No vulnerabilities found.
-
-
-kindoprec/flask-boot
-https://github.com/kindoprec/flask-boot
-Entry file: flask-boot/app.py
-Scanned: 2016-10-20 11:58:23.672093
-Vulnerability 1:
-File: flask-boot/app.py
- > User input at line 15, trigger word "get(":
- out = 'Hello ' + request.args.get('name', '')
-File: flask-boot/app.py
- > reaches line 16, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(output=out)
-
-
-
-liuyun90/learn_flask
-https://github.com/liuyun90/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 11:58:24.187768
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-richardqlin/flask_app
-https://github.com/richardqlin/flask_app
-Entry file: None
-Scanned: 2016-10-20 11:58:24.700789
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flask_app.
-
-blarneyosullivan/flask_blog
-https://github.com/blarneyosullivan/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 11:58:25.231281
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MUICProgrammingClub/flask-tutorial
-https://github.com/MUICProgrammingClub/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 11:58:25.759264
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AuthentiqID/examples-flask
-https://github.com/AuthentiqID/examples-flask
-Entry file: examples-flask/example_basic.py
-Scanned: 2016-10-20 11:58:27.231327
-Vulnerability 1:
-File: examples-flask/example_basic.py
- > User input at line 135, trigger word "get(":
- userinfo = authentiq.get(USERINFO_URL).json()
-File: examples-flask/example_basic.py
- > reaches line 149, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(userinfo)
-
-Vulnerability 2:
-File: examples-flask/test_example_basic.py
- > User input at line 71, trigger word "get(":
- res = test_app.get(url_for('index'))
-Reassigned in:
- File: examples-flask/test_example_basic.py
- > Line 76: res = requests.get(url,allow_redirects=1)
-File: examples-flask/test_example_basic.py
- > reaches line 71, trigger word "url_for(":
- res = test_app.get(url_for('index'))
-
-Vulnerability 3:
-File: examples-flask/test_example_basic.py
- > User input at line 75, trigger word "get(":
- url = res.headers.get('Location')
-Reassigned in:
- File: examples-flask/test_example_basic.py
- > Line 76: res = requests.get(url,allow_redirects=1)
-File: examples-flask/test_example_basic.py
- > reaches line 71, trigger word "url_for(":
- res = test_app.get(url_for('index'))
-
-Vulnerability 4:
-File: examples-flask/test_example_basic.py
- > User input at line 76, trigger word "get(":
- res = requests.get(url,allow_redirects=1)
-File: examples-flask/test_example_basic.py
- > reaches line 71, trigger word "url_for(":
- res = test_app.get(url_for('index'))
-
-Vulnerability 5:
-File: examples-flask/example_2fa.py
- > User input at line 159, trigger word "get(":
- userinfo = authentiq.get(USERINFO_URL).json()
-File: examples-flask/example_2fa.py
- > reaches line 173, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(userinfo)
-
-
-
-rpalo/flask-headlines
-https://github.com/rpalo/flask-headlines
-Entry file: flask-headlines/headlines.py
-Scanned: 2016-10-20 11:58:33.906966
-No vulnerabilities found.
-
-
-stanliski/flask_dev
-https://github.com/stanliski/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 11:58:34.472465
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-s4ayub/FirstFlask
-https://github.com/s4ayub/FirstFlask
-Entry file: FirstFlask/app.py
-Scanned: 2016-10-20 11:58:35.070614
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py
-
-emilydowgialo/skills-flask
-https://github.com/emilydowgialo/skills-flask
-Entry file: skills-flask/application.py
-Scanned: 2016-10-20 11:58:42.209792
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: skills-flask/env/lib/python2.7/genericpath.py
-
-condemnedbachelor/flask-skills
-https://github.com/condemnedbachelor/flask-skills
-Entry file: flask-skills/application.py
-Scanned: 2016-10-20 11:58:49.666012
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'ingoing'
-
-jimlambrt-roadscholar/udemy-flask
-https://github.com/jimlambrt-roadscholar/udemy-flask
-Entry file: udemy-flask/hello.py
-Scanned: 2016-10-20 11:58:51.063123
-No vulnerabilities found.
-
-
-CharAct3/flask_test
-https://github.com/CharAct3/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 11:58:51.764728
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jlberzal/Flask-User
-https://github.com/jlberzal/Flask-User
-Entry file: Flask-User/example_apps/multi_email_app.py
-Scanned: 2016-10-20 11:58:56.715481
-Vulnerability 1:
-File: Flask-User/example_apps/user_profile_app.py
- > User input at line 44, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-User/example_apps/user_profile_app.py
- > Line 90: db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile)
- File: Flask-User/example_apps/user_profile_app.py
- > Line 91: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_profile_app.py
- > reaches line 94, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 2:
-File: Flask-User/example_apps/user_profile_app.py
- > User input at line 90, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile)
-Reassigned in:
- File: Flask-User/example_apps/user_profile_app.py
- > Line 91: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_profile_app.py
- > reaches line 94, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 3:
-File: Flask-User/example_apps/roles_required_app.py
- > User input at line 44, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-User/example_apps/roles_required_app.py
- > Line 83: db_adapter = SQLAlchemyAdapter(db, User)
- File: Flask-User/example_apps/roles_required_app.py
- > Line 84: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/roles_required_app.py
- > reaches line 87, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 4:
-File: Flask-User/example_apps/roles_required_app.py
- > User input at line 83, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User)
-Reassigned in:
- File: Flask-User/example_apps/roles_required_app.py
- > Line 84: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/roles_required_app.py
- > reaches line 87, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 5:
-File: Flask-User/example_apps/user_auth_app.py
- > User input at line 44, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-User/example_apps/user_auth_app.py
- > Line 92: db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth)
- File: Flask-User/example_apps/user_auth_app.py
- > Line 93: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_auth_app.py
- > reaches line 96, trigger word "filter(":
- if not UserAuth.query.filter(UserAuth.username == 'user007').first():
-
-Vulnerability 6:
-File: Flask-User/example_apps/user_auth_app.py
- > User input at line 92, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth)
-Reassigned in:
- File: Flask-User/example_apps/user_auth_app.py
- > Line 93: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_auth_app.py
- > reaches line 96, trigger word "filter(":
- if not UserAuth.query.filter(UserAuth.username == 'user007').first():
-
-
-
-kstripp/flask-crud
-https://github.com/kstripp/flask-crud
-Entry file: flask-crud/app/__init__.py
-Scanned: 2016-10-20 11:58:58.213275
-Vulnerability 1:
-File: flask-crud/app/views.py
- > User input at line 25, trigger word "get(":
- post = models.Post.query.get(id)
-File: flask-crud/app/views.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',post=post)
-
-
-
-iceihehe/flask-test
-https://github.com/iceihehe/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 11:58:58.765617
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-gonza-peralta/flask-celery
-https://github.com/gonza-peralta/flask-celery
-Entry file: flask-celery/app/factory.py
-Scanned: 2016-10-20 11:59:08.355608
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-girishramnani/flask-facebookbot
-https://github.com/girishramnani/flask-facebookbot
-Entry file: flask-facebookbot/app.py
-Scanned: 2016-10-20 11:59:09.661372
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Master-Yan/flask_template
-https://github.com/Master-Yan/flask_template
-Entry file: None
-Scanned: 2016-10-20 11:59:10.190348
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Master-Yan/flask_template.
-
-zjqzero/flask_migrate
-https://github.com/zjqzero/flask_migrate
-Entry file: flask_migrate/add_index/test.py
-Scanned: 2016-10-20 11:59:11.614088
-No vulnerabilities found.
-
-
-nanoha25/flask_local
-https://github.com/nanoha25/flask_local
-Entry file: flask_local/setup.py
-Scanned: 2016-10-20 11:59:12.802674
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Wynndow/flask_skeleton
-https://github.com/Wynndow/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 11:59:13.300202
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-chiubaca/flask-app
-https://github.com/chiubaca/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 11:59:14.819305
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bdhammel/asteroid-flask
-https://github.com/bdhammel/asteroid-flask
-Entry file: asteroid-flask/game.py
-Scanned: 2016-10-20 11:59:25.026957
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-FizLBQ/Flask_fiz
-https://github.com/FizLBQ/Flask_fiz
-Entry file: Flask_fiz/demo.py
-Scanned: 2016-10-20 11:59:26.362718
-No vulnerabilities found.
-
-
-rpalo/flask-firstapp
-https://github.com/rpalo/flask-firstapp
-Entry file: flask-firstapp/hello.py
-Scanned: 2016-10-20 11:59:27.664931
-No vulnerabilities found.
-
-
-rpalo/flask-crimemap
-https://github.com/rpalo/flask-crimemap
-Entry file: flask-crimemap/crimemap.py
-Scanned: 2016-10-20 11:59:28.973062
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-singleyoungtao/myblog-flask
-https://github.com/singleyoungtao/myblog-flask
-Entry file: myblog-flask/app/__init__.py
-Scanned: 2016-10-20 11:59:31.015218
-Vulnerability 1:
-File: myblog-flask/app/main/views.py
- > User input at line 47, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 55: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 58: posts = pagination.items
- File: myblog-flask/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: myblog-flask/app/main/views.py
- > User input at line 50, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 48: show_followed = False
- File: myblog-flask/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: myblog-flask/app/main/views.py
- > User input at line 66, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 67: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 70: posts = pagination.items
-File: myblog-flask/app/main/views.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: myblog-flask/app/main/views.py
- > User input at line 133, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 135: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: myblog-flask/app/main/views.py
- > Line 137: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 140: comments = pagination.items
- File: myblog-flask/app/main/views.py
- > Line 132: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: myblog-flask/app/main/views.py
- > reaches line 141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: myblog-flask/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: myblog-flask/app/main/views.py
- > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: myblog-flask/app/main/views.py
- > User input at line 218, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 219: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 222: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: myblog-flask/app/main/views.py
- > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 224, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: myblog-flask/app/main/views.py
- > User input at line 249, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 250: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 253: comments = pagination.items
-File: myblog-flask/app/main/views.py
- > reaches line 254, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 23: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 23: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 23: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 45: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 45: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 45: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: myblog-flask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: myblog-flask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: myblog-flask/app/api_1_0/posts.py
- > Line 19: next = None
-File: myblog-flask/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: myblog-flask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: myblog-flask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: myblog-flask/app/api_1_0/posts.py
- > Line 19: next = None
-File: myblog-flask/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: myblog-flask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: myblog-flask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: myblog-flask/app/api_1_0/posts.py
- > Line 19: next = None
-File: myblog-flask/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-rpalo/flask-waitercaller
-https://github.com/rpalo/flask-waitercaller
-Entry file: flask-waitercaller/waitercaller.py
-Scanned: 2016-10-20 11:59:32.315556
-No vulnerabilities found.
-
-
-NJUPole/Flask_tickets
-https://github.com/NJUPole/Flask_tickets
-Entry file: Flask_tickets/tickets.py
-Scanned: 2016-10-20 11:59:34.288158
-Vulnerability 1:
-File: Flask_tickets/tickets.py
- > User input at line 62, trigger word "get(":
- movieDate = request.args.get('date')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 70, trigger word "filter(":
- queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords)))
-
-Vulnerability 2:
-File: Flask_tickets/tickets.py
- > User input at line 63, trigger word "get(":
- searchWords = request.args.get('search')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 70, trigger word "filter(":
- queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords)))
-
-Vulnerability 3:
-File: Flask_tickets/tickets.py
- > User input at line 61, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 68: page = pageint(page) - 10
-File: Flask_tickets/tickets.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords)
-
-Vulnerability 4:
-File: Flask_tickets/tickets.py
- > User input at line 62, trigger word "get(":
- movieDate = request.args.get('date')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords)
-
-Vulnerability 5:
-File: Flask_tickets/tickets.py
- > User input at line 63, trigger word "get(":
- searchWords = request.args.get('search')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords)
-
-
-
-Mingz2013/demo.flasky
-https://github.com/Mingz2013/demo.flasky
-Entry file: None
-Scanned: 2016-10-20 11:59:35.703073
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Mingz2013/demo.flasky.
-
-LaundryOrder/Backend
-https://github.com/LaundryOrder/Backend
-Entry file: Backend/app.py
-Scanned: 2016-10-20 11:59:37.148953
-No vulnerabilities found.
-
-
-tageee/Blog
-https://github.com/tageee/Blog
-Entry file: Blog/app/__init__.py
-Scanned: 2016-10-20 11:59:40.279256
-Vulnerability 1:
-File: Blog/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Blog/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 23: show_followed = False
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Blog/app/main/views.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 63: posts = pagination.items
-File: Blog/app/main/views.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Blog/app/main/views.py
- > User input at line 122, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Blog/app/main/views.py
- > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 129: comments = pagination.items
- File: Blog/app/main/views.py
- > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Blog/app/main/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Blog/app/main/views.py
- > User input at line 189, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Blog/app/main/views.py
- > User input at line 206, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 212, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Blog/app/main/views.py
- > User input at line 221, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 225: comments = pagination.items
-File: Blog/app/main/views.py
- > reaches line 226, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-ahumeijun/RestfulTest
-https://github.com/ahumeijun/RestfulTest
-Entry file: RestfulTest/app/__init__.py
-Scanned: 2016-10-20 11:59:42.102646
-No vulnerabilities found.
-
-
-jlberzal/my_app
-https://github.com/jlberzal/my_app
-Entry file: my_app/app/__init__.py
-Scanned: 2016-10-20 11:59:44.075823
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zzq2015/myFirstWeb
-https://github.com/zzq2015/myFirstWeb
-Entry file: myFirstWeb/hello/app/__init__.py
-Scanned: 2016-10-20 11:59:52.443776
-Vulnerability 1:
-File: myFirstWeb/hello/app/views.py
- > User input at line 16, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: myFirstWeb/hello/app/views.py
- > Line 13: name = None
-File: myFirstWeb/hello/app/views.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name)
-
-Vulnerability 2:
-File: myFirstWeb/hello/app/main/views.py
- > User input at line 17, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: myFirstWeb/hello/app/main/views.py
- > Line 14: name = None
-File: myFirstWeb/hello/app/main/views.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name)
-
-
-
-thomasroulin/SpreadPoll
-https://github.com/thomasroulin/SpreadPoll
-Entry file: SpreadPoll/SpreadPoll.py
-Scanned: 2016-10-20 11:59:53.868311
-No vulnerabilities found.
-
-
-vincentdnl/flask-facebook-messenger-bot-boilerplate
-https://github.com/vincentdnl/flask-facebook-messenger-bot-boilerplate
-Entry file: flask-facebook-messenger-bot-boilerplate/app.py
-Scanned: 2016-10-20 11:59:55.181699
-No vulnerabilities found.
-
-
-GrantJamesPowell/FlaskRaffleApp
-https://github.com/GrantJamesPowell/FlaskRaffleApp
-Entry file: FlaskRaffleApp/raffleapp.py
-Scanned: 2016-10-20 11:59:57.036838
-No vulnerabilities found.
-
-
-vishwanath79/FlaskRestAPI
-https://github.com/vishwanath79/FlaskRestAPI
-Entry file: FlaskRestAPI/rest.py
-Scanned: 2016-10-20 11:59:58.673827
-Vulnerability 1:
-File: FlaskRestAPI/rest.py
- > User input at line 41, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: FlaskRestAPI/rest.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-catmin/flask49erStore
-https://github.com/catmin/flask49erStore
-Entry file: flask49erStore/flask49erStore.py
-Scanned: 2016-10-20 12:00:00.460479
-Vulnerability 1:
-File: flask49erStore/flask49erStore.py
- > User input at line 253, trigger word "get(":
- offer = Offer.query.get(id)
-Reassigned in:
- File: flask49erStore/flask49erStore.py
- > Line 254: hulls = Hull.query.filter_by(offer_id=offer.id)
- File: flask49erStore/flask49erStore.py
- > Line 255: masts = Mast.query.filter_by(offer_id=offer.id)
- File: flask49erStore/flask49erStore.py
- > Line 256: sails = Sail.query.filter_by(offer_id=offer.id)
-File: flask49erStore/flask49erStore.py
- > reaches line 261, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('offer_details.html',offer=offer, sails=sails, hulls=hulls, masts=masts)
-
-
-
-leavyli/flaskWebDevelopment
-https://github.com/leavyli/flaskWebDevelopment
-Entry file: flaskWebDevelopment/hello/hello.py
-Scanned: 2016-10-20 12:00:01.774262
-No vulnerabilities found.
-
-
-thedod/boilerplate-peewee-flask
-https://github.com/thedod/boilerplate-peewee-flask
-Entry file: None
-Scanned: 2016-10-20 12:00:08.776745
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedod/boilerplate-peewee-flask.
-
-shn7798/FlaskZhihu
-https://github.com/shn7798/FlaskZhihu
-Entry file: FlaskZhihu/tests/test_orm.py
-Scanned: 2016-10-20 12:00:12.374637
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-syntaxSizer/flask
-https://github.com/syntaxSizer/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:00:12.969227
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-gabrielecker/Flask
-https://github.com/gabrielecker/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:00:13.475302
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Dianalim209/flask
-https://github.com/Dianalim209/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:00:14.092387
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-luojiyin1987/flask
-https://github.com/luojiyin1987/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:00:14.664824
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-chrislinan/flask
-https://github.com/chrislinan/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:00:15.252739
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-lagougou/flask
-https://github.com/lagougou/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:00:15.828838
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-tkirkland/Flask
-https://github.com/tkirkland/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:00:26.373327
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ooohiroyukiooo/flask
-https://github.com/ooohiroyukiooo/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:00:26.959200
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-RoseOu/Flask-learning
-https://github.com/RoseOu/Flask-learning
-Entry file: Flask-learning/flaskblog/app/__init__.py
-Scanned: 2016-10-20 12:00:35.813224
-No vulnerabilities found.
-
-
-yassipo/webservice
-https://github.com/yassipo/webservice
-Entry file: webservice/app.py
-Scanned: 2016-10-20 12:00:37.752278
-No vulnerabilities found.
-
-
-amey-sam/Flask-MailGun
-https://github.com/amey-sam/Flask-MailGun
-Entry file: None
-Scanned: 2016-10-20 12:00:39.513578
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun.
-
-yoophi/flaskygram
-https://github.com/yoophi/flaskygram
-Entry file: None
-Scanned: 2016-10-20 12:00:41.634321
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flaskygram.
-
-Ifresher/Flaskr
-https://github.com/Ifresher/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:00:42.163031
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-efrainmunoz/flasktaskr
-https://github.com/efrainmunoz/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:00:42.663534
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HansKramer/flaskr
-https://github.com/HansKramer/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:00:43.176514
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shorian/flaskr
-https://github.com/shorian/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:00:43.702517
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mmoran0032/flaskwork
-https://github.com/mmoran0032/flaskwork
-Entry file: flaskwork/hello.py
-Scanned: 2016-10-20 12:00:45.028750
-No vulnerabilities found.
-
-
-Maxwell-Ying/flaskbook
-https://github.com/Maxwell-Ying/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:00:45.624949
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-ansel333/flaskr
-https://github.com/ansel333/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:00:55.149388
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ojgoyal/flaskr
-https://github.com/ojgoyal/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:00:56.677774
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hoorn91/flaskproject
-https://github.com/hoorn91/flaskproject
-Entry file: None
-Scanned: 2016-10-20 12:00:58.219688
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hongmaoxiao/flasky
-https://github.com/hongmaoxiao/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:00:59.719314
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jiuhuandao/Flaskr
-https://github.com/jiuhuandao/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:01:00.231676
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-richardqlin/flaskralchemy
-https://github.com/richardqlin/flaskralchemy
-Entry file: None
-Scanned: 2016-10-20 12:01:09.095662
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy.
-
-thunn/Flaskr1
-https://github.com/thunn/Flaskr1
-Entry file: Flaskr1/flaskr.py
-Scanned: 2016-10-20 12:01:10.499500
-No vulnerabilities found.
-
-
-thejojo87/FlaskBlog
-https://github.com/thejojo87/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:01:11.112541
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shen5630/FlaskProject
-https://github.com/shen5630/FlaskProject
-Entry file: FlaskProject/views.py
-Scanned: 2016-10-20 12:01:13.752323
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-viprs/FlaskyBlog
-https://github.com/viprs/FlaskyBlog
-Entry file: FlaskyBlog/app/__init__.py
-Scanned: 2016-10-20 12:01:17.119655
-Vulnerability 1:
-File: FlaskyBlog/app/main/views.py
- > User input at line 26, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 27: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 31: posts = pagination.items
- File: FlaskyBlog/app/main/views.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskyBlog/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: FlaskyBlog/app/main/views.py
- > User input at line 47, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 50: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: FlaskyBlog/app/main/views.py
- > Line 52: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 55: comments = pagination.items
- File: FlaskyBlog/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: FlaskyBlog/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 3:
-File: FlaskyBlog/app/main/views.py
- > User input at line 170, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 171: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: FlaskyBlog/app/main/views.py
- > Line 169: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskyBlog/app/main/views.py
- > reaches line 177, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: FlaskyBlog/app/main/views.py
- > User input at line 187, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 188: pagination = user.follower.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 192: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: FlaskyBlog/app/main/views.py
- > Line 186: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskyBlog/app/main/views.py
- > reaches line 194, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: FlaskyBlog/app/main/views.py
- > User input at line 203, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 204: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 207: comments = pagination.items
-File: FlaskyBlog/app/main/views.py
- > reaches line 208, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 6:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 15: users = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 22: user_list = [user.to_json() for user in users]
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 16: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 19: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 18, trigger word "url_for(":
- prev_page = url_for('api.get_users',page=page - 1, _external=True)
-
-Vulnerability 7:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 15: users = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 22: user_list = [user.to_json() for user in users]
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 16: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 19: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 21, trigger word "url_for(":
- next_page = url_for('api.get_users',page=page + 1, _external=True)
-
-Vulnerability 8:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 15: users = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 22: user_list = [user.to_json() for user in users]
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 16: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 19: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users''prev_page''next_page''total_count''page_count'user_listprev_pagenext_pagepagination.totaluser_list.__len__())
-
-Vulnerability 9:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 49: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 10:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 49: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 51, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 11:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 49: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 52, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 12:
-File: FlaskyBlog/app/api_1_0/posts.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 18: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 25: post_list = [post.to_json() for post in posts]
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 19: prev_page = None
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 22: next_page = None
-File: FlaskyBlog/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 13:
-File: FlaskyBlog/app/api_1_0/posts.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 18: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 25: post_list = [post.to_json() for post in posts]
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 19: prev_page = None
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 22: next_page = None
-File: FlaskyBlog/app/api_1_0/posts.py
- > reaches line 24, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 14:
-File: FlaskyBlog/app/api_1_0/posts.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 18: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 25: post_list = [post.to_json() for post in posts]
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 19: prev_page = None
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 22: next_page = None
-File: FlaskyBlog/app/api_1_0/posts.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''total_count''page_count'post_listprev_pagenext_pagepagination.totalpost_list.__len__())
-
-
-
-PaperAndColours/flaskImage
-https://github.com/PaperAndColours/flaskImage
-Entry file: flaskImage/app.py
-Scanned: 2016-10-20 12:01:23.398524
-No vulnerabilities found.
-
-
-er3456qi/FlaskTutorial
-https://github.com/er3456qi/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 12:01:23.905888
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hamartia0/FlaskWeb
-https://github.com/hamartia0/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 12:01:24.561977
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-rmGuarachi/flask2
-https://github.com/rmGuarachi/flask2
-Entry file: flask2/app.py
-Scanned: 2016-10-20 12:01:25.069943
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-maheskett/flask-testing
-https://github.com/maheskett/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:01:29.516065
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kellyhiggins/Flask-testing
-https://github.com/kellyhiggins/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-20 12:01:33.296992
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laurensila/flask-testing
-https://github.com/laurensila/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:01:33.833773
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sugarguo/flask-login
-https://github.com/sugarguo/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-20 12:01:37.455418
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Afghary/bloggingFlask
-https://github.com/Afghary/bloggingFlask
-Entry file: bloggingFlask/src/app.py
-Scanned: 2016-10-20 12:01:38.845584
-No vulnerabilities found.
-
-
-DANWINS-LLC/flask-starter
-https://github.com/DANWINS-LLC/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 12:01:39.361087
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coffee-world/flask_wd
-https://github.com/coffee-world/flask_wd
-Entry file: flask_wd/hello.py
-Scanned: 2016-10-20 12:01:42.137485
-No vulnerabilities found.
-
-
-jiang2/flask-rest
-https://github.com/jiang2/flask-rest
-Entry file: flask-rest/haystack/core.py
-Scanned: 2016-10-20 12:01:43.133731
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-progBill/flask_blueprint
-https://github.com/progBill/flask_blueprint
-Entry file: flask_blueprint/__init__.py
-Scanned: 2016-10-20 12:01:44.425707
-No vulnerabilities found.
-
-
-carlsagan21/flask-crawler
-https://github.com/carlsagan21/flask-crawler
-Entry file: flask-crawler/flask-crawler.py
-Scanned: 2016-10-20 12:01:45.689604
-No vulnerabilities found.
-
-
-jdesilvio/flask-deploy
-https://github.com/jdesilvio/flask-deploy
-Entry file: flask-deploy/template.py
-Scanned: 2016-10-20 12:01:46.231346
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stanliski/flask-dev
-https://github.com/stanliski/flask-dev
-Entry file: flask-dev/app/__init__.py
-Scanned: 2016-10-20 12:01:53.224216
-No vulnerabilities found.
-
-
-paceko/testing-flask
-https://github.com/paceko/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:01:53.763718
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-minyisme/flask-testing
-https://github.com/minyisme/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:01:54.272378
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cristinamclarkin/Flask-testing
-https://github.com/cristinamclarkin/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-20 12:01:55.818234
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kindoprec/flask-boot
-https://github.com/kindoprec/flask-boot
-Entry file: flask-boot/app.py
-Scanned: 2016-10-20 12:01:58.143751
-Vulnerability 1:
-File: flask-boot/app.py
- > User input at line 15, trigger word "get(":
- out = 'Hello ' + request.args.get('name', '')
-File: flask-boot/app.py
- > reaches line 16, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(output=out)
-
-
-
-enlacee/appFlask
-https://github.com/enlacee/appFlask
-Entry file: appFlask/web/hello.py
-Scanned: 2016-10-20 12:01:59.539362
-No vulnerabilities found.
-
-
-shuangfu/learnFlask
-https://github.com/shuangfu/learnFlask
-Entry file: None
-Scanned: 2016-10-20 12:02:00.521739
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shuangfu/learnFlask.
-
-tnygren/flask-testing
-https://github.com/tnygren/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:02:08.527693
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-eduardoferrandezr/flask-bokeh
-https://github.com/eduardoferrandezr/flask-bokeh
-Entry file: flask-bokeh/app.py
-Scanned: 2016-10-20 12:02:10.875689
-No vulnerabilities found.
-
-
-rd82/flask-tute
-https://github.com/rd82/flask-tute
-Entry file: flask-tute/app/__init__.py
-Scanned: 2016-10-20 12:02:12.333470
-No vulnerabilities found.
-
-
-jlberzal/Flask-User
-https://github.com/jlberzal/Flask-User
-Entry file: Flask-User/example_apps/multi_email_app.py
-Scanned: 2016-10-20 12:02:18.293987
-Vulnerability 1:
-File: Flask-User/example_apps/user_profile_app.py
- > User input at line 44, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-User/example_apps/user_profile_app.py
- > Line 90: db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile)
- File: Flask-User/example_apps/user_profile_app.py
- > Line 91: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_profile_app.py
- > reaches line 94, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 2:
-File: Flask-User/example_apps/user_profile_app.py
- > User input at line 90, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile)
-Reassigned in:
- File: Flask-User/example_apps/user_profile_app.py
- > Line 91: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_profile_app.py
- > reaches line 94, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 3:
-File: Flask-User/example_apps/roles_required_app.py
- > User input at line 44, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-User/example_apps/roles_required_app.py
- > Line 83: db_adapter = SQLAlchemyAdapter(db, User)
- File: Flask-User/example_apps/roles_required_app.py
- > Line 84: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/roles_required_app.py
- > reaches line 87, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 4:
-File: Flask-User/example_apps/roles_required_app.py
- > User input at line 83, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User)
-Reassigned in:
- File: Flask-User/example_apps/roles_required_app.py
- > Line 84: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/roles_required_app.py
- > reaches line 87, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 5:
-File: Flask-User/example_apps/user_auth_app.py
- > User input at line 44, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-User/example_apps/user_auth_app.py
- > Line 92: db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth)
- File: Flask-User/example_apps/user_auth_app.py
- > Line 93: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_auth_app.py
- > reaches line 96, trigger word "filter(":
- if not UserAuth.query.filter(UserAuth.username == 'user007').first():
-
-Vulnerability 6:
-File: Flask-User/example_apps/user_auth_app.py
- > User input at line 92, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth)
-Reassigned in:
- File: Flask-User/example_apps/user_auth_app.py
- > Line 93: user_manager = UserManager(db_adapter, app)
-File: Flask-User/example_apps/user_auth_app.py
- > reaches line 96, trigger word "filter(":
- if not UserAuth.query.filter(UserAuth.username == 'user007').first():
-
-
-
-saampandit/flask-intro
-https://github.com/saampandit/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:02:18.820881
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Danielyao0312/flask-intro
-https://github.com/Danielyao0312/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:02:19.335347
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zachwooddoughty/flask-tester
-https://github.com/zachwooddoughty/flask-tester
-Entry file: flask-tester/hello.py
-Scanned: 2016-10-20 12:02:25.679930
-No vulnerabilities found.
-
-
-licsh/flask_app
-https://github.com/licsh/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:02:26.214355
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/licsh/flask_app.
-
-andresmguk/flask-blog
-https://github.com/andresmguk/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:02:26.809504
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-dencynluv/testing-flask
-https://github.com/dencynluv/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:02:27.314576
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-efrainmunoz/flask-blog
-https://github.com/efrainmunoz/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:02:30.883217
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-bdhammel/asteroid-flask
-https://github.com/bdhammel/asteroid-flask
-Entry file: asteroid-flask/game.py
-Scanned: 2016-10-20 12:02:34.391289
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dflee/testing-flask
-https://github.com/dflee/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:02:37.899053
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Ihyatt/testing-flask
-https://github.com/Ihyatt/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:02:38.411728
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gyermolenko/flask-modelhistory
-https://github.com/gyermolenko/flask-modelhistory
-Entry file: flask-modelhistory/example/app/__init__.py
-Scanned: 2016-10-20 12:02:40.777652
-No vulnerabilities found.
-
-
-hiro93n/sample_flask
-https://github.com/hiro93n/sample_flask
-Entry file: sample_flask/sample_flask.py
-Scanned: 2016-10-20 12:02:41.348560
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DraZoro/flask_learning
-https://github.com/DraZoro/flask_learning
-Entry file: flask_learning/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:02:43.034090
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-skols/flask_blog
-https://github.com/skols/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:02:43.541618
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Mingz2013/demo.flasky
-https://github.com/Mingz2013/demo.flasky
-Entry file: None
-Scanned: 2016-10-20 12:02:45.568389
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ahumeijun/RestfulTest
-https://github.com/ahumeijun/RestfulTest
-Entry file: RestfulTest/app/__init__.py
-Scanned: 2016-10-20 12:02:47.885895
-No vulnerabilities found.
-
-
-jlberzal/my_app
-https://github.com/jlberzal/my_app
-Entry file: my_app/app/__init__.py
-Scanned: 2016-10-20 12:02:48.749830
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Kathure/microblg
-https://github.com/Kathure/microblg
-Entry file: None
-Scanned: 2016-10-20 12:03:04.522923
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hufan-Akari/BookLibrary
-https://github.com/hufan-Akari/BookLibrary
-Entry file: BookLibrary/app/__init__.py
-Scanned: 2016-10-20 12:03:09.320044
-Vulnerability 1:
-File: BookLibrary/app/main/auth/views.py
- > User input at line 14, trigger word ".data":
- the_user = User.query.filter(User.email.ilike(login_form.email.data)).first()
-File: BookLibrary/app/main/auth/views.py
- > reaches line 14, trigger word "filter(":
- the_user = User.query.filter(User.email.ilike(login_form.email.data)).first()
-
-Vulnerability 2:
-File: BookLibrary/app/main/auth/views.py
- > User input at line 14, trigger word ".data":
- the_user = User.query.filter(User.email.ilike(login_form.email.data)).first()
-File: BookLibrary/app/main/auth/views.py
- > reaches line 17, trigger word "flash(":
- flash('登录成功! 欢迎您 %s!' % the_user.name, 'success')
-
-Vulnerability 3:
-File: BookLibrary/app/main/book/views.py
- > User input at line 14, trigger word "get(":
- search_word = request.args.get('search', None)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 23: search_word = search_word.strip()
- File: BookLibrary/app/main/book/views.py
- > Line 28: search_form.search.data = search_word
-File: BookLibrary/app/main/book/views.py
- > reaches line 24, trigger word "filter(":
- the_books = the_books.filter(db.or_(Book.title.ilike('%%%s%%' % search_word), Book.author.ilike('%%%s%%' % search_word), Book.isbn.ilike('%%%s%%' % search_word), Book.tags.any(Tag.name.ilike('%%%s%%' % search_word)), Book.subtitle.ilike('%%%s%%' % search_word))).outerjoin(Log).group_by(Book.id).order_by(db.func.count(Log.id).desc())
-
-Vulnerability 4:
-File: BookLibrary/app/main/book/views.py
- > User input at line 16, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 32: pagination = the_books.paginate(page,per_page=8)
- File: BookLibrary/app/main/book/views.py
- > Line 33: result_books = pagination.items
-File: BookLibrary/app/main/book/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book.html',books=result_books, pagination=pagination, search_form=search_form, title='书籍清单')
-
-Vulnerability 5:
-File: BookLibrary/app/main/book/views.py
- > User input at line 46, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 50: pagination = the_book.logs.filter_by(returned=show - 1).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5)
- File: BookLibrary/app/main/book/views.py
- > Line 53: pagination = the_book.comments.filter_by(deleted=0).order_by(Comment.edit_timestamp.desc()).paginate(page,per_page=5)
- File: BookLibrary/app/main/book/views.py
- > Line 56: data = pagination.items
-File: BookLibrary/app/main/book/views.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book_detail.html',book=the_book, data=data, pagination=pagination, form=form, title=the_book.title)
-
-Vulnerability 6:
-File: BookLibrary/app/main/book/views.py
- > User input at line 112, trigger word ".data":
- new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '')
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书')
-File: BookLibrary/app/main/book/views.py
- > reaches line 131, trigger word "flash(":
- flash('书籍 %s 已添加至图书馆!' % new_book.title, 'success')
-
-Vulnerability 7:
-File: BookLibrary/app/main/book/views.py
- > User input at line 112, trigger word ".data":
- new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '')
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书')
-File: BookLibrary/app/main/book/views.py
- > reaches line 132, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id))
-
-Vulnerability 8:
-File: BookLibrary/app/main/book/views.py
- > User input at line 112, trigger word ".data":
- new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '')
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书')
-File: BookLibrary/app/main/book/views.py
- > reaches line 132, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id))
-
-Vulnerability 9:
-File: BookLibrary/app/main/book/views.py
- > User input at line 161, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 179: pagination = the_books.paginate(page,per_page=8)
- File: BookLibrary/app/main/book/views.py
- > Line 180: data = pagination.items
- File: BookLibrary/app/main/book/views.py
- > Line 167: data = None
- File: BookLibrary/app/main/book/views.py
- > Line 168: pagination = None
-File: BookLibrary/app/main/book/views.py
- > reaches line 182, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book_tag.html',tags=the_tags, title='Tags', search_form=search_form, books=data, pagination=pagination)
-
-Vulnerability 10:
-File: BookLibrary/app/main/user/views.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/user/views.py
- > Line 15: pagination = User.query.order_by(User.id.desc()).paginate(page,per_page=10)
- File: BookLibrary/app/main/user/views.py
- > Line 16: users = pagination.items
-File: BookLibrary/app/main/user/views.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',users=users, pagination=pagination, title='已注册用户')
-
-Vulnerability 11:
-File: BookLibrary/app/main/user/views.py
- > User input at line 28, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/user/views.py
- > Line 29: pagination = the_user.logs.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5)
- File: BookLibrary/app/main/user/views.py
- > Line 31: logs = pagination.items
-File: BookLibrary/app/main/user/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user_detail.html',user=the_user, logs=logs, pagination=pagination, title='用户: ' + the_user.name)
-
-Vulnerability 12:
-File: BookLibrary/app/main/log/views.py
- > User input at line 14, trigger word "get(":
- book_id = request.args.get('book_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 15: the_book = Book.query.get_or_404(book_id)
- File: BookLibrary/app/main/log/views.py
- > Line 19: result = current_user.borrow_book(the_book)
- File: BookLibrary/app/main/log/views.py
- > Line 19: message = current_user.borrow_book(the_book)
-File: BookLibrary/app/main/log/views.py
- > reaches line 20, trigger word "flash(":
- flash(message, result'success''danger')
-
-Vulnerability 13:
-File: BookLibrary/app/main/log/views.py
- > User input at line 14, trigger word "get(":
- book_id = request.args.get('book_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 15: the_book = Book.query.get_or_404(book_id)
- File: BookLibrary/app/main/log/views.py
- > Line 19: result = current_user.borrow_book(the_book)
- File: BookLibrary/app/main/log/views.py
- > Line 19: message = current_user.borrow_book(the_book)
-File: BookLibrary/app/main/log/views.py
- > reaches line 22, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id))
-
-Vulnerability 14:
-File: BookLibrary/app/main/log/views.py
- > User input at line 14, trigger word "get(":
- book_id = request.args.get('book_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 15: the_book = Book.query.get_or_404(book_id)
- File: BookLibrary/app/main/log/views.py
- > Line 19: result = current_user.borrow_book(the_book)
- File: BookLibrary/app/main/log/views.py
- > Line 19: message = current_user.borrow_book(the_book)
-File: BookLibrary/app/main/log/views.py
- > reaches line 22, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id))
-
-Vulnerability 15:
-File: BookLibrary/app/main/log/views.py
- > User input at line 29, trigger word "get(":
- log_id = request.args.get('log_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 33: the_log = Log.query.get(log_id)
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
-File: BookLibrary/app/main/log/views.py
- > reaches line 40, trigger word "flash(":
- flash(message, result'success''danger')
-
-Vulnerability 16:
-File: BookLibrary/app/main/log/views.py
- > User input at line 33, trigger word "get(":
- the_log = Log.query.get(log_id)
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
-File: BookLibrary/app/main/log/views.py
- > reaches line 40, trigger word "flash(":
- flash(message, result'success''danger')
-
-Vulnerability 17:
-File: BookLibrary/app/main/log/views.py
- > User input at line 29, trigger word "get(":
- log_id = request.args.get('log_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 33: the_log = Log.query.get(log_id)
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
-File: BookLibrary/app/main/log/views.py
- > reaches line 42, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id))
-
-Vulnerability 18:
-File: BookLibrary/app/main/log/views.py
- > User input at line 29, trigger word "get(":
- log_id = request.args.get('log_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 33: the_log = Log.query.get(log_id)
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
-File: BookLibrary/app/main/log/views.py
- > reaches line 42, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id))
-
-Vulnerability 19:
-File: BookLibrary/app/main/log/views.py
- > User input at line 52, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 53: pagination = Log.query.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=10)
- File: BookLibrary/app/main/log/views.py
- > Line 54: logs = pagination.items
-File: BookLibrary/app/main/log/views.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('logs_info.html',logs=logs, pagination=pagination, title='借阅信息')
-
-
-
-katietarng/hb-testing-flask
-https://github.com/katietarng/hb-testing-flask
-Entry file: hb-testing-flask/party.py
-Scanned: 2016-10-20 12:03:12.825549
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lkpanganiban/flask-restful-example
-https://github.com/lkpanganiban/flask-restful-example
-Entry file: flask-restful-example/api.py
-Scanned: 2016-10-20 12:03:13.370675
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-qefir/Black-Jack-Flask-game
-https://github.com/qefir/Black-Jack-Flask-game
-Entry file: Black-Jack-Flask-game/BJenv/lib/python3.4/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:03:23.134826
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-p00gz/OLD-flask-imdbratings-app
-https://github.com/p00gz/OLD-flask-imdbratings-app
-Entry file: OLD-flask-imdbratings-app/imdbRatings/__init__.py
-Scanned: 2016-10-20 12:03:30.419891
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lysdexia/flask-svg-barcode
-https://github.com/lysdexia/flask-svg-barcode
-Entry file: None
-Scanned: 2016-10-20 12:03:32.286626
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lysdexia/flask-svg-barcode.
-
-Tiago-Lira/cookiecutter-flask-websocket
-https://github.com/Tiago-Lira/cookiecutter-flask-websocket
-Entry file: None
-Scanned: 2016-10-20 12:03:33.738923
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Tiago-Lira/cookiecutter-flask-websocket.
-
-davejonesbkk/flask_by_example
-https://github.com/davejonesbkk/flask_by_example
-Entry file: flask_by_example/app.py
-Scanned: 2016-10-20 12:03:43.690560
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py
-
-efrainmunoz/flask-hello-world
-https://github.com/efrainmunoz/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:03:44.235227
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-beckman16/flask-video-stream
-https://github.com/beckman16/flask-video-stream
-Entry file: flask-video-stream/app.py
-Scanned: 2016-10-20 12:03:46.960118
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-askiefer/flask-testing-2
-https://github.com/askiefer/flask-testing-2
-Entry file: flask-testing-2/party.py
-Scanned: 2016-10-20 12:03:49.886969
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-apaoing/apaoing-one-flask
-https://github.com/apaoing/apaoing-one-flask
-Entry file: apaoing-one-flask/hello.py
-Scanned: 2016-10-20 12:03:51.296538
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-njurgens/cookbook-api-flask
-https://github.com/njurgens/cookbook-api-flask
-Entry file: cookbook-api-flask/cookbook_api/app.py
-Scanned: 2016-10-20 12:03:53.200912
-No vulnerabilities found.
-
-
-jestoc01/flask-hello-world
-https://github.com/jestoc01/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:03:53.757917
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-responsible/Flask-Restful-Role-Auth
-https://github.com/responsible/Flask-Restful-Role-Auth
-Entry file: Flask-Restful-Role-Auth/App/__init__.py
-Scanned: 2016-10-20 12:03:55.088770
-Vulnerability 1:
-File: Flask-Restful-Role-Auth/App/__init__.py
- > User input at line 9, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-Restful-Role-Auth/App/__init__.py
- > Line 15: user_datastore = SQLAlchemyUserDatastore(db, User, Role)
- File: Flask-Restful-Role-Auth/App/__init__.py
- > Line 16: security = Security().init_app(app, user_datastore,register_blueprint=False)
-File: Flask-Restful-Role-Auth/App/__init__.py
- > reaches line 25, trigger word "execute(":
- db.engine.execute(roles_users.insert(),user_id=1, role_id=1)
-
-
-
-dyllanwli/MyFlaskProject
-https://github.com/dyllanwli/MyFlaskProject
-Entry file: MyFlaskProject/hello.py
-Scanned: 2016-10-20 12:03:56.388375
-No vulnerabilities found.
-
-
-rcuevass/Simple_Flask_App
-https://github.com/rcuevass/Simple_Flask_App
-Entry file: None
-Scanned: 2016-10-20 12:03:57.781227
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rcuevass/Simple_Flask_App.
-
-susantshrestha/flask-by-example
-https://github.com/susantshrestha/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:03:58.469798
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-johnwheeler/flask-ask
-https://github.com/johnwheeler/flask-ask
-Entry file: flask-ask/server.py
-Scanned: 2016-10-20 12:04:00.338916
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-maxweiber/flask
-https://github.com/maxweiber/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:04:00.919409
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-syntaxSizer/flask
-https://github.com/syntaxSizer/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:04:01.525716
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-gabrielecker/Flask
-https://github.com/gabrielecker/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:04:02.013581
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ryanmthompson/flask
-https://github.com/ryanmthompson/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:04:02.598186
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-parampara/flask
-https://github.com/parampara/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:04:03.188165
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-miguelgrinberg/flack
-https://github.com/miguelgrinberg/flack
-Entry file: flack/flack/__init__.py
-Scanned: 2016-10-20 12:04:05.018054
-Vulnerability 1:
-File: flack/flack/api/users.py
- > User input at line 38, trigger word "get(":
- users = users.filter_by(online=request.args.get('online') != '0')
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
-File: flack/flack/api/users.py
- > reaches line 40, trigger word "filter(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-
-Vulnerability 2:
-File: flack/flack/api/users.py
- > User input at line 40, trigger word "get(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
- File: flack/flack/api/users.py
- > Line 38: users = users.filter_by(online=request.args.get('online') != '0')
-File: flack/flack/api/users.py
- > reaches line 40, trigger word "filter(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-
-Vulnerability 3:
-File: flack/flack/api/users.py
- > User input at line 38, trigger word "get(":
- users = users.filter_by(online=request.args.get('online') != '0')
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
-File: flack/flack/api/users.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()])
-
-Vulnerability 4:
-File: flack/flack/api/users.py
- > User input at line 40, trigger word "get(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
- File: flack/flack/api/users.py
- > Line 38: users = users.filter_by(online=request.args.get('online') != '0')
-File: flack/flack/api/users.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()])
-
-Vulnerability 5:
-File: flack/flack/api/messages.py
- > User input at line 36, trigger word "get(":
- since = int(request.args.get('updated_since', '0'))
-Reassigned in:
- File: flack/flack/api/messages.py
- > Line 40: since = day_ago
-File: flack/flack/api/messages.py
- > reaches line 41, trigger word "filter(":
- msgs = Message.query.filter(Message.updated_at > since).order_by(Message.updated_at)
-
-
-
-TwilioDevEd/sms2fa-flask
-https://github.com/TwilioDevEd/sms2fa-flask
-Entry file: sms2fa-flask/sms2fa_flask/__init__.py
-Scanned: 2016-10-20 12:04:10.196637
-Vulnerability 1:
-File: sms2fa-flask/sms2fa_flask/views.py
- > User input at line 51, trigger word "get(":
- user = User.query.get(session.get('user_email', '')) or abort(401)
-Reassigned in:
- File: sms2fa-flask/sms2fa_flask/views.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('secret_page'))
-File: sms2fa-flask/sms2fa_flask/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirmation.html',user=user)
-
-
-
-RoseOu/Flask-learning
-https://github.com/RoseOu/Flask-learning
-Entry file: Flask-learning/flaskblog/app/__init__.py
-Scanned: 2016-10-20 12:04:17.730323
-No vulnerabilities found.
-
-
-YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg
-https://github.com/YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg
-Entry file: uwsgi-nginx-flask-docker-for-sinaimg/flask/app/main.py
-Scanned: 2016-10-20 12:04:21.347401
-No vulnerabilities found.
-
-
-datademofun/heroku-basic-flask
-https://github.com/datademofun/heroku-basic-flask
-Entry file: heroku-basic-flask/app.py
-Scanned: 2016-10-20 12:04:26.090256
-No vulnerabilities found.
-
-
-amey-sam/Flask-MailGun
-https://github.com/amey-sam/Flask-MailGun
-Entry file: None
-Scanned: 2016-10-20 12:04:26.601531
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun.
-
-DullSmile/flasky
-https://github.com/DullSmile/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:04:27.106496
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andresmguk/flasktaskr
-https://github.com/andresmguk/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:04:27.629372
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-minc-yang/flaskdemo
-https://github.com/minc-yang/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 12:04:28.155493
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-efrainmunoz/flasktaskr
-https://github.com/efrainmunoz/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:04:31.696897
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zjl1110/flaskdemo
-https://github.com/zjl1110/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 12:04:34.764946
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yvonnendutaw/flaskbook
-https://github.com/yvonnendutaw/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:04:44.317966
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-chestnutme/flaskie
-https://github.com/chestnutme/flaskie
-Entry file: flaskie/app/__init__.py
-Scanned: 2016-10-20 12:04:46.061338
-Vulnerability 1:
-File: flaskie/app/main/views.py
- > User input at line 18, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 29: posts = pagination.items
- File: flaskie/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskie/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskie/app/main/views.py
- > User input at line 21, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 19: show_followed = False
- File: flaskie/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskie/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskie/app/main/views.py
- > User input at line 36, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 37: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 39: posts = pagination.items
-File: flaskie/app/main/views.py
- > reaches line 40, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskie/app/main/views.py
- > User input at line 95, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 97: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskie/app/main/views.py
- > Line 99: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 102: comments = pagination.items
- File: flaskie/app/main/views.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskie/app/main/views.py
- > reaches line 103, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskie/app/main/views.py
- > User input at line 158, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 159: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskie/app/main/views.py
- > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flaskie/app/main/views.py
- > reaches line 164, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskie/app/main/views.py
- > User input at line 174, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 175: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'])
- File: flaskie/app/main/views.py
- > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskie/app/main/views.py
- > Line 173: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flaskie/app/main/views.py
- > reaches line 179, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-fengyu225/flaskr
-https://github.com/fengyu225/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:04:47.579404
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jbussdieker/flaskr
-https://github.com/jbussdieker/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:04:51.093993
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-richardqlin/flaskralchemy
-https://github.com/richardqlin/flaskralchemy
-Entry file: None
-Scanned: 2016-10-20 12:04:52.589103
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy.
-
-garaud/flask-restplus-meetup
-https://github.com/garaud/flask-restplus-meetup
-Entry file: flask-restplus-meetup/simple_app.py
-Scanned: 2016-10-20 12:04:54.031913
-No vulnerabilities found.
-
-
-ibrahimirdem/flask-numaradan-isim
-https://github.com/ibrahimirdem/flask-numaradan-isim
-Entry file: flask-numaradan-isim/app.py
-Scanned: 2016-10-20 12:04:55.356058
-Vulnerability 1:
-File: flask-numaradan-isim/app.py
- > User input at line 18, trigger word "form[":
- gelen = request.form['numara']
-Reassigned in:
- File: flask-numaradan-isim/app.py
- > Line 22: sonuc = fonksiyonlar.numara_denetim(gelen)
- File: flask-numaradan-isim/app.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home'))
- File: flask-numaradan-isim/app.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home'))
-File: flask-numaradan-isim/app.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('sonuc.html',dogruluk=sonuc[0], isim=sonuc[1], id=sonuc[2])
-
-
-
-belljustin/FlaskDeploy
-https://github.com/belljustin/FlaskDeploy
-Entry file: FlaskDeploy/deploy.py
-Scanned: 2016-10-20 12:04:56.668272
-No vulnerabilities found.
-
-
-ArvidQuarshie/FlaskAuthentication
-https://github.com/ArvidQuarshie/FlaskAuthentication
-Entry file: None
-Scanned: 2016-10-20 12:05:02.060528
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ArvidQuarshie/FlaskAuthentication.
-
-andresmguk/flasktaskr1
-https://github.com/andresmguk/flasktaskr1
-Entry file: flasktaskr1/views.py
-Scanned: 2016-10-20 12:05:09.412152
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andresmguk/flasktaskr2
-https://github.com/andresmguk/flasktaskr2
-Entry file: flasktaskr2/views.py
-Scanned: 2016-10-20 12:05:16.653239
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zjyExcelsior/FlaskSkeleton
-https://github.com/zjyExcelsior/FlaskSkeleton
-Entry file: FlaskSkeleton/myapp/__init__.py
-Scanned: 2016-10-20 12:05:18.042523
-No vulnerabilities found.
-
-
-er3456qi/FlaskTutorial
-https://github.com/er3456qi/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 12:05:18.551981
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kelvinmuchui/flaskApp
-https://github.com/kelvinmuchui/flaskApp
-Entry file: flaskApp/apiApp_new.py
-Scanned: 2016-10-20 12:05:19.075342
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ptomelle/flaskNew
-https://github.com/ptomelle/flaskNew
-Entry file: flaskNew/wsgi/myflaskapp.py
-Scanned: 2016-10-20 12:05:22.510251
-No vulnerabilities found.
-
-
-sr77/Restaurant-Web-Application
-https://github.com/sr77/Restaurant-Web-Application
-Entry file: Restaurant-Web-Application/project.py
-Scanned: 2016-10-20 12:05:23.939181
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Almazi/Flask_Project_RealPython
-https://github.com/Almazi/Flask_Project_RealPython
-Entry file: Flask_Project_RealPython/app.py
-Scanned: 2016-10-20 12:05:27.401463
-No vulnerabilities found.
-
-
-hamidfzm/Rest-in-Flask
-https://github.com/hamidfzm/Rest-in-Flask
-Entry file: Rest-in-Flask/application/__init__.py
-Scanned: 2016-10-20 12:05:28.842748
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhujinliang/flask-based-web-framework
-https://github.com/zhujinliang/flask-based-web-framework
-Entry file: flask-based-web-framework/core/__init__.py
-Scanned: 2016-10-20 12:05:30.477628
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lipemorais/todo-flask
-https://github.com/lipemorais/todo-flask
-Entry file: None
-Scanned: 2016-10-20 12:05:30.987138
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lipemorais/todo-flask.
-
-tonuidavies/Blog-flask
-https://github.com/tonuidavies/Blog-flask
-Entry file: None
-Scanned: 2016-10-20 12:05:40.815107
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-LpanatoPlanzi/flask-app
-https://github.com/LpanatoPlanzi/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:05:41.332465
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ksripathi/flask-app
-https://github.com/ksripathi/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:05:41.836831
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-maheskett/flask-testing
-https://github.com/maheskett/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:05:42.340584
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kellyhiggins/Flask-testing
-https://github.com/kellyhiggins/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-20 12:05:42.840343
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laurensila/flask-testing
-https://github.com/laurensila/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:05:43.336760
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jaronoff97/Flask-Boilerplate
-https://github.com/jaronoff97/Flask-Boilerplate
-Entry file: Flask-Boilerplate/flaskapp.py
-Scanned: 2016-10-20 12:05:44.854528
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zjl1110/flask-demo
-https://github.com/zjl1110/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:05:45.446661
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zjl1110/flask-demo.
-
-hadesong/Flask_Issues
-https://github.com/hadesong/Flask_Issues
-Entry file: None
-Scanned: 2016-10-20 12:05:46.841576
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hadesong/Flask_Issues.
-
-jayanth2810/Heroku_Flask
-https://github.com/jayanth2810/Heroku_Flask
-Entry file: Heroku_Flask/app/app.py
-Scanned: 2016-10-20 12:05:48.137369
-No vulnerabilities found.
-
-
-ArvidQuarshie/DiscoverFlask
-https://github.com/ArvidQuarshie/DiscoverFlask
-Entry file: None
-Scanned: 2016-10-20 12:05:56.186746
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kosma24/labrat-flask
-https://github.com/kosma24/labrat-flask
-Entry file: labrat-flask/lab.py
-Scanned: 2016-10-20 12:05:59.061520
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paceko/testing-flask
-https://github.com/paceko/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:05:59.567572
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-minyisme/flask-testing
-https://github.com/minyisme/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:06:00.060830
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cristinamclarkin/Flask-testing
-https://github.com/cristinamclarkin/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-20 12:06:00.549945
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sangqt/learn-flask
-https://github.com/sangqt/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:06:01.228232
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nathanism/flask-app
-https://github.com/nathanism/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:06:02.212490
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-iuhsihsow/hello_flask
-https://github.com/iuhsihsow/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-20 12:06:02.721366
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-amsuny/flask-site
-https://github.com/amsuny/flask-site
-Entry file: None
-Scanned: 2016-10-20 12:06:10.258822
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bigzhao/Flask-Tasks
-https://github.com/bigzhao/Flask-Tasks
-Entry file: Flask-Tasks/flasktask/app/__init__.py
-Scanned: 2016-10-20 12:06:22.893656
-Vulnerability 1:
-File: Flask-Tasks/flasktask/app/auth/views.py
- > User input at line 124, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Flask-Tasks/flasktask/app/auth/views.py
- > Line 129: filename = secure_filename(file.filename)
-File: Flask-Tasks/flasktask/app/auth/views.py
- > reaches line 131, trigger word "url_for(":
- current_user.image_url = url_for('auth.static',filename='%s/%s' % ('avatar', filename))
-
-Vulnerability 2:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 26, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 28: pagination = current_user.circles[-1].tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 31: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 3:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 33, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 4:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 53, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 57: pagination = c.tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 60: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 63, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 5:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 62, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 63, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 6:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 167, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 168, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('circle.html',new_messages=int(new_messages))
-
-Vulnerability 7:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 189, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.circle'))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 190, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('create_circle.html',new_messages=int(new_messages), form=form)
-
-Vulnerability 8:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 196, trigger word "get(":
- message = request.form.get('message')
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 200, trigger word "filter(":
- c = db.session.query(Circle).filter(Circle.name.like('%' + message + '%')).all()
-
-Vulnerability 9:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 202, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 203, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_circle.html',new_messages=int(new_messages), circles=c)
-
-Vulnerability 10:
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 13:
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 16:
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 17:
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 18:
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 19:
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 13: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 14: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 17: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > reaches line 16, trigger word "url_for(":
- prev = url_for('api.get_tasks',page=page - 1, _external=True)
-
-Vulnerability 20:
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 13: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 14: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 17: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > reaches line 19, trigger word "url_for(":
- next = url_for('api.get_tasks',page=page + 1, _external=True)
-
-Vulnerability 21:
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 13: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 14: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 17: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > reaches line 20, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('tasks''prev''next''count'[task.to_json() for task in tasks]prevnextpagination.total)
-
-Vulnerability 22:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 23: pagination = current_user.circles[-1].posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 26: posts = pagination.items
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 23:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 28, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 24:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 45, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 46: pagination = c.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 49: posts = pagination.items
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 25:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 51, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 26:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 94, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 95: pagination = user.posts.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 98: posts = pagination.items
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 100: posts = []
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 101: posts = pagination.items
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 104, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages))
-
-Vulnerability 27:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 103, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 104, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages))
-
-
-
-gpgomes/pyFlask
-https://github.com/gpgomes/pyFlask
-Entry file: pyFlask/server.py
-Scanned: 2016-10-20 12:06:24.208604
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-M4riacg/api-flask
-https://github.com/M4riacg/api-flask
-Entry file: api-flask/api_flask.py
-Scanned: 2016-10-20 12:06:25.506418
-No vulnerabilities found.
-
-
-9217392354A/flask-stuff
-https://github.com/9217392354A/flask-stuff
-Entry file: flask-stuff/__init__.py
-Scanned: 2016-10-20 12:06:32.464751
-No vulnerabilities found.
-
-
-mprather1/flask_hello
-https://github.com/mprather1/flask_hello
-Entry file: flask_hello/hello_world.py
-Scanned: 2016-10-20 12:06:33.138299
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Nana2mini/Flask-Blog
-https://github.com/Nana2mini/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 12:06:34.252758
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dencynluv/testing-flask
-https://github.com/dencynluv/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:06:34.749149
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-efrainmunoz/flask-blog
-https://github.com/efrainmunoz/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:06:35.288492
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-linked0/first-flask
-https://github.com/linked0/first-flask
-Entry file: None
-Scanned: 2016-10-20 12:06:35.820144
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nlesc-sherlock/spark-flask
-https://github.com/nlesc-sherlock/spark-flask
-Entry file: spark-flask/app.py
-Scanned: 2016-10-20 12:06:42.151450
-No vulnerabilities found.
-
-
-BethMwangi/flask-intro
-https://github.com/BethMwangi/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:06:42.681570
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zjl1110/flask-blogmy
-https://github.com/zjl1110/flask-blogmy
-Entry file: None
-Scanned: 2016-10-20 12:06:50.782738
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-skrillex581/flask-insight
-https://github.com/skrillex581/flask-insight
-Entry file: flask-insight/app/__init__.py
-Scanned: 2016-10-20 12:06:52.339666
-No vulnerabilities found.
-
-
-balalay12/flask-cachlka
-https://github.com/balalay12/flask-cachlka
-Entry file: flask-cachlka/app/__init__.py
-Scanned: 2016-10-20 12:06:54.137843
-Vulnerability 1:
-File: flask-cachlka/app/views.py
- > User input at line 230, trigger word "get(":
- repeat = Repeats.query.get(int(id))
-Reassigned in:
- File: flask-cachlka/app/views.py
- > Line 231: s = Sets.query.get(repeat.set_id)
- File: flask-cachlka/app/views.py
- > Line 233: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе'))
- File: flask-cachlka/app/views.py
- > Line 235: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.'))
-File: flask-cachlka/app/views.py
- > reaches line 236, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(repeat=repeat.serialize)
-
-Vulnerability 2:
-File: flask-cachlka/app/views.py
- > User input at line 293, trigger word "get(":
- category = Categories.query.get(int(id))
-File: flask-cachlka/app/views.py
- > reaches line 294, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(exercises=[exercise.serialize for exercise in category.exercises.all()])
-
-Vulnerability 3:
-File: flask-cachlka/app/views.py
- > User input at line 312, trigger word "get(":
- body_size = BodySize.query.get(int(id))
-Reassigned in:
- File: flask-cachlka/app/views.py
- > Line 314: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе'))
- File: flask-cachlka/app/views.py
- > Line 316: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.'))
-File: flask-cachlka/app/views.py
- > reaches line 317, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(body_size=body_size.serialize)
-
-
-
-mythreyaraj/python-flask
-https://github.com/mythreyaraj/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 12:06:54.668071
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Lypzero/flask_studing
-https://github.com/Lypzero/flask_studing
-Entry file: flask_studing/app/__init__.py
-Scanned: 2016-10-20 12:06:56.334647
-Vulnerability 1:
-File: flask_studing/app/main/views.py
- > User input at line 20, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 28: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 29: posts = pagination.items
- File: flask_studing/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 2:
-File: flask_studing/app/main/views.py
- > User input at line 23, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 21: show_followed = False
- File: flask_studing/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 3:
-File: flask_studing/app/main/views.py
- > User input at line 42, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 43: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 46: posts = pagination.items
-File: flask_studing/app/main/views.py
- > reaches line 47, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask_studing/app/main/views.py
- > User input at line 108, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 109: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 110: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_studing/app/main/views.py
- > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: flask_studing/app/main/views.py
- > User input at line 119, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 120: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 123: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_studing/app/main/views.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 125, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-dflee/testing-flask
-https://github.com/dflee/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:06:56.841357
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Ihyatt/testing-flask
-https://github.com/Ihyatt/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:06:57.341782
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stefanbro/flask-circle
-https://github.com/stefanbro/flask-circle
-Entry file: flask-circle/app/__init__.py
-Scanned: 2016-10-20 12:07:00.462356
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Clemenshemmerling/flask-docker
-https://github.com/Clemenshemmerling/flask-docker
-Entry file: flask-docker/compose/app.py
-Scanned: 2016-10-20 12:07:01.752755
-No vulnerabilities found.
-
-
-rajatgermany/Rajat5
-https://github.com/rajatgermany/Rajat5
-Entry file: Rajat5/forms.py
-Scanned: 2016-10-20 12:07:03.088040
-No vulnerabilities found.
-
-
-amirthn/irpycoderzz
-https://github.com/amirthn/irpycoderzz
-Entry file: irpycoderzz/app.py
-Scanned: 2016-10-20 12:07:04.378554
-No vulnerabilities found.
-
-
-chxy325/studyflask
-https://github.com/chxy325/studyflask
-Entry file: studyflask/hello.py
-Scanned: 2016-10-20 12:07:05.675973
-No vulnerabilities found.
-
-
-moling3650/microblog
-https://github.com/moling3650/microblog
-Entry file: None
-Scanned: 2016-10-20 12:07:06.224044
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gekorob/liebraryrest
-https://github.com/gekorob/liebraryrest
-Entry file: liebraryrest/liebraryrest/app.py
-Scanned: 2016-10-20 12:07:07.901499
-Vulnerability 1:
-File: liebraryrest/liebraryrest/api/authors.py
- > User input at line 14, trigger word "get(":
- qry = qry.filter(Author.name.contains(request.args.get('name')))
-Reassigned in:
- File: liebraryrest/liebraryrest/api/authors.py
- > Line 11: qry = Author.query
-File: liebraryrest/liebraryrest/api/authors.py
- > reaches line 14, trigger word "filter(":
- qry = qry.filter(Author.name.contains(request.args.get('name')))
-
-
-
-jlanio/Flask-RestlessLoginToken
-https://github.com/jlanio/Flask-RestlessLoginToken
-Entry file: Flask-RestlessLoginToken/models.py
-Scanned: 2016-10-20 12:07:10.260163
-No vulnerabilities found.
-
-
-vibhor1510/COMS-6156-Flask-App
-https://github.com/vibhor1510/COMS-6156-Flask-App
-Entry file: None
-Scanned: 2016-10-20 12:07:17.191490
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vibhor1510/COMS-6156-Flask-App.
-
-azedlee/flask_hello_world
-https://github.com/azedlee/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 12:07:18.741953
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/azedlee/flask_hello_world.
-
-BeenzSyed/flask-random-quote
-https://github.com/BeenzSyed/flask-random-quote
-Entry file: flask-random-quote/app.py
-Scanned: 2016-10-20 12:07:25.097804
-No vulnerabilities found.
-
-
-Firdaus1/Hello_world_Flask
-https://github.com/Firdaus1/Hello_world_Flask
-Entry file: Hello_world_Flask/FirdausCS3320.py
-Scanned: 2016-10-20 12:07:26.413512
-No vulnerabilities found.
-
-
-JesseE/flask-demo-viewer
-https://github.com/JesseE/flask-demo-viewer
-Entry file: flask-demo-viewer/app.py
-Scanned: 2016-10-20 12:07:34.479407
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-demo-viewer/venv/lib/python2.7/genericpath.py
-
-katietarng/hb-testing-flask
-https://github.com/katietarng/hb-testing-flask
-Entry file: hb-testing-flask/party.py
-Scanned: 2016-10-20 12:07:34.986814
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stack-templates/cde-flask-init-project
-https://github.com/stack-templates/cde-flask-init-project
-Entry file: cde-flask-init-project/main.py
-Scanned: 2016-10-20 12:07:36.335152
-No vulnerabilities found.
-
-
-HenryZivers/Flask-Microblog-App
-https://github.com/HenryZivers/Flask-Microblog-App
-Entry file: Flask-Microblog-App/app/__init__.py
-Scanned: 2016-10-20 12:07:37.787537
-No vulnerabilities found.
-
-
-Skycker/lsa-flask-preview
-https://github.com/Skycker/lsa-flask-preview
-Entry file: lsa-flask-preview/lsa-flask-preview.py
-Scanned: 2016-10-20 12:07:39.355640
-Vulnerability 1:
-File: lsa-flask-preview/lsa-flask-preview.py
- > User input at line 88, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: lsa-flask-preview/lsa-flask-preview.py
- > Line 92: semantic_results = search_by_lsa(query)
- File: lsa-flask-preview/lsa-flask-preview.py
- > Line 93: sphinx_results = search_by_sphinx(query)
- File: lsa-flask-preview/lsa-flask-preview.py
- > Line 89: semantic_results = list()
- File: lsa-flask-preview/lsa-flask-preview.py
- > Line 90: sphinx_results = list()
-File: lsa-flask-preview/lsa-flask-preview.py
- > reaches line 94, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('news.html',semantic_results=semantic_results, compare_results=sphinx_results, query=query)
-
-
-
-aurora71/flask-Smart-seat-realtime
-https://github.com/aurora71/flask-Smart-seat-realtime
-Entry file: None
-Scanned: 2016-10-20 12:07:40.768256
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/aurora71/flask-Smart-seat-realtime.
-
-s4swadhin/flask-hello-world
-https://github.com/s4swadhin/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:07:41.349328
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-matthewR1993/flask-gant-fun
-https://github.com/matthewR1993/flask-gant-fun
-Entry file: flask-gant-fun/run.py
-Scanned: 2016-10-20 12:07:42.879710
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-glrh111/flask
-https://github.com/glrh111/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:07:51.402510
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-parampara/flask
-https://github.com/parampara/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:07:52.990603
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-zhangsen1992/flask
-https://github.com/zhangsen1992/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:07:55.551175
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Mufflerman/Flask
-https://github.com/Mufflerman/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:07:56.050588
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rakeshkirola/Flask
-https://github.com/rakeshkirola/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:07:57.557605
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-caibitim/Flask
-https://github.com/caibitim/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:07:58.068274
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rockaja/flask
-https://github.com/rockaja/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:07:58.640251
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-bhops/flask
-https://github.com/bhops/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:08:01.227405
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-enginebai/PyMessager
-https://github.com/enginebai/PyMessager
-Entry file: PyMessager/api.py
-Scanned: 2016-10-20 12:08:03.681430
-No vulnerabilities found.
-
-
-YUX-IO/gossl
-https://github.com/YUX-IO/gossl
-Entry file: gossl/app.py
-Scanned: 2016-10-20 12:08:12.321941
-No vulnerabilities found.
-
-
-yetship/the-way-to-flask
-https://github.com/yetship/the-way-to-flask
-Entry file: the-way-to-flask/code/application/__init__.py
-Scanned: 2016-10-20 12:08:16.307118
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JoshData/parsey-mcparseface-server
-https://github.com/JoshData/parsey-mcparseface-server
-Entry file: parsey-mcparseface-server/server.py
-Scanned: 2016-10-20 12:08:17.693961
-No vulnerabilities found.
-
-
-geochilmaru/flaskr
-https://github.com/geochilmaru/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:08:18.691232
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hejiangping/flaskr
-https://github.com/hejiangping/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:08:19.198920
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zmrow/flasktaskr
-https://github.com/zmrow/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:08:19.704258
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Jpatcourtney/flasktasker
-https://github.com/Jpatcourtney/flasktasker
-Entry file: flasktasker/views.py
-Scanned: 2016-10-20 12:08:21.275496
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-liyocee/flaskr
-https://github.com/liyocee/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:08:21.784321
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yanni-zhang/flaskweb
-https://github.com/yanni-zhang/flaskweb
-Entry file: None
-Scanned: 2016-10-20 12:08:25.780610
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-googoos/flasktaskr
-https://github.com/googoos/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:08:27.289609
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Jpatcourtney/flasktaskr
-https://github.com/Jpatcourtney/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:08:35.840710
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-janejin8829/flaskangular-
-https://github.com/janejin8829/flaskangular-
-Entry file: None
-Scanned: 2016-10-20 12:08:37.173772
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/janejin8829/flaskangular-.
-
-ljxxcaijing/flaskblog
-https://github.com/ljxxcaijing/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:08:37.731763
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-ordenador/flaskrestful
-https://github.com/ordenador/flaskrestful
-Entry file: flaskrestful/flaskrestful.py
-Scanned: 2016-10-20 12:08:43.575688
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhangjiewang/flasky
-https://github.com/zhangjiewang/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:08:44.102545
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Kathure/flasky
-https://github.com/Kathure/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:08:44.603257
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-maxweiber/flaskr
-https://github.com/maxweiber/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:08:45.123896
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrdrms/flaskr
-https://github.com/mrdrms/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:08:45.637763
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fburkitt/flasktaskr
-https://github.com/fburkitt/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:08:46.141693
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-asimonia/flasktaskr
-https://github.com/asimonia/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:08:51.650721
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sisyphus1993/flaskreview
-https://github.com/sisyphus1993/flaskreview
-Entry file: flaskreview/app/__init__.py
-Scanned: 2016-10-20 12:08:54.742423
-Vulnerability 1:
-File: flaskreview/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 31: posts = pagination.items
- File: flaskreview/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskreview/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 22: show_followed = False
- File: flaskreview/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskreview/app/main/views.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 40: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 42: posts = pagination.items
-File: flaskreview/app/main/views.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskreview/app/main/views.py
- > User input at line 102, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 104: page = post.comments.count() - 1 // 20 + 1
- File: flaskreview/app/main/views.py
- > Line 105: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 107: comments = pagination.items
- File: flaskreview/app/main/views.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskreview/app/main/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskreview/app/main/views.py
- > User input at line 167, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 168: pagination = user.followers.paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 170: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskreview/app/main/views.py
- > Line 166: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 172, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskreview/app/main/views.py
- > User input at line 183, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 184: pagination = user.followed.paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 186: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskreview/app/main/views.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 188, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskreview/app/main/views.py
- > User input at line 213, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 214: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 217: comments = pagination.items
-File: flaskreview/app/main/views.py
- > reaches line 218, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flaskreview/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskreview/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskreview/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskreview/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flaskreview/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskreview/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskreview/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskreview/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flaskreview/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskreview/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskreview/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskreview/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-rakeshkirola/FlaskTaskr
-https://github.com/rakeshkirola/FlaskTaskr
-Entry file: FlaskTaskr/views.py
-Scanned: 2016-10-20 12:08:56.899542
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py
-
-demoleas21/FlaskHW
-https://github.com/demoleas21/FlaskHW
-Entry file: FlaskHW/app.py
-Scanned: 2016-10-20 12:08:59.240645
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andresmguk/FlaskApp
-https://github.com/andresmguk/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:09:00.370777
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tonuidavies/flask1
-https://github.com/tonuidavies/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 12:09:01.064884
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-andresmguk/flasktaskr4
-https://github.com/andresmguk/flasktaskr4
-Entry file: flasktaskr4/views.py
-Scanned: 2016-10-20 12:09:08.344806
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mzfenng/flaskBlog
-https://github.com/mzfenng/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 12:09:08.951807
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-coding-happily/FlaskTest
-https://github.com/coding-happily/FlaskTest
-Entry file: None
-Scanned: 2016-10-20 12:09:09.481087
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/coding-happily/FlaskTest.
-
-sajjadAI/FlaskSocial
-https://github.com/sajjadAI/FlaskSocial
-Entry file: FlaskSocial/app.py
-Scanned: 2016-10-20 12:09:14.280189
-Vulnerability 1:
-File: FlaskSocial/app.py
- > User input at line 92, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: FlaskSocial/app.py
- > Line 99: user = current_user
-File: FlaskSocial/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: FlaskSocial/app.py
- > User input at line 197, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: FlaskSocial/app.py
- > reaches line 209, trigger word "flash(":
- flash('You're now following {}!'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: FlaskSocial/app.py
- > User input at line 197, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: FlaskSocial/app.py
- > reaches line 210, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: FlaskSocial/app.py
- > User input at line 197, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: FlaskSocial/app.py
- > reaches line 210, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: FlaskSocial/app.py
- > User input at line 217, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: FlaskSocial/app.py
- > reaches line 229, trigger word "flash(":
- flash('You're now unfollowed {}!'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: FlaskSocial/app.py
- > User input at line 217, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: FlaskSocial/app.py
- > reaches line 230, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: FlaskSocial/app.py
- > User input at line 217, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: FlaskSocial/app.py
- > reaches line 230, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-sr77/Restaurant-Web-Application
-https://github.com/sr77/Restaurant-Web-Application
-Entry file: Restaurant-Web-Application/project.py
-Scanned: 2016-10-20 12:09:17.793985
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GalaIO/template-for-flask
-https://github.com/GalaIO/template-for-flask
-Entry file: template-for-flask/app/__init__.py
-Scanned: 2016-10-20 12:09:19.245267
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kua-hosi-GRUp/Flask-Bones
-https://github.com/kua-hosi-GRUp/Flask-Bones
-Entry file: Flask-Bones/app/__init__.py
-Scanned: 2016-10-20 12:09:25.883251
-Vulnerability 1:
-File: Flask-Bones/app/auth/views.py
- > User input at line 46, trigger word ".data":
- group = Group.create(nazev=form.data['nazev'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 48, trigger word "flash(":
- flash(gettext('Group {name} created').format(name=group.nazev), 'success')
-
-Vulnerability 2:
-File: Flask-Bones/app/auth/views.py
- > User input at line 58, trigger word ".data":
- firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 65, trigger word "flash(":
- flash(gettext('Organization {name} created').format(name=firma.nazev), 'success')
-
-Vulnerability 3:
-File: Flask-Bones/app/public/views.py
- > User input at line 37, trigger word ".data":
- user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni'])
-Reassigned in:
- File: Flask-Bones/app/public/views.py
- > Line 47: token = s.dumps(user.id)
-File: Flask-Bones/app/public/views.py
- > reaches line 51, trigger word "flash(":
- flash(gettext('Sent verification email to {email}').format(email=user.email), 'success')
-
-
-
-orizohar/flask-app
-https://github.com/orizohar/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:09:26.412919
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gwong89/flask-ci
-https://github.com/gwong89/flask-ci
-Entry file: flask-ci/app.py
-Scanned: 2016-10-20 12:09:35.531109
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zmrow/flask-blog
-https://github.com/zmrow/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:09:36.087807
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-joelcolucci/scaffold-flask
-https://github.com/joelcolucci/scaffold-flask
-Entry file: None
-Scanned: 2016-10-20 12:09:37.439776
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/joelcolucci/scaffold-flask.
-
-apighi/NewFlask
-https://github.com/apighi/NewFlask
-Entry file: NewFlask/wsgi/myflaskapp.py
-Scanned: 2016-10-20 12:09:40.882795
-No vulnerabilities found.
-
-
-PaperAndColours/flask_base
-https://github.com/PaperAndColours/flask_base
-Entry file: flask_base/app.py
-Scanned: 2016-10-20 12:09:43.518398
-No vulnerabilities found.
-
-
-richardqlin/flask_class
-https://github.com/richardqlin/flask_class
-Entry file: flask_class/url_for.py
-Scanned: 2016-10-20 12:09:47.534538
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rakeshkirola/Flask-Blog
-https://github.com/rakeshkirola/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 12:09:48.053752
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ripitrust/flask_react
-https://github.com/ripitrust/flask_react
-Entry file: flask_react/flask_react/worker.py
-Scanned: 2016-10-20 12:09:49.557434
-No vulnerabilities found.
-
-
-db521/sendmail_flask
-https://github.com/db521/sendmail_flask
-Entry file: sendmail_flask/study/view.py
-Scanned: 2016-10-20 12:09:56.718985
-No vulnerabilities found.
-
-
-joelcolucci/flask-responseext
-https://github.com/joelcolucci/flask-responseext
-Entry file: flask-responseext/tests/mock_app.py
-Scanned: 2016-10-20 12:09:58.192223
-No vulnerabilities found.
-
-
-hadesong/Flask_Issues
-https://github.com/hadesong/Flask_Issues
-Entry file: None
-Scanned: 2016-10-20 12:09:58.695138
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hadesong/Flask_Issues.
-
-jayanth2810/Heroku_Flask
-https://github.com/jayanth2810/Heroku_Flask
-Entry file: Heroku_Flask/app/app.py
-Scanned: 2016-10-20 12:10:00.021903
-No vulnerabilities found.
-
-
-hubert-lee/study_flask
-https://github.com/hubert-lee/study_flask
-Entry file: None
-Scanned: 2016-10-20 12:10:09.724936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-liyocee/flask_biggy
-https://github.com/liyocee/flask_biggy
-Entry file: flask_biggy/app/__init__.py
-Scanned: 2016-10-20 12:10:11.053363
-Vulnerability 1:
-File: flask_biggy/app/auth/controllers.py
- > User input at line 33, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: flask_biggy/app/auth/controllers.py
- > Line 37: session['user_id'] = user.id
-File: flask_biggy/app/auth/controllers.py
- > reaches line 39, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-mjdough/learning-flask
-https://github.com/mjdough/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 12:10:11.705157
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-branweb1/flask_todo
-https://github.com/branweb1/flask_todo
-Entry file: None
-Scanned: 2016-10-20 12:10:12.230972
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Aelmgren/flask-app
-https://github.com/Aelmgren/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:10:12.760205
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sjb9774/empty-flask
-https://github.com/sjb9774/empty-flask
-Entry file: empty-flask/app/app.py
-Scanned: 2016-10-20 12:10:13.298389
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Tartarus7/microblogFlask
-https://github.com/Tartarus7/microblogFlask
-Entry file: None
-Scanned: 2016-10-20 12:10:23.020525
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mrparvinsmith/flask-tutorial
-https://github.com/mrparvinsmith/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:10:23.565287
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Tizeen/flask-microblog
-https://github.com/Tizeen/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:10:24.071800
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Chary0917/Flask-app
-https://github.com/Chary0917/Flask-app
-Entry file: Flask-app/app.py
-Scanned: 2016-10-20 12:10:25.377912
-No vulnerabilities found.
-
-
-nimeshkverma/Flask-Params
-https://github.com/nimeshkverma/Flask-Params
-Entry file: Flask-Params/tests/test.py
-Scanned: 2016-10-20 12:10:28.597640
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexurquhart/flask-webapp
-https://github.com/alexurquhart/flask-webapp
-Entry file: flask-webapp/app/__init__.py
-Scanned: 2016-10-20 12:10:30.119728
-No vulnerabilities found.
-
-
-mirrorsysu/aboutFlask
-https://github.com/mirrorsysu/aboutFlask
-Entry file: aboutFlask/flaskr.py
-Scanned: 2016-10-20 12:10:31.892367
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rug3y/flask_example
-https://github.com/rug3y/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:10:32.417449
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rug3y/flask_todo
-https://github.com/rug3y/flask_todo
-Entry file: None
-Scanned: 2016-10-20 12:10:32.935863
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SiQLuxe/flask_session
-https://github.com/SiQLuxe/flask_session
-Entry file: flask_session/flask_session/__init__.py
-Scanned: 2016-10-20 12:10:34.386620
-No vulnerabilities found.
-
-
-devtronics/flask_tut
-https://github.com/devtronics/flask_tut
-Entry file: flask_tut/microblog/app/__init__.py
-Scanned: 2016-10-20 12:10:40.657556
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NatuMyers/Flask-Blog
-https://github.com/NatuMyers/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 12:10:41.177591
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-9217392354A/flask-stuff
-https://github.com/9217392354A/flask-stuff
-Entry file: flask-stuff/__init__.py
-Scanned: 2016-10-20 12:10:48.288064
-No vulnerabilities found.
-
-
-szamani20/flask_test
-https://github.com/szamani20/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:10:48.866394
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yshen47/flask-blog
-https://github.com/yshen47/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:10:49.904697
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-tonestrike/flask-practice
-https://github.com/tonestrike/flask-practice
-Entry file: None
-Scanned: 2016-10-20 12:10:50.456414
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tonestrike/flask-practice.
-
-sarasunsh/CP-flask
-https://github.com/sarasunsh/CP-flask
-Entry file: CP-flask/app.py
-Scanned: 2016-10-20 12:10:52.673150
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ibaf001/learning-flask
-https://github.com/ibaf001/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 12:10:58.236876
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Moxikai/my_flask
-https://github.com/Moxikai/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 12:10:58.886862
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-LiangXunfly/microblog_flask
-https://github.com/LiangXunfly/microblog_flask
-Entry file: microblog_flask/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:10:59.594946
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Jolly23/PythonFlask
-https://github.com/Jolly23/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 12:11:07.500702
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-obi23lipnik/roli-flask
-https://github.com/obi23lipnik/roli-flask
-Entry file: None
-Scanned: 2016-10-20 12:11:18.246843
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jcadruvi/DockerFlask
-https://github.com/jcadruvi/DockerFlask
-Entry file: DockerFlask/app.py
-Scanned: 2016-10-20 12:11:19.691892
-No vulnerabilities found.
-
-
-schulzsebastian/flask_firststeps
-https://github.com/schulzsebastian/flask_firststeps
-Entry file: flask_firststeps/main.py
-Scanned: 2016-10-20 12:11:21.226137
-No vulnerabilities found.
-
-
-cholpona/flask_tutorial
-https://github.com/cholpona/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 12:11:21.754247
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-garedrag/flask_opencv
-https://github.com/garedrag/flask_opencv
-Entry file: flask_opencv/app.py
-Scanned: 2016-10-20 12:11:23.083804
-No vulnerabilities found.
-
-
-aparecidoSilvano/estudando-flask
-https://github.com/aparecidoSilvano/estudando-flask
-Entry file: None
-Scanned: 2016-10-20 12:11:31.868473
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Klimatomas/GifTV
-https://github.com/Klimatomas/GifTV
-Entry file: GifTV/GTVapi.py
-Scanned: 2016-10-20 12:11:33.304403
-No vulnerabilities found.
-
-
-jeffchanjunwei/FlaskWebDemo
-https://github.com/jeffchanjunwei/FlaskWebDemo
-Entry file: FlaskWebDemo/app.py
-Scanned: 2016-10-20 12:11:43.332244
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-daniloBlera/FlaskWebServer
-https://github.com/daniloBlera/FlaskWebServer
-Entry file: FlaskWebServer/FlaskWebServer/src/cloftstill/frontend/serverfront.py
-Scanned: 2016-10-20 12:11:45.742256
-No vulnerabilities found.
-
-
-AnkleLiu/FlaskWorkShop
-https://github.com/AnkleLiu/FlaskWorkShop
-Entry file: FlaskWorkShop/app.py
-Scanned: 2016-10-20 12:11:47.173778
-No vulnerabilities found.
-
-
-mrffrm1234/flask
-https://github.com/mrffrm1234/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:11:49.129078
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ekusy/flask
-https://github.com/ekusy/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:11:49.720021
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-moonoroman/flask
-https://github.com/moonoroman/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:11:50.306420
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-bhops/flask
-https://github.com/bhops/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:11:50.876615
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-tweddielin/flask-imsearch
-https://github.com/tweddielin/flask-imsearch
-Entry file: None
-Scanned: 2016-10-20 12:14:05.828540
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tweddielin/flask-imsearch.
-
-simonbilskyrollins/Flask-Workshop
-https://github.com/simonbilskyrollins/Flask-Workshop
-Entry file: Flask-Workshop/step3.py
-Scanned: 2016-10-20 12:14:07.209829
-No vulnerabilities found.
-
-
-hadesong/flask_weather
-https://github.com/hadesong/flask_weather
-Entry file: flask_weather/app_package/__init__.py
-Scanned: 2016-10-20 12:14:10.292465
-No vulnerabilities found.
-
-
-ealesid/flaskbook
-https://github.com/ealesid/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:14:10.849154
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-jake-bladt/flasksandbox
-https://github.com/jake-bladt/flasksandbox
-Entry file: flasksandbox/app/app.py
-Scanned: 2016-10-20 12:14:12.502205
-Vulnerability 1:
-File: flasksandbox/app/helpers.py
- > User input at line 4, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: flasksandbox/app/helpers.py
- > Line 6: page = int(page)
- File: flasksandbox/app/helpers.py
- > Line 8: page = 1
- File: flasksandbox/app/helpers.py
- > Line 9: object_list = query.paginate(page, paginate_by)
-File: flasksandbox/app/helpers.py
- > reaches line 10, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context)
-
-
-
-AliceLanniste/Flasky
-https://github.com/AliceLanniste/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 12:14:13.036459
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lg31415/flaskr
-https://github.com/lg31415/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:14:13.541169
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bewithgaurav/flaskmap
-https://github.com/bewithgaurav/flaskmap
-Entry file: flaskmap/__init__.py
-Scanned: 2016-10-20 12:14:24.454064
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ljxxcaijing/flaskblog
-https://github.com/ljxxcaijing/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:14:24.987282
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-fromzeroedu/flaskbook
-https://github.com/fromzeroedu/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:14:25.534673
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-nrugas/flasky
-https://github.com/nrugas/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:14:26.045538
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pcpianobar/flaskr
-https://github.com/pcpianobar/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:14:26.554022
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mikomwang/flaskr
-https://github.com/mikomwang/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:14:27.050102
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xdoyfforai/flaskblog
-https://github.com/xdoyfforai/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:14:27.579123
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-anngle/flaskweb
-https://github.com/anngle/flaskweb
-Entry file: None
-Scanned: 2016-10-20 12:14:28.095511
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Aprimus1/flasktaskr
-https://github.com/Aprimus1/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:14:28.614498
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-s4swadhin/flasktaskr
-https://github.com/s4swadhin/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:14:29.163267
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AnkleLiu/flasky
-https://github.com/AnkleLiu/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:14:29.672002
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-demoleas21/FlaskHW
-https://github.com/demoleas21/FlaskHW
-Entry file: FlaskHW/app.py
-Scanned: 2016-10-20 12:14:30.190673
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paulvisen/FlaskServer
-https://github.com/paulvisen/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-20 12:14:30.742929
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PicAlert/FlaskApi
-https://github.com/PicAlert/FlaskApi
-Entry file: FlaskApi/server.py
-Scanned: 2016-10-20 12:14:32.115803
-No vulnerabilities found.
-
-
-alexwidener/flaskStuff
-https://github.com/alexwidener/flaskStuff
-Entry file: flaskStuff/headlines/headlines.py
-Scanned: 2016-10-20 12:14:33.441910
-No vulnerabilities found.
-
-
-andresmguk/FlaskApp
-https://github.com/andresmguk/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:14:34.049885
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jaychia/flasktut1
-https://github.com/jaychia/flasktut1
-Entry file: None
-Scanned: 2016-10-20 12:14:40.702413
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stitch001/flaskerMysql
-https://github.com/stitch001/flaskerMysql
-Entry file: flaskerMysql/mysqlFlask/__init__.py
-Scanned: 2016-10-20 12:14:43.740031
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-er3456qi/FlaskPolls
-https://github.com/er3456qi/FlaskPolls
-Entry file: FlaskPolls/polls/__init__.py
-Scanned: 2016-10-20 12:14:45.139686
-Vulnerability 1:
-File: FlaskPolls/polls/views.py
- > User input at line 16, trigger word "get(":
- question = Question.query.get(question_id)
-File: FlaskPolls/polls/views.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('detail.html',question=question)
-
-Vulnerability 2:
-File: FlaskPolls/polls/views.py
- > User input at line 24, trigger word "get(":
- question = Question.query.get(question_id)
-File: FlaskPolls/polls/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',question=question)
-
-Vulnerability 3:
-File: FlaskPolls/polls/views.py
- > User input at line 32, trigger word "get(":
- question = Question.query.get(question_id)
-Reassigned in:
- File: FlaskPolls/polls/views.py
- > Line 35: selected_choice = [c for c in question.choice_set][0]
-File: FlaskPolls/polls/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('detail.html',question=question, error_message='you didn't select a choice.')
-
-Vulnerability 4:
-File: FlaskPolls/polls/views.py
- > User input at line 32, trigger word "get(":
- question = Question.query.get(question_id)
-Reassigned in:
- File: FlaskPolls/polls/views.py
- > Line 35: selected_choice = [c for c in question.choice_set][0]
-File: FlaskPolls/polls/views.py
- > reaches line 45, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('results',question_id=question.id))
-
-Vulnerability 5:
-File: FlaskPolls/polls/views.py
- > User input at line 32, trigger word "get(":
- question = Question.query.get(question_id)
-Reassigned in:
- File: FlaskPolls/polls/views.py
- > Line 35: selected_choice = [c for c in question.choice_set][0]
-File: FlaskPolls/polls/views.py
- > reaches line 45, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('results',question_id=question.id))
-
-
-
-GalaIO/template-for-flask
-https://github.com/GalaIO/template-for-flask
-Entry file: template-for-flask/app/__init__.py
-Scanned: 2016-10-20 12:14:45.648383
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nad2000/Flask-Timesheets
-https://github.com/nad2000/Flask-Timesheets
-Entry file: Flask-Timesheets/__init__.py
-Scanned: 2016-10-20 12:14:49.474093
-Vulnerability 1:
-File: Flask-Timesheets/views.py
- > User input at line 157, trigger word "get(":
- selected_user = usernameUser.get(User.username == username)None
-Reassigned in:
- File: Flask-Timesheets/views.py
- > Line 160: timesheet = TimeSheet(user=selected_user, week_ending_date=week_ending_date)
- File: Flask-Timesheets/views.py
- > Line 148: ret_MAYBE_FUNCTION_NAME = redirect(url_for('approve',username=username, week_ending_date=week_ending_date))
-File: Flask-Timesheets/views.py
- > reaches line 168, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('approve.html',timesheet=timesheet, form=form, breaks=breaks, selected_user=selected_user, users=users, week_ending_date=week_ending_date, week_ending_dates=week_ending_dates())
-
-Vulnerability 2:
-File: Flask-Timesheets/views.py
- > User input at line 185, trigger word "get(":
- include_unapproved = request.args.get('include_unapproved') is not None
-File: Flask-Timesheets/views.py
- > reaches line 209, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('report.html',include_unapproved=include_unapproved, entries=entries, from_date=from_date, to_date=to_date, selected_company=selected_company, companies=companies, week_ending_dates=week_ending_dates(), week_start_dates=week_start_dates)
-
-Vulnerability 3:
-File: Flask-Timesheets/views.py
- > User input at line 187, trigger word "get(":
- selected_company = company_codeCompany.get(code=company_code)None
-File: Flask-Timesheets/views.py
- > reaches line 209, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('report.html',include_unapproved=include_unapproved, entries=entries, from_date=from_date, to_date=to_date, selected_company=selected_company, companies=companies, week_ending_dates=week_ending_dates(), week_start_dates=week_start_dates)
-
-
-
-mturnshek/flask-demo
-https://github.com/mturnshek/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:14:49.979451
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mturnshek/flask-demo.
-
-ripitrust/flask_react
-https://github.com/ripitrust/flask_react
-Entry file: flask_react/flask_react/worker.py
-Scanned: 2016-10-20 12:14:51.495994
-No vulnerabilities found.
-
-
-zykNet/myFlask
-https://github.com/zykNet/myFlask
-Entry file: myFlask/project.py
-Scanned: 2016-10-20 12:14:52.031658
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bstadt/learningFlask
-https://github.com/bstadt/learningFlask
-Entry file: learningFlask/hello.py
-Scanned: 2016-10-20 12:15:06.777903
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py
-
-hansenrl/learning_flask
-https://github.com/hansenrl/learning_flask
-Entry file: learning_flask/app/__init__.py
-Scanned: 2016-10-20 12:15:09.105674
-No vulnerabilities found.
-
-
-garyhurtz/Flask-Locales
-https://github.com/garyhurtz/Flask-Locales
-Entry file: None
-Scanned: 2016-10-20 12:15:12.694261
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/garyhurtz/Flask-Locales.
-
-mpatrone/flask-demo
-https://github.com/mpatrone/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:15:13.203610
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mpatrone/flask-demo.
-
-s4swadhin/flask-blog
-https://github.com/s4swadhin/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:15:13.775427
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Ceejimus/flask-auth
-https://github.com/Ceejimus/flask-auth
-Entry file: flask-auth/example.py
-Scanned: 2016-10-20 12:15:14.328149
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-db521/sendmail_flask
-https://github.com/db521/sendmail_flask
-Entry file: sendmail_flask/study/view.py
-Scanned: 2016-10-20 12:15:21.377935
-No vulnerabilities found.
-
-
-gwong89/flask-ci
-https://github.com/gwong89/flask-ci
-Entry file: flask-ci/app.py
-Scanned: 2016-10-20 12:15:26.019393
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yitingfan/flask-adminlte
-https://github.com/yitingfan/flask-adminlte
-Entry file: flask-adminlte/app/__init__.py
-Scanned: 2016-10-20 12:15:33.698263
-Vulnerability 1:
-File: flask-adminlte/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 55: posts = pagination.items
- File: flask-adminlte/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask-adminlte/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 45: show_followed = False
- File: flask-adminlte/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask-adminlte/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 67: posts = pagination.items
-File: flask-adminlte/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask-adminlte/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-adminlte/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 134: comments = pagination.items
- File: flask-adminlte/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask-adminlte/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask-adminlte/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-adminlte/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask-adminlte/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-adminlte/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask-adminlte/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 246: comments = pagination.items
-File: flask-adminlte/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 23: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 23: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 23: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 45: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 45: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 45: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flask-adminlte/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask-adminlte/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flask-adminlte/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask-adminlte/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flask-adminlte/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask-adminlte/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-smailk/flask-workshop
-https://github.com/smailk/flask-workshop
-Entry file: flask-workshop/hello_world/hello.py
-Scanned: 2016-10-20 12:15:34.240201
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-comdotlinux/first-flask
-https://github.com/comdotlinux/first-flask
-Entry file: None
-Scanned: 2016-10-20 12:15:34.752855
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ByakuyaKuchiki/firstFlask
-https://github.com/ByakuyaKuchiki/firstFlask
-Entry file: firstFlask/app/__init__.py
-Scanned: 2016-10-20 12:15:36.835666
-Vulnerability 1:
-File: firstFlask/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/main/views.py
- > Line 55: posts = pagination.items
- File: firstFlask/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: firstFlask/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: firstFlask/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 45: show_followed = False
- File: firstFlask/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: firstFlask/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: firstFlask/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/main/views.py
- > Line 67: posts = pagination.items
-File: firstFlask/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: firstFlask/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: firstFlask/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/main/views.py
- > Line 134: comments = pagination.items
- File: firstFlask/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: firstFlask/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: firstFlask/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: firstFlask/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: firstFlask/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: firstFlask/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: firstFlask/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: firstFlask/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: firstFlask/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: firstFlask/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: firstFlask/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/main/views.py
- > Line 246: comments = pagination.items
-File: firstFlask/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: firstFlask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: firstFlask/app/api_1_0/users.py
- > Line 20: prev = None
- File: firstFlask/app/api_1_0/users.py
- > Line 23: next = None
-File: firstFlask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: firstFlask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: firstFlask/app/api_1_0/users.py
- > Line 20: prev = None
- File: firstFlask/app/api_1_0/users.py
- > Line 23: next = None
-File: firstFlask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: firstFlask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: firstFlask/app/api_1_0/users.py
- > Line 20: prev = None
- File: firstFlask/app/api_1_0/users.py
- > Line 23: next = None
-File: firstFlask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: firstFlask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: firstFlask/app/api_1_0/users.py
- > Line 42: prev = None
- File: firstFlask/app/api_1_0/users.py
- > Line 45: next = None
-File: firstFlask/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: firstFlask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: firstFlask/app/api_1_0/users.py
- > Line 42: prev = None
- File: firstFlask/app/api_1_0/users.py
- > Line 45: next = None
-File: firstFlask/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: firstFlask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: firstFlask/app/api_1_0/users.py
- > Line 42: prev = None
- File: firstFlask/app/api_1_0/users.py
- > Line 45: next = None
-File: firstFlask/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: firstFlask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: firstFlask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: firstFlask/app/api_1_0/posts.py
- > Line 19: next = None
-File: firstFlask/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: firstFlask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: firstFlask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: firstFlask/app/api_1_0/posts.py
- > Line 19: next = None
-File: firstFlask/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: firstFlask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: firstFlask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: firstFlask/app/api_1_0/posts.py
- > Line 19: next = None
-File: firstFlask/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: firstFlask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: firstFlask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: firstFlask/app/api_1_0/comments.py
- > Line 18: next = None
-File: firstFlask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: firstFlask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: firstFlask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: firstFlask/app/api_1_0/comments.py
- > Line 18: next = None
-File: firstFlask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: firstFlask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: firstFlask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: firstFlask/app/api_1_0/comments.py
- > Line 18: next = None
-File: firstFlask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: firstFlask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: firstFlask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: firstFlask/app/api_1_0/comments.py
- > Line 46: next = None
-File: firstFlask/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: firstFlask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: firstFlask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: firstFlask/app/api_1_0/comments.py
- > Line 46: next = None
-File: firstFlask/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: firstFlask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: firstFlask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: firstFlask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: firstFlask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: firstFlask/app/api_1_0/comments.py
- > Line 46: next = None
-File: firstFlask/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-sarosicami/ReviewerFlask
-https://github.com/sarosicami/ReviewerFlask
-Entry file: ReviewerFlask/rest_server.py
-Scanned: 2016-10-20 12:15:39.930939
-Vulnerability 1:
-File: ReviewerFlask/rest_server.py
- > User input at line 26, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: ReviewerFlask/rest_server.py
- > Line 34: user = models.User(username=username, email=email, country=country)
- File: ReviewerFlask/rest_server.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists')
-File: ReviewerFlask/rest_server.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 2:
-File: ReviewerFlask/rest_server.py
- > User input at line 29, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: ReviewerFlask/rest_server.py
- > Line 34: user = models.User(username=username, email=email, country=country)
- File: ReviewerFlask/rest_server.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists')
-File: ReviewerFlask/rest_server.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: ReviewerFlask/rest_server.py
- > User input at line 30, trigger word "get(":
- country = request.json.get('country')
-Reassigned in:
- File: ReviewerFlask/rest_server.py
- > Line 34: user = models.User(username=username, email=email, country=country)
- File: ReviewerFlask/rest_server.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists')
-File: ReviewerFlask/rest_server.py
- > reaches line 38, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 4:
-File: ReviewerFlask/rest_server.py
- > User input at line 26, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: ReviewerFlask/rest_server.py
- > Line 34: user = models.User(username=username, email=email, country=country)
- File: ReviewerFlask/rest_server.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists')
-File: ReviewerFlask/rest_server.py
- > reaches line 38, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 5:
-File: ReviewerFlask/rest_server.py
- > User input at line 29, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: ReviewerFlask/rest_server.py
- > Line 34: user = models.User(username=username, email=email, country=country)
- File: ReviewerFlask/rest_server.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists')
-File: ReviewerFlask/rest_server.py
- > reaches line 38, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 6:
-File: ReviewerFlask/rest_server.py
- > User input at line 30, trigger word "get(":
- country = request.json.get('country')
-Reassigned in:
- File: ReviewerFlask/rest_server.py
- > Line 34: user = models.User(username=username, email=email, country=country)
- File: ReviewerFlask/rest_server.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists')
-File: ReviewerFlask/rest_server.py
- > reaches line 38, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 7:
-File: ReviewerFlask/rest_server.py
- > User input at line 53, trigger word "get(":
- user = models.User.query.get(id)
-File: ReviewerFlask/rest_server.py
- > reaches line 56, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('username''email''country'user.usernameuser.emailuser.country)
-
-Vulnerability 8:
-File: ReviewerFlask/app/views.py
- > User input at line 53, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: ReviewerFlask/app/views.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201)
-
-
-
-xinganng/hello-flask
-https://github.com/xinganng/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:15:40.549573
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-pettek/flask_app
-https://github.com/pettek/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:15:41.073644
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pettek/flask_app.
-
-SeoDongMyeong/Simple-Flask
-https://github.com/SeoDongMyeong/Simple-Flask
-Entry file: Simple-Flask/application.py
-Scanned: 2016-10-20 12:15:42.382609
-No vulnerabilities found.
-
-
-sebastiken/flask-miot
-https://github.com/sebastiken/flask-miot
-Entry file: flask-miot/app/__init__.py
-Scanned: 2016-10-20 12:15:43.659594
-No vulnerabilities found.
-
-
-dreamvx7/Flask-todo
-https://github.com/dreamvx7/Flask-todo
-Entry file: Flask-todo/app/__init__.py
-Scanned: 2016-10-20 12:15:45.008470
-No vulnerabilities found.
-
-
-masaki-y/hello-flask
-https://github.com/masaki-y/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:15:45.597967
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-eelkevdbos/microservices-flask
-https://github.com/eelkevdbos/microservices-flask
-Entry file: microservices-flask/hello/hello.py
-Scanned: 2016-10-20 12:15:51.091392
-No vulnerabilities found.
-
-
-daivq/Flask_Basic
-https://github.com/daivq/Flask_Basic
-Entry file: Flask_Basic/flaskr.py
-Scanned: 2016-10-20 12:15:52.514910
-No vulnerabilities found.
-
-
-bbein/flask-demo
-https://github.com/bbein/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:15:53.076949
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bbein/flask-demo.
-
-flyhigher139/flask_example
-https://github.com/flyhigher139/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:15:53.581330
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-flaviomicheletti/flask-collection
-https://github.com/flaviomicheletti/flask-collection
-Entry file: flask-collection/blueprintexample/blueprintexample.py
-Scanned: 2016-10-20 12:15:57.972509
-No vulnerabilities found.
-
-
-dhamaresh1/docker-flask
-https://github.com/dhamaresh1/docker-flask
-Entry file: None
-Scanned: 2016-10-20 12:15:59.523592
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhamaresh1/docker-flask.
-
-bmw9t/flask_test
-https://github.com/bmw9t/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:16:00.078109
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ansrivas/flask-alpine
-https://github.com/ansrivas/flask-alpine
-Entry file: flask-alpine/main.py
-Scanned: 2016-10-20 12:16:02.361232
-No vulnerabilities found.
-
-
-hgodinez/flask-demo
-https://github.com/hgodinez/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:16:02.870652
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hgodinez/flask-demo.
-
-ThinkerQAQ/flask-learn
-https://github.com/ThinkerQAQ/flask-learn
-Entry file: flask-learn/app.py
-Scanned: 2016-10-20 12:16:08.237993
-No vulnerabilities found.
-
-
-weyoni2/flask_mongo
-https://github.com/weyoni2/flask_mongo
-Entry file: flask_mongo/app.py
-Scanned: 2016-10-20 12:16:09.642041
-No vulnerabilities found.
-
-
-Mr-Bruno/flask-service
-https://github.com/Mr-Bruno/flask-service
-Entry file: flask-service/service.py
-Scanned: 2016-10-20 12:16:12.987627
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Theviajerock/mvaFlask
-https://github.com/Theviajerock/mvaFlask
-Entry file: mvaFlask/app.py
-Scanned: 2016-10-20 12:16:14.292841
-Vulnerability 1:
-File: mvaFlask/route.py
- > User input at line 28, trigger word "form[":
- question = request.form['question']
-Reassigned in:
- File: mvaFlask/route.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = '
Invalid Request
'
- File: mvaFlask/route.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('CreateQuestion.html')
-File: mvaFlask/route.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('CreatedQuestion.html',question=question)
-
-Vulnerability 2:
-File: mvaFlask/route.py
- > User input at line 43, trigger word "form[":
- submittedAnswer = request.form['submittedAnswer']
-Reassigned in:
- File: mvaFlask/route.py
- > Line 52: ret_MAYBE_FUNCTION_NAME = '
Invalid Request
'
- File: mvaFlask/route.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question)
- File: mvaFlask/route.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html')
-File: mvaFlask/route.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('Incorrect',submittedAnswer=submittedAnswer, answer=answer)
-
-
-
-Us3l3ss/flask-test
-https://github.com/Us3l3ss/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:16:14.826085
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-shakusi2009/1flask
-https://github.com/shakusi2009/1flask
-Entry file: 1flask/flaskr.py
-Scanned: 2016-10-20 12:16:16.108443
-No vulnerabilities found.
-
-
-renejahn/flask-fastbill
-https://github.com/renejahn/flask-fastbill
-Entry file: flask-fastbill/test_basics.py
-Scanned: 2016-10-20 12:16:17.522608
-Vulnerability 1:
-File: flask-fastbill/example/app.py
- > User input at line 30, trigger word "get(":
- customers_response = fb.customer.get()
-Reassigned in:
- File: flask-fastbill/example/app.py
- > Line 31: customers = customers_response.response.customers
-File: flask-fastbill/example/app.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('object_list.html',customers=customers)
-
-Vulnerability 2:
-File: flask-fastbill/example/app.py
- > User input at line 38, trigger word "get(":
- articles_response = fb.article.get()
-Reassigned in:
- File: flask-fastbill/example/app.py
- > Line 39: articles = articles_response.response.articles
-File: flask-fastbill/example/app.py
- > reaches line 40, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('object_list.html',articles=articles)
-
-Vulnerability 3:
-File: flask-fastbill/example/app.py
- > User input at line 46, trigger word "get(":
- invoices_response = fb.invoice.get()
-Reassigned in:
- File: flask-fastbill/example/app.py
- > Line 47: invoices = invoices_response.response.invoices
-File: flask-fastbill/example/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('object_list.html',invoices=invoices)
-
-
-
-thanhan312/test_flask
-https://github.com/thanhan312/test_flask
-Entry file: test_flask/app.py
-Scanned: 2016-10-20 12:16:26.975381
-No vulnerabilities found.
-
-
-charup/Python_Flask
-https://github.com/charup/Python_Flask
-Entry file: Python_Flask/hello_dynamicVar.py
-Scanned: 2016-10-20 12:16:31.892640
-Vulnerability 1:
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > User input at line 23, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 30: filename = secure_filename(file.filename)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > reaches line 32, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > User input at line 23, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 30: filename = secure_filename(file.filename)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > reaches line 32, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-blabaj/Flask_microblog
-https://github.com/blabaj/Flask_microblog
-Entry file: Flask_microblog/app/__init__.py
-Scanned: 2016-10-20 12:16:35.319781
-No vulnerabilities found.
-
-
-aparecidoSilvano/estudando-flask
-https://github.com/aparecidoSilvano/estudando-flask
-Entry file: None
-Scanned: 2016-10-20 12:16:35.853317
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-danfujita/flask-tutorial
-https://github.com/danfujita/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:16:36.375242
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-linzeming/flask_project
-https://github.com/linzeming/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 12:16:39.335975
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sethbergman/flask-social
-https://github.com/sethbergman/flask-social
-Entry file: flask-social/app.py
-Scanned: 2016-10-20 12:16:40.864259
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cnds/FlaskWithMongo
-https://github.com/cnds/FlaskWithMongo
-Entry file: FlaskWithMongo/tumblelog/__init__.py
-Scanned: 2016-10-20 12:16:42.822787
-No vulnerabilities found.
-
-
-gaomingnudt/gm-flask2.0
-https://github.com/gaomingnudt/gm-flask2.0
-Entry file: None
-Scanned: 2016-10-20 12:16:48.820024
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/gaomingnudt/gm-flask2.0.
-
-Amertz08/FlaskWebBook
-https://github.com/Amertz08/FlaskWebBook
-Entry file: FlaskWebBook/app/__init__.py
-Scanned: 2016-10-20 12:16:50.256634
-No vulnerabilities found.
-
-
-ChaitanyaChannella/FlaskHelloWorld
-https://github.com/ChaitanyaChannella/FlaskHelloWorld
-Entry file: FlaskHelloWorld/hello.py
-Scanned: 2016-10-20 12:16:51.554896
-No vulnerabilities found.
-
-
-nmaas87/resin-openwrt-flask-app
-https://github.com/nmaas87/resin-openwrt-flask-app
-Entry file: resin-openwrt-flask-app/app.py
-Scanned: 2016-10-20 12:16:52.878590
-No vulnerabilities found.
-
-
-pazzo83/restaurant_reservation_flask
-https://github.com/pazzo83/restaurant_reservation_flask
-Entry file: restaurant_reservation_flask/app/__init__.py
-Scanned: 2016-10-20 12:16:54.412631
-Vulnerability 1:
-File: restaurant_reservation_flask/app/views.py
- > User input at line 59, trigger word ".data":
- res_date = datetime.datetime.strftime(form.reservation_date.data, '%Y-%m-%d')
-Reassigned in:
- File: restaurant_reservation_flask/app/views.py
- > Line 61: res_date = datetime.datetime.strptime(reservation_date, '%Y-%m-%d')
- File: restaurant_reservation_flask/app/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('show_reservations.html',title='Reservations', reservations=reservations, form=form, total_slots=total_slots, utilization=util)
-File: restaurant_reservation_flask/app/views.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect('/show_reservations/' + res_date)
-
-Vulnerability 2:
-File: restaurant_reservation_flask/app/views.py
- > User input at line 59, trigger word ".data":
- res_date = datetime.datetime.strftime(form.reservation_date.data, '%Y-%m-%d')
-Reassigned in:
- File: restaurant_reservation_flask/app/views.py
- > Line 61: res_date = datetime.datetime.strptime(reservation_date, '%Y-%m-%d')
- File: restaurant_reservation_flask/app/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('show_reservations.html',title='Reservations', reservations=reservations, form=form, total_slots=total_slots, utilization=util)
-File: restaurant_reservation_flask/app/views.py
- > reaches line 62, trigger word "filter(":
- reservations = Reservation.query.filter(Reservation.reservation_time >= res_date, Reservation.reservation_time < res_date + datetime.timedelta(days=1)).all()
-
-Vulnerability 3:
-File: restaurant_reservation_flask/app/controller.py
- > User input at line 14, trigger word ".data":
- capacity = int(form_data.num_guests.data)
-Reassigned in:
- File: restaurant_reservation_flask/app/controller.py
- > Line 37: reservation = Reservation(guest=guest, table=Table.query.get(int(table_id)), num_guests=capacity, reservation_time=form_data.reservation_datetime.data)
- File: restaurant_reservation_flask/app/controller.py
- > Line 41: reservation = Reservation(guest=guest, table=Table.query.get(int(t_ids[0])), num_guests=capacity, reservation_time=form_data.reservation_datetime.data)
- File: restaurant_reservation_flask/app/controller.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = reservation
- File: restaurant_reservation_flask/app/controller.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = False
- File: restaurant_reservation_flask/app/controller.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = False
-File: restaurant_reservation_flask/app/controller.py
- > reaches line 15, trigger word "filter(":
- tables = Table.query.filter(Table.capacity >= capacity).order_by(Table.capacity.desc()).all()
-
-Vulnerability 4:
-File: restaurant_reservation_flask/app/controller.py
- > User input at line 22, trigger word ".data":
- begin_range = form_data.reservation_datetime.data - datetime.timedelta(hours=DEFAULT_RESERVATION_LENGTH)
-File: restaurant_reservation_flask/app/controller.py
- > reaches line 26, trigger word "filter(":
- reservations = Reservation.query.join(Reservation.table).filter(Table.id.in_(t_ids), Reservation.reservation_time >= begin_range, Reservation.reservation_time <= end_range).order_by(Table.capacity.desc()).all()
-
-Vulnerability 5:
-File: restaurant_reservation_flask/app/controller.py
- > User input at line 23, trigger word ".data":
- end_range = form_data.reservation_datetime.data + datetime.timedelta(hours=DEFAULT_RESERVATION_LENGTH)
-File: restaurant_reservation_flask/app/controller.py
- > reaches line 26, trigger word "filter(":
- reservations = Reservation.query.join(Reservation.table).filter(Table.id.in_(t_ids), Reservation.reservation_time >= begin_range, Reservation.reservation_time <= end_range).order_by(Table.capacity.desc()).all()
-
-
-
-Ogma-Dev/Simple-Flask-Webhook
-https://github.com/Ogma-Dev/Simple-Flask-Webhook
-Entry file: Simple-Flask-Webhook/simple-webhook.py
-Scanned: 2016-10-20 12:16:55.715992
-No vulnerabilities found.
-
-
-MoxmiNu/flask-mongo-docker
-https://github.com/MoxmiNu/flask-mongo-docker
-Entry file: flask-mongo-docker/flask/dr-app.py
-Scanned: 2016-10-20 12:16:57.005424
-No vulnerabilities found.
-
-
-andela-mnzomo/flask-bucketlist-api
-https://github.com/andela-mnzomo/flask-bucketlist-api
-Entry file: flask-bucketlist-api/app/__init__.py
-Scanned: 2016-10-20 12:17:01.796135
-No vulnerabilities found.
-
-
-NatuMyers/flask-sql-practice
-https://github.com/NatuMyers/flask-sql-practice
-Entry file: flask-sql-practice/finalproject.py
-Scanned: 2016-10-20 12:17:10.331834
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pjt3591oo/python-flask_test
-https://github.com/pjt3591oo/python-flask_test
-Entry file: python-flask_test/model.py
-Scanned: 2016-10-20 12:17:18.093164
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yuta-hono/flask-cloudfoundry-sample
-https://github.com/yuta-hono/flask-cloudfoundry-sample
-Entry file: flask-cloudfoundry-sample/hello.py
-Scanned: 2016-10-20 12:17:21.405397
-No vulnerabilities found.
-
-
-zjyExcelsior/Flask-Login-examples
-https://github.com/zjyExcelsior/Flask-Login-examples
-Entry file: Flask-Login-examples/myapp/__init__.py
-Scanned: 2016-10-20 12:17:23.084973
-Vulnerability 1:
-File: Flask-Login-examples/myapp/views/auth.py
- > User input at line 16, trigger word ".data":
- user = User.query.filter(User.email == form.email.data).first()
-File: Flask-Login-examples/myapp/views/auth.py
- > reaches line 16, trigger word "filter(":
- user = User.query.filter(User.email == form.email.data).first()
-
-Vulnerability 2:
-File: Flask-Login-examples/myapp/views/auth.py
- > User input at line 22, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: Flask-Login-examples/myapp/views/auth.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = render_template('auth/login.html',form=form)
-File: Flask-Login-examples/myapp/views/auth.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('main.index'))
-
-Vulnerability 3:
-File: Flask-Login-examples/myapp/views/auth.py
- > User input at line 22, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: Flask-Login-examples/myapp/views/auth.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = render_template('auth/login.html',form=form)
-File: Flask-Login-examples/myapp/views/auth.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('main.index'))
-
-
-
-robertkohl125/MathQuizerFlask
-https://github.com/robertkohl125/MathQuizerFlask
-Entry file: MathQuizerFlask/MathQuizer/__init__.py
-Scanned: 2016-10-20 12:17:25.282042
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MickaelAmorim/flask-server-netacad
-https://github.com/MickaelAmorim/flask-server-netacad
-Entry file: flask-server-netacad/netacad.py
-Scanned: 2016-10-20 12:17:26.642205
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tharinda221/simple-flask-web-application
-https://github.com/tharinda221/simple-flask-web-application
-Entry file: simple-flask-web-application/simple-flask-web-application.py
-Scanned: 2016-10-20 12:17:28.037593
-No vulnerabilities found.
-
-
-jiyeonseo/study_python_flask
-https://github.com/jiyeonseo/study_python_flask
-Entry file: study_python_flask/cheesetest.py
-Scanned: 2016-10-20 12:17:29.378832
-No vulnerabilities found.
-
-
-Blockshare/blockshare-flask-template
-https://github.com/Blockshare/blockshare-flask-template
-Entry file: blockshare-flask-template/app/__init__.py
-Scanned: 2016-10-20 12:17:36.174929
-Vulnerability 1:
-File: blockshare-flask-template/app/forms/user.py
- > User input at line 25, trigger word ".data":
- check = self.model.query.filter(self.field == field.data).first()
-File: blockshare-flask-template/app/forms/user.py
- > reaches line 25, trigger word "filter(":
- check = self.model.query.filter(self.field == field.data).first()
-
-Vulnerability 2:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 67, trigger word ".data":
- tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password)
-Reassigned in:
- File: blockshare-flask-template/app/views/main.py
- > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 72, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 3:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 71, trigger word ".data":
- message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 72, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 4:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 67, trigger word ".data":
- tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password)
-Reassigned in:
- File: blockshare-flask-template/app/views/main.py
- > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 76, trigger word "flash(":
- flash(tx['message'], 'negative')
-
-Vulnerability 5:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 108, trigger word ".data":
- message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 109, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 6:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 120, trigger word "form(":
- points = [(random.uniform(48.84341, 48.86341), random.uniform(2.3388, 2.3588)) for _ in range(random.randint(2, 9))]
-File: blockshare-flask-template/app/views/main.py
- > reaches line 123, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('points'points)
-
-Vulnerability 7:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 24, trigger word ".data":
- user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data)
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 39: token = ts.dumps(user.email,salt='email-confirm-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 41, trigger word "url_for(":
- confirmUrl = url_for('userbp.confirm',token=token, _external=True)
-
-Vulnerability 8:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 24, trigger word ".data":
- user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data)
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 39: token = ts.dumps(user.email,salt='email-confirm-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 43, trigger word "render_template(":
- html = render_template('email/confirm.html',confirm_url=confirmUrl)
-
-Vulnerability 9:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 118, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 124: token = ts.dumps(user.email,salt='password-reset-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 126, trigger word "url_for(":
- resetUrl = url_for('userbp.reset',token=token, _external=True)
-
-Vulnerability 10:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 118, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 124: token = ts.dumps(user.email,salt='password-reset-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 128, trigger word "render_template(":
- html = render_template('email/reset.html',reset_url=resetUrl)
-
-
-
-cuttlesoft/flask-bitmapist
-https://github.com/cuttlesoft/flask-bitmapist
-Entry file: flask-bitmapist/tests/conftest.py
-Scanned: 2016-10-20 12:17:42.262349
-No vulnerabilities found.
-
-
-dhaval38/Flask
-https://github.com/dhaval38/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:17:42.797739
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrffrm1234/flask
-https://github.com/mrffrm1234/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:17:43.376563
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-gaurikatyagi/Flask
-https://github.com/gaurikatyagi/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:17:43.902757
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TeamDroneFireman/Flask
-https://github.com/TeamDroneFireman/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:17:44.416775
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sloria/flask-konch
-https://github.com/sloria/flask-konch
-Entry file: flask-konch/example_app/hello.py
-Scanned: 2016-10-20 12:17:45.841828
-No vulnerabilities found.
-
-
-patternexon/hello
-https://github.com/patternexon/hello
-Entry file: hello/hello.py
-Scanned: 2016-10-20 12:17:53.199421
-No vulnerabilities found.
-
-
-YUX-IO/flask-python351
-https://github.com/YUX-IO/flask-python351
-Entry file: flask-python351/sample-app/app.py
-Scanned: 2016-10-20 12:17:55.117246
-No vulnerabilities found.
-
-
-saga92/flaskr
-https://github.com/saga92/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:17:55.631255
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AliceLanniste/Flasky
-https://github.com/AliceLanniste/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 12:17:56.132438
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-powerlanguage/flasktaskr
-https://github.com/powerlanguage/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:17:56.635120
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bwghughes/flaskdev
-https://github.com/bwghughes/flaskdev
-Entry file: flaskdev/hello.py
-Scanned: 2016-10-20 12:17:57.931729
-Vulnerability 1:
-File: flaskdev/tests.py
- > User input at line 10, trigger word "get(":
- res = client.get(url_for('hello_world'))
-File: flaskdev/tests.py
- > reaches line 10, trigger word "url_for(":
- res = client.get(url_for('hello_world'))
-
-
-
-fromzeroedu/flaskbook
-https://github.com/fromzeroedu/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:17:58.490173
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-wrzto/flasky
-https://github.com/wrzto/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:17:59.036567
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bhsantos11/flaskwebapp
-https://github.com/bhsantos11/flaskwebapp
-Entry file: flaskwebapp/flaskwebsite/__init__.py
-Scanned: 2016-10-20 12:18:00.341516
-No vulnerabilities found.
-
-
-EricGarza/flaskbyexample
-https://github.com/EricGarza/flaskbyexample
-Entry file: flaskbyexample/app.py
-Scanned: 2016-10-20 12:18:09.759868
-No vulnerabilities found.
-
-
-yanni-zh/flaskweb
-https://github.com/yanni-zh/flaskweb
-Entry file: None
-Scanned: 2016-10-20 12:18:10.286803
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nrugas/flasky
-https://github.com/nrugas/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:18:10.807097
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-William0423/flaskylearn
-https://github.com/William0423/flaskylearn
-Entry file: flaskylearn/app/__init__.py
-Scanned: 2016-10-20 12:18:12.267514
-No vulnerabilities found.
-
-
-anngle/flaskweb
-https://github.com/anngle/flaskweb
-Entry file: None
-Scanned: 2016-10-20 12:18:12.783061
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Aprimus1/flasktaskr
-https://github.com/Aprimus1/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:18:19.302735
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-koool71/flaskr
-https://github.com/koool71/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:18:22.830493
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mayreeh/Flasky
-https://github.com/mayreeh/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 12:18:24.394485
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-supor/flaskr
-https://github.com/supor/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:18:25.902015
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ridnarong/flasky
-https://github.com/ridnarong/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:18:27.425675
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-CharlieCheng2014/Flask-micro-flask
-https://github.com/CharlieCheng2014/Flask-micro-flask
-Entry file: Flask-micro-flask/app/__init__.py
-Scanned: 2016-10-20 12:18:29.905933
-No vulnerabilities found.
-
-
-Himenon/FlaskTutorial
-https://github.com/Himenon/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 12:18:30.428137
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stitch001/flaskerMysql
-https://github.com/stitch001/flaskerMysql
-Entry file: flaskerMysql/mysqlFlask/__init__.py
-Scanned: 2016-10-20 12:18:37.431108
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wxkNeter/FlaskBlog
-https://github.com/wxkNeter/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:18:39.062125
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-halilkaya/pymock
-https://github.com/halilkaya/pymock
-Entry file: pymock/app.py
-Scanned: 2016-10-20 12:18:44.510204
-Vulnerability 1:
-File: pymock/app.py
- > User input at line 165, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: pymock/app.py
- > Line 168: data = 'id''username''name''email'user.iduser.usernameuser.nameuser.email
-File: pymock/app.py
- > reaches line 174, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(data)
-
-Vulnerability 2:
-File: pymock/app.py
- > User input at line 183, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: pymock/app.py
- > Line 191: user = User(username=username)
-File: pymock/app.py
- > reaches line 197, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: pymock/app.py
- > User input at line 183, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: pymock/app.py
- > Line 191: user = User(username=username)
-File: pymock/app.py
- > reaches line 197, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-
-
-Jeimmi/HelloFlask
-https://github.com/Jeimmi/HelloFlask
-Entry file: HelloFlask/src/application.py
-Scanned: 2016-10-20 12:18:45.031642
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chris-ritsen/flask-site
-https://github.com/chris-ritsen/flask-site
-Entry file: None
-Scanned: 2016-10-20 12:18:45.535047
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mturnshek/flask-demo
-https://github.com/mturnshek/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:18:46.035913
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mturnshek/flask-demo.
-
-kevinludwig/flask-template
-https://github.com/kevinludwig/flask-template
-Entry file: None
-Scanned: 2016-10-20 12:18:54.585598
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kevinludwig/flask-template.
-
-LucasChenZQ/flask_learn
-https://github.com/LucasChenZQ/flask_learn
-Entry file: flask_learn/hello.py
-Scanned: 2016-10-20 12:18:55.094509
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-julienchurch/flask_austin
-https://github.com/julienchurch/flask_austin
-Entry file: None
-Scanned: 2016-10-20 12:18:57.519916
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/julienchurch/flask_austin.
-
-CTiPKA/scikit-flask
-https://github.com/CTiPKA/scikit-flask
-Entry file: scikit-flask/app.py
-Scanned: 2016-10-20 12:18:58.926971
-No vulnerabilities found.
-
-
-Kecksdose/Flask_Tutorial
-https://github.com/Kecksdose/Flask_Tutorial
-Entry file: Flask_Tutorial/flaskr.py
-Scanned: 2016-10-20 12:18:59.632631
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorial/venv/lib/python2.7/genericpath.py
-
-kentaro0919/blog_flask
-https://github.com/kentaro0919/blog_flask
-Entry file: blog_flask/app/app.py
-Scanned: 2016-10-20 12:19:00.888133
-No vulnerabilities found.
-
-
-yitingfan/flask-adminlte
-https://github.com/yitingfan/flask-adminlte
-Entry file: flask-adminlte/app/__init__.py
-Scanned: 2016-10-20 12:19:08.905763
-Vulnerability 1:
-File: flask-adminlte/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 55: posts = pagination.items
- File: flask-adminlte/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask-adminlte/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 45: show_followed = False
- File: flask-adminlte/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask-adminlte/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 67: posts = pagination.items
-File: flask-adminlte/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask-adminlte/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-adminlte/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 134: comments = pagination.items
- File: flask-adminlte/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask-adminlte/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask-adminlte/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-adminlte/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask-adminlte/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-adminlte/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-adminlte/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask-adminlte/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/main/views.py
- > Line 246: comments = pagination.items
-File: flask-adminlte/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 23: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 23: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 23: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 45: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 45: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flask-adminlte/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask-adminlte/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask-adminlte/app/api_1_0/users.py
- > Line 45: next = None
-File: flask-adminlte/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flask-adminlte/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask-adminlte/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flask-adminlte/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask-adminlte/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flask-adminlte/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask-adminlte/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask-adminlte/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flask-adminlte/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask-adminlte/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask-adminlte/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-daivq/Flask_Blog
-https://github.com/daivq/Flask_Blog
-Entry file: Flask_Blog/Blog/blog.py
-Scanned: 2016-10-20 12:19:09.845799
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-spjoshi/Flask_ml
-https://github.com/spjoshi/Flask_ml
-Entry file: Flask_ml/api/__init__.py
-Scanned: 2016-10-20 12:19:12.080698
-No vulnerabilities found.
-
-
-SeoDongMyeong/Simple-Flask
-https://github.com/SeoDongMyeong/Simple-Flask
-Entry file: Simple-Flask/application.py
-Scanned: 2016-10-20 12:19:13.443724
-No vulnerabilities found.
-
-
-sebastiken/flask-miot
-https://github.com/sebastiken/flask-miot
-Entry file: flask-miot/app/__init__.py
-Scanned: 2016-10-20 12:19:14.740986
-No vulnerabilities found.
-
-
-Yichuans/flask-project
-https://github.com/Yichuans/flask-project
-Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:19:23.272346
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-ugorbolsky/flask-demo
-https://github.com/ugorbolsky/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:19:23.836766
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ugorbolsky/flask-demo.
-
-tjcim/flask_skeleton
-https://github.com/tjcim/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 12:19:24.344875
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-Jeimmi/UserFlask
-https://github.com/Jeimmi/UserFlask
-Entry file: UserFlask/User.py
-Scanned: 2016-10-20 12:19:25.639951
-No vulnerabilities found.
-
-
-chandureddys/Microblog-flask
-https://github.com/chandureddys/Microblog-flask
-Entry file: Microblog-flask/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:19:36.076815
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-daivq/Flask_Basic
-https://github.com/daivq/Flask_Basic
-Entry file: Flask_Basic/flaskr.py
-Scanned: 2016-10-20 12:19:37.508190
-No vulnerabilities found.
-
-
-vikingspy/flask-taskr
-https://github.com/vikingspy/flask-taskr
-Entry file: flask-taskr/views.py
-Scanned: 2016-10-20 12:19:38.326814
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-taskr/env/lib/python2.7/genericpath.py
-
-lessons-of-k4zzk/lessons-flask
-https://github.com/lessons-of-k4zzk/lessons-flask
-Entry file: lessons-flask/app.py
-Scanned: 2016-10-20 12:19:39.640229
-No vulnerabilities found.
-
-
-smirnov-am/flask-ablog
-https://github.com/smirnov-am/flask-ablog
-Entry file: flask-ablog/app/__init__.py
-Scanned: 2016-10-20 12:19:41.319942
-Vulnerability 1:
-File: flask-ablog/app/main/views.py
- > User input at line 113, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-ablog/app/main/views.py
- > Line 115: offset = page - 1 * per_page
- File: flask-ablog/app/main/views.py
- > Line 127: pagination = 'has_prev''prev_num''page''has_next''pages'page > 1TrueFalsepage - 1pagepost_count > offset + len(posts)TrueFalse[i for i in range(1, 1 + post_count + per_page - 1 // per_page)]
-File: flask-ablog/app/main/views.py
- > reaches line 138, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination, tags=tags, tag_cloud=tag_cloud)
-
-Vulnerability 2:
-File: flask-ablog/app/main/views.py
- > User input at line 266, trigger word "get(":
- slug = request.args.get('post')
-Reassigned in:
- File: flask-ablog/app/main/views.py
- > Line 268: post = Post.objects.get_or_404(slug=slug)
-File: flask-ablog/app/main/views.py
- > reaches line 277, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',slug=post.slug))
-
-Vulnerability 3:
-File: flask-ablog/app/main/views.py
- > User input at line 266, trigger word "get(":
- slug = request.args.get('post')
-Reassigned in:
- File: flask-ablog/app/main/views.py
- > Line 268: post = Post.objects.get_or_404(slug=slug)
-File: flask-ablog/app/main/views.py
- > reaches line 277, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',slug=post.slug))
-
-
-
-Himenon/SampleFlask
-https://github.com/Himenon/SampleFlask
-Entry file: SampleFlask/SampleFlask.py
-Scanned: 2016-10-20 12:19:42.601510
-No vulnerabilities found.
-
-
-timrichardson/growthpath_flask
-https://github.com/timrichardson/growthpath_flask
-Entry file: growthpath_flask/app/__init__.py
-Scanned: 2016-10-20 12:19:44.579824
-No vulnerabilities found.
-
-
-frombegin/flask-first
-https://github.com/frombegin/flask-first
-Entry file: flask-first/flask-first-notes.py
-Scanned: 2016-10-20 12:19:45.105068
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bmw9t/flask_test
-https://github.com/bmw9t/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:19:45.707464
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vikingspy/flask-blog
-https://github.com/vikingspy/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:19:46.328490
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-searene/flask-chat
-https://github.com/searene/flask-chat
-Entry file: flask-chat/chat.py
-Scanned: 2016-10-20 12:19:46.838981
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-virtowlee/flask-work
-https://github.com/virtowlee/flask-work
-Entry file: flask-work/work/env/lib/python2.7/site-packages/Flask-0.10.1-py2.7.egg/flask/sessions.py
-Scanned: 2016-10-20 12:19:54.870106
-No vulnerabilities found.
-
-
-DmytroKaminskiy/flask_skeleton
-https://github.com/DmytroKaminskiy/flask_skeleton
-Entry file: flask_skeleton/flask_skeleton/config.py
-Scanned: 2016-10-20 12:19:55.418378
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-jwh5566/flask_blog
-https://github.com/jwh5566/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:19:55.938956
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thanhan312/test_flask
-https://github.com/thanhan312/test_flask
-Entry file: test_flask/app.py
-Scanned: 2016-10-20 12:19:57.368703
-No vulnerabilities found.
-
-
-charup/Python_Flask
-https://github.com/charup/Python_Flask
-Entry file: Python_Flask/hello_dynamicVar.py
-Scanned: 2016-10-20 12:20:02.370134
-Vulnerability 1:
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > User input at line 23, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 30: filename = secure_filename(file.filename)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > reaches line 32, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > User input at line 23, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 30: filename = secure_filename(file.filename)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: Python_Flask/uploadFileToFolder_DisplayFile.py
- > reaches line 32, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-vishalggrc/flask-demo
-https://github.com/vishalggrc/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:20:02.887239
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vishalggrc/flask-demo.
-
-jiyeonseo/start_flask
-https://github.com/jiyeonseo/start_flask
-Entry file: start_flask/start_flask.py
-Scanned: 2016-10-20 12:20:04.207102
-No vulnerabilities found.
-
-
-emrahayanoglu/Flask-Skeleton
-https://github.com/emrahayanoglu/Flask-Skeleton
-Entry file: None
-Scanned: 2016-10-20 12:20:04.737915
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/emrahayanoglu/Flask-Skeleton.
-
-vanstinger/Flask-Projects
-https://github.com/vanstinger/Flask-Projects
-Entry file: Flask-Projects/hello.py
-Scanned: 2016-10-20 12:20:06.058743
-No vulnerabilities found.
-
-
-chenminhua/flask-boilerplate
-https://github.com/chenminhua/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 12:20:06.612796
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/chenminhua/flask-boilerplate.
-
-easydaniel/flask-base
-https://github.com/easydaniel/flask-base
-Entry file: None
-Scanned: 2016-10-20 12:20:07.139907
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/easydaniel/flask-base.
-
-piyush121/Python-Flask
-https://github.com/piyush121/Python-Flask
-Entry file: None
-Scanned: 2016-10-20 12:20:09.650721
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/piyush121/Python-Flask.
-
-tianmaxingkonggrant/tianmaflaskblog
-https://github.com/tianmaxingkonggrant/tianmaflaskblog
-Entry file: tianmaflaskblog/app/__init__.py
-Scanned: 2016-10-20 12:20:13.315969
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-DeeeFOX/Flaxample
-https://github.com/DeeeFOX/Flaxample
-Entry file: Flaxample/gocon_monitor/__init__.py
-Scanned: 2016-10-20 12:20:21.133700
-No vulnerabilities found.
-
-
-HenryZivers/flablo
-https://github.com/HenryZivers/flablo
-Entry file: flablo/flablo/__init__.py
-Scanned: 2016-10-20 12:20:24.262515
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-devyul/Python-Flask-WeChat-BAE
-https://github.com/devyul/Python-Flask-WeChat-BAE
-Entry file: Python-Flask-WeChat-BAE/index.py
-Scanned: 2016-10-20 12:20:25.582032
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Panguins/FlaskByExample
-https://github.com/Panguins/FlaskByExample
-Entry file: FlaskByExample/app.py
-Scanned: 2016-10-20 12:20:27.022163
-No vulnerabilities found.
-
-
-yongli82/FlaskBookRead
-https://github.com/yongli82/FlaskBookRead
-Entry file: FlaskBookRead/application/__init__.py
-Scanned: 2016-10-20 12:20:34.260323
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-oxa/flask_celery_redis
-https://github.com/oxa/flask_celery_redis
-Entry file: flask_celery_redis/redis_demo.py
-Scanned: 2016-10-20 12:20:38.257890
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-skols/flask-by-example
-https://github.com/skols/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:20:39.942531
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-slushkovsky/flask_email_auth
-https://github.com/slushkovsky/flask_email_auth
-Entry file: flask_email_auth/example/simple_app/run.py
-Scanned: 2016-10-20 12:20:41.508402
-No vulnerabilities found.
-
-
-xdanielsb/PersonalTrainer-Flask
-https://github.com/xdanielsb/PersonalTrainer-Flask
-Entry file: None
-Scanned: 2016-10-20 12:20:49.423429
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-altipeak/safewalk-flask-integration
-https://github.com/altipeak/safewalk-flask-integration
-Entry file: safewalk-flask-integration/authentication_gateway.py
-Scanned: 2016-10-20 12:20:50.778746
-No vulnerabilities found.
-
-
-felipemfp/flask-by-example
-https://github.com/felipemfp/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:20:51.455183
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Blockshare/blockshare-flask-template
-https://github.com/Blockshare/blockshare-flask-template
-Entry file: blockshare-flask-template/app/__init__.py
-Scanned: 2016-10-20 12:20:57.423291
-Vulnerability 1:
-File: blockshare-flask-template/app/forms/user.py
- > User input at line 25, trigger word ".data":
- check = self.model.query.filter(self.field == field.data).first()
-File: blockshare-flask-template/app/forms/user.py
- > reaches line 25, trigger word "filter(":
- check = self.model.query.filter(self.field == field.data).first()
-
-Vulnerability 2:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 67, trigger word ".data":
- tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password)
-Reassigned in:
- File: blockshare-flask-template/app/views/main.py
- > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 72, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 3:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 71, trigger word ".data":
- message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 72, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 4:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 67, trigger word ".data":
- tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password)
-Reassigned in:
- File: blockshare-flask-template/app/views/main.py
- > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 76, trigger word "flash(":
- flash(tx['message'], 'negative')
-
-Vulnerability 5:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 108, trigger word ".data":
- message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: blockshare-flask-template/app/views/main.py
- > reaches line 109, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 6:
-File: blockshare-flask-template/app/views/main.py
- > User input at line 120, trigger word "form(":
- points = [(random.uniform(48.84341, 48.86341), random.uniform(2.3388, 2.3588)) for _ in range(random.randint(2, 9))]
-File: blockshare-flask-template/app/views/main.py
- > reaches line 123, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('points'points)
-
-Vulnerability 7:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 24, trigger word ".data":
- user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data)
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 39: token = ts.dumps(user.email,salt='email-confirm-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 41, trigger word "url_for(":
- confirmUrl = url_for('userbp.confirm',token=token, _external=True)
-
-Vulnerability 8:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 24, trigger word ".data":
- user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data)
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 39: token = ts.dumps(user.email,salt='email-confirm-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 43, trigger word "render_template(":
- html = render_template('email/confirm.html',confirm_url=confirmUrl)
-
-Vulnerability 9:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 118, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 124: token = ts.dumps(user.email,salt='password-reset-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 126, trigger word "url_for(":
- resetUrl = url_for('userbp.reset',token=token, _external=True)
-
-Vulnerability 10:
-File: blockshare-flask-template/app/views/user.py
- > User input at line 118, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: blockshare-flask-template/app/views/user.py
- > Line 124: token = ts.dumps(user.email,salt='password-reset-key')
-File: blockshare-flask-template/app/views/user.py
- > reaches line 128, trigger word "render_template(":
- html = render_template('email/reset.html',reset_url=resetUrl)
-
-
-
-lpty/a-web-use-flask
-https://github.com/lpty/a-web-use-flask
-Entry file: a-web-use-flask/app/__init__.py
-Scanned: 2016-10-20 12:21:05.661417
-Vulnerability 1:
-File: a-web-use-flask/app/main/views.py
- > User input at line 18, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: a-web-use-flask/app/main/views.py
- > Line 23: pagination = current_user.followed_posts.order_by(Post.timestamp).paginate(page,per_page=10, error_out=False)
- File: a-web-use-flask/app/main/views.py
- > Line 27: pagination = Post.query.order_by(Post.timestamp).paginate(page,per_page=10, error_out=False)
- File: a-web-use-flask/app/main/views.py
- > Line 30: posts = pagination.items
- File: a-web-use-flask/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: a-web-use-flask/app/main/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 2:
-File: a-web-use-flask/app/main/views.py
- > User input at line 21, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ' '))
-Reassigned in:
- File: a-web-use-flask/app/main/views.py
- > Line 19: show_followed = False
- File: a-web-use-flask/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: a-web-use-flask/app/main/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 3:
-File: a-web-use-flask/app/main/views.py
- > User input at line 95, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: a-web-use-flask/app/main/views.py
- > Line 96: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: a-web-use-flask/app/main/views.py
- > Line 98: comments = pagination.items
- File: a-web-use-flask/app/main/views.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.post',id=post.id))
-File: a-web-use-flask/app/main/views.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: a-web-use-flask/app/main/views.py
- > User input at line 151, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: a-web-use-flask/app/main/views.py
- > Line 152: pagination = user.follower.paginate(page,per_page=10, error_out=False)
- File: a-web-use-flask/app/main/views.py
- > Line 153: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: a-web-use-flask/app/main/views.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: a-web-use-flask/app/main/views.py
- > reaches line 154, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('follower.html',user=user, title='Followers of', pagination=pagination, follows=follows)
-
-
-
-sean-lynch/flask-cli-issue
-https://github.com/sean-lynch/flask-cli-issue
-Entry file: flask-cli-issue/server/__init__.py
-Scanned: 2016-10-20 12:21:07.036796
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cambers/ReallyRealFlask
-https://github.com/cambers/ReallyRealFlask
-Entry file: ReallyRealFlask/Hello_world/app.py
-Scanned: 2016-10-20 12:21:15.414192
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lwalter/flask-react-musicshare
-https://github.com/lwalter/flask-react-musicshare
-Entry file: flask-react-musicshare/app/factory.py
-Scanned: 2016-10-20 12:21:17.023814
-No vulnerabilities found.
-
-
-yoophi/flask-sample-app
-https://github.com/yoophi/flask-sample-app
-Entry file: None
-Scanned: 2016-10-20 12:21:18.991302
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flask-sample-app.
-
-lixutang/Python_Web_Flask
-https://github.com/lixutang/Python_Web_Flask
-Entry file: Python_Web_Flask/app/__init__.py
-Scanned: 2016-10-20 12:21:21.778946
-Vulnerability 1:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Python_Web_Flask/app/main/views.py
- > Line 32: posts = pagination.items
- File: Python_Web_Flask/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Python_Web_Flask/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 22: show_followed = False
- File: Python_Web_Flask/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Python_Web_Flask/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Python_Web_Flask/app/main/views.py
- > Line 44: posts = pagination.items
-File: Python_Web_Flask/app/main/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 104, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Python_Web_Flask/app/main/views.py
- > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Python_Web_Flask/app/main/views.py
- > Line 111: comments = pagination.items
- File: Python_Web_Flask/app/main/views.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Python_Web_Flask/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 171, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Python_Web_Flask/app/main/views.py
- > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Python_Web_Flask/app/main/views.py
- > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Python_Web_Flask/app/main/views.py
- > reaches line 177, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 188, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Python_Web_Flask/app/main/views.py
- > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Python_Web_Flask/app/main/views.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Python_Web_Flask/app/main/views.py
- > reaches line 194, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Python_Web_Flask/app/main/views.py
- > User input at line 219, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Python_Web_Flask/app/main/views.py
- > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Python_Web_Flask/app/main/views.py
- > Line 223: comments = pagination.items
-File: Python_Web_Flask/app/main/views.py
- > reaches line 224, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-paulgoblin/flask
-https://github.com/paulgoblin/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:21:24.243042
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-tayan-serna/flask
-https://github.com/tayan-serna/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:21:24.821358
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-virtue1990/flask
-https://github.com/virtue1990/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:21:25.396106
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sushmit86/Flask
-https://github.com/sushmit86/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:21:25.916603
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vorkos/flask
-https://github.com/vorkos/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:21:26.500475
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-mussaimo/auth-flask
-https://github.com/mussaimo/auth-flask
-Entry file: auth-flask/app.py
-Scanned: 2016-10-20 12:21:31.461172
-No vulnerabilities found.
-
-
-matinde/flasktaskr
-https://github.com/matinde/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:21:32.003263
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-William0423/flaskybooklearn
-https://github.com/William0423/flaskybooklearn
-Entry file: flaskybooklearn/app/__init__.py
-Scanned: 2016-10-20 12:21:33.999781
-Vulnerability 1:
-File: flaskybooklearn/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 32: posts = pagination.items
- File: flaskybooklearn/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskybooklearn/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 22: show_followed = False
- File: flaskybooklearn/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskybooklearn/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 44: posts = pagination.items
-File: flaskybooklearn/app/main/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskybooklearn/app/main/views.py
- > User input at line 104, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskybooklearn/app/main/views.py
- > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 111: comments = pagination.items
- File: flaskybooklearn/app/main/views.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskybooklearn/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskybooklearn/app/main/views.py
- > User input at line 171, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskybooklearn/app/main/views.py
- > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 177, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskybooklearn/app/main/views.py
- > User input at line 188, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskybooklearn/app/main/views.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 194, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskybooklearn/app/main/views.py
- > User input at line 219, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 223: comments = pagination.items
-File: flaskybooklearn/app/main/views.py
- > reaches line 224, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flaskybooklearn/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskybooklearn/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flaskybooklearn/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskybooklearn/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flaskybooklearn/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskybooklearn/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-powerlanguage/flasktaskr
-https://github.com/powerlanguage/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:21:34.507669
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cmacro/flaskblog
-https://github.com/cmacro/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:21:35.038686
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-vrofze/flasky
-https://github.com/vrofze/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:21:35.544198
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tuppa/flaskapp
-https://github.com/tuppa/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:21:36.047725
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tuppa/flaskapp.
-
-quyip8818/flaskrestful
-https://github.com/quyip8818/flaskrestful
-Entry file: flaskrestful/flaskrestful.py
-Scanned: 2016-10-20 12:21:36.587826
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gandhk/flasklearn
-https://github.com/gandhk/flasklearn
-Entry file: flasklearn/main.py
-Scanned: 2016-10-20 12:21:37.871383
-No vulnerabilities found.
-
-
-Apophus/flaskdb
-https://github.com/Apophus/flaskdb
-Entry file: flaskdb/fdb.py
-Scanned: 2016-10-20 12:21:39.203906
-No vulnerabilities found.
-
-
-William0423/flaskylearn
-https://github.com/William0423/flaskylearn
-Entry file: flaskylearn/app/__init__.py
-Scanned: 2016-10-20 12:21:41.658935
-No vulnerabilities found.
-
-
-jerodestapa/flasktodo
-https://github.com/jerodestapa/flasktodo
-Entry file: flasktodo/application.py
-Scanned: 2016-10-20 12:21:42.389987
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-uptownjimmy/flasktaskr
-https://github.com/uptownjimmy/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:21:42.896385
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-getser/flaskapiblog
-https://github.com/getser/flaskapiblog
-Entry file: flaskapiblog/__init__.py
-Scanned: 2016-10-20 12:21:51.376913
-Vulnerability 1:
-File: flaskapiblog/views.py
- > User input at line 112, trigger word "get(":
- post = Post.query.get(post_id)
-File: flaskapiblog/views.py
- > reaches line 115, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('post'post._asdict())
-
-Vulnerability 2:
-File: flaskapiblog/views.py
- > User input at line 187, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: flaskapiblog/views.py
- > Line 193: visitor = Visitor(email=email)
-File: flaskapiblog/views.py
- > reaches line 197, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True))
-
-Vulnerability 3:
-File: flaskapiblog/views.py
- > User input at line 187, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: flaskapiblog/views.py
- > Line 193: visitor = Visitor(email=email)
-File: flaskapiblog/views.py
- > reaches line 197, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True))
-
-
-
-kirazz/flaskywebblog
-https://github.com/kirazz/flaskywebblog
-Entry file: flaskywebblog/PycharmProjects/webblog/app/__init__.py
-Scanned: 2016-10-20 12:21:55.316832
-Vulnerability 1:
-File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > User input at line 19, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 20: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=5, error_out=False)
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 22: posts = pagination.items
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > User input at line 91, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 93: page = post.comments.count() - 1 // 5 + 1
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 95: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=5, error_out=False)
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 97: comments = pagination.items
- File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskywebblog/PycharmProjects/webblog/app/main/views.py
- > reaches line 98, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-
-
-caspii/flaskr
-https://github.com/caspii/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:21:55.855365
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ejakait/flaskpro
-https://github.com/ejakait/flaskpro
-Entry file: None
-Scanned: 2016-10-20 12:22:07.519709
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tj621/flaskr
-https://github.com/tj621/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:22:08.060394
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-LinMingjie/flaskr
-https://github.com/LinMingjie/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:22:08.575388
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-supor/flaskr
-https://github.com/supor/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:22:16.125351
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ridnarong/flasky
-https://github.com/ridnarong/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:22:17.643507
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-seangilleran/flasko
-https://github.com/seangilleran/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-20 12:22:20.288071
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py
-
-weisongchen/flaskexercise
-https://github.com/weisongchen/flaskexercise
-Entry file: flaskexercise/hello.py
-Scanned: 2016-10-20 12:22:28.187102
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskexercise/venv/lib/python2.7/genericpath.py
-
-weisongchen/flaskapp
-https://github.com/weisongchen/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:22:28.771169
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/weisongchen/flaskapp.
-
-vmotto/FlaskBlog
-https://github.com/vmotto/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:22:29.395432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiangzhuyuan/flaskdemo1
-https://github.com/xiangzhuyuan/flaskdemo1
-Entry file: flaskdemo1/flaskdemo1/flaskr.py
-Scanned: 2016-10-20 12:22:31.166830
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-whimian/flaskyKrig
-https://github.com/whimian/flaskyKrig
-Entry file: flaskyKrig/test.py
-Scanned: 2016-10-20 12:22:36.878617
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-keer2345/flaskMega
-https://github.com/keer2345/flaskMega
-Entry file: flaskMega/app/__init__.py
-Scanned: 2016-10-20 12:22:38.196758
-No vulnerabilities found.
-
-
-josh14668/flaskApp
-https://github.com/josh14668/flaskApp
-Entry file: flaskApp/apiApp_new.py
-Scanned: 2016-10-20 12:22:38.742734
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-er3456qi/FlaskBlog
-https://github.com/er3456qi/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:22:39.357466
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vishwanath79/FlaskURLAPI
-https://github.com/vishwanath79/FlaskURLAPI
-Entry file: FlaskURLAPI/app.py
-Scanned: 2016-10-20 12:22:46.806831
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskURLAPI/hadoopify/lib/python2.7/genericpath.py
-
-krizo/flaskTutorial
-https://github.com/krizo/flaskTutorial
-Entry file: flaskTutorial/flaskr.py
-Scanned: 2016-10-20 12:22:47.418409
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTutorial/venv/lib/python2.7/genericpath.py
-
-vishalggrc/flask-blog
-https://github.com/vishalggrc/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:22:47.952566
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-nmartinez23/CRUD_flask
-https://github.com/nmartinez23/CRUD_flask
-Entry file: CRUD_flask/app.py
-Scanned: 2016-10-20 12:22:49.297974
-No vulnerabilities found.
-
-
-spot-test/flask_app
-https://github.com/spot-test/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:22:49.806465
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/spot-test/flask_app.
-
-brokenhd/flask-blog
-https://github.com/brokenhd/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:22:50.839920
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-qingchn/flask-copy
-https://github.com/qingchn/flask-copy
-Entry file: flask-copy/app/__init__.py
-Scanned: 2016-10-20 12:22:52.280511
-No vulnerabilities found.
-
-
-pbabik/flask-lipsum
-https://github.com/pbabik/flask-lipsum
-Entry file: flask-lipsum/app.py
-Scanned: 2016-10-20 12:22:53.594506
-Vulnerability 1:
-File: flask-lipsum/app.py
- > User input at line 51, trigger word "get(":
- n_paragraphs = int(request.args.get('paragraphs', 5))
-Reassigned in:
- File: flask-lipsum/app.py
- > Line 52: content = get_paragraphs(n_paragraphs)
-File: flask-lipsum/app.py
- > reaches line 53, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'content)
-
-
-
-daivq/Flask_Blog
-https://github.com/daivq/Flask_Blog
-Entry file: Flask_Blog/Blog/blog.py
-Scanned: 2016-10-20 12:22:54.443084
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jnarayanam/flask-demo
-https://github.com/jnarayanam/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:22:54.945946
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jnarayanam/flask-demo.
-
-kaymation/flask_plural
-https://github.com/kaymation/flask_plural
-Entry file: None
-Scanned: 2016-10-20 12:23:02.311969
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-encima/flask-task
-https://github.com/encima/flask-task
-Entry file: flask-task/app/__init__.py
-Scanned: 2016-10-20 12:23:04.951027
-Vulnerability 1:
-File: flask-task/app/views.py
- > User input at line 87, trigger word "form[":
- task = twl.w.get_task(id=request.form['id'])
-Reassigned in:
- File: flask-task/app/views.py
- > Line 90: project = task[1]['project']
- File: flask-task/app/views.py
- > Line 84: project = 'unassigned'
-File: flask-task/app/views.py
- > reaches line 95, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('error''table''project'Falsemsgproject)
-
-
-
-nitin42/Flask-App
-https://github.com/nitin42/Flask-App
-Entry file: Flask-App/Flask-SQLAlchemy/app.py
-Scanned: 2016-10-20 12:23:06.237821
-No vulnerabilities found.
-
-
-DivisionMax/mover-flask
-https://github.com/DivisionMax/mover-flask
-Entry file: mover-flask/index.py
-Scanned: 2016-10-20 12:23:07.777314
-Vulnerability 1:
-File: mover-flask/index.py
- > User input at line 41, trigger word "form[":
- _email = request.form['email']
-File: mover-flask/index.py
- > reaches line 48, trigger word "execute(":
- cursor.execute('SELECT * FROM mobile_app_users WHERE emailAddress = %s', (_email))
-
-Vulnerability 2:
-File: mover-flask/index.py
- > User input at line 90, trigger word "form[":
- _email = request.form['email']
-File: mover-flask/index.py
- > reaches line 96, trigger word "execute(":
- cursor.execute('SELECT * FROM mobile_app_users WHERE emailAddress = %s', (_email))
-
-Vulnerability 3:
-File: mover-flask/index.py
- > User input at line 90, trigger word "form[":
- _email = request.form['email']
-File: mover-flask/index.py
- > reaches line 104, trigger word "execute(":
- cursor.execute('INSERT INTO mobile_app_users (emailAddress,password,username) values (%s,%s,%s)', (_email, password_hash, username))
-
-Vulnerability 4:
-File: mover-flask/index.py
- > User input at line 92, trigger word "form[":
- _password = request.form['password']
-Reassigned in:
- File: mover-flask/index.py
- > Line 103: password_hash = hash_password(_password)
-File: mover-flask/index.py
- > reaches line 104, trigger word "execute(":
- cursor.execute('INSERT INTO mobile_app_users (emailAddress,password,username) values (%s,%s,%s)', (_email, password_hash, username))
-
-Vulnerability 5:
-File: mover-flask/index.py
- > User input at line 129, trigger word "get(":
- _userId = request.args.get('userId')
-File: mover-flask/index.py
- > reaches line 138, trigger word "execute(":
- cursor.execute('SELECT accidentId as id, accidentTime as time,X(location) as x, Y(location) as y FROM simplerunningaccidents WHERE mobileAppUserId = %s', (_userId))
-
-Vulnerability 6:
-File: mover-flask/index.py
- > User input at line 191, trigger word "form[":
- _longitude = request.form['longitude']
-File: mover-flask/index.py
- > reaches line 205, trigger word "execute(":
- cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId))
-
-Vulnerability 7:
-File: mover-flask/index.py
- > User input at line 192, trigger word "form[":
- _latitude = request.form['latitude']
-File: mover-flask/index.py
- > reaches line 205, trigger word "execute(":
- cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId))
-
-Vulnerability 8:
-File: mover-flask/index.py
- > User input at line 193, trigger word "form[":
- _timeOfAccidentTimestamp = request.form['time-of-accident']
-File: mover-flask/index.py
- > reaches line 205, trigger word "execute(":
- cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId))
-
-Vulnerability 9:
-File: mover-flask/index.py
- > User input at line 194, trigger word "form[":
- _userId = request.form['userId']
-File: mover-flask/index.py
- > reaches line 205, trigger word "execute(":
- cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId))
-
-Vulnerability 10:
-File: mover-flask/index.py
- > User input at line 191, trigger word "form[":
- _longitude = request.form['longitude']
-File: mover-flask/index.py
- > reaches line 217, trigger word "execute(":
- cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId))
-
-Vulnerability 11:
-File: mover-flask/index.py
- > User input at line 192, trigger word "form[":
- _latitude = request.form['latitude']
-File: mover-flask/index.py
- > reaches line 217, trigger word "execute(":
- cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId))
-
-Vulnerability 12:
-File: mover-flask/index.py
- > User input at line 193, trigger word "form[":
- _timeOfAccidentTimestamp = request.form['time-of-accident']
-File: mover-flask/index.py
- > reaches line 217, trigger word "execute(":
- cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId))
-
-Vulnerability 13:
-File: mover-flask/index.py
- > User input at line 194, trigger word "form[":
- _userId = request.form['userId']
-File: mover-flask/index.py
- > reaches line 217, trigger word "execute(":
- cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId))
-
-Vulnerability 14:
-File: mover-flask/index.py
- > User input at line 212, trigger word "form[":
- _acceleration = request.form['acceleration']
-File: mover-flask/index.py
- > reaches line 217, trigger word "execute(":
- cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId))
-
-
-
-wyattkroemer/yFlask
-https://github.com/wyattkroemer/yFlask
-Entry file: yFlask/app/__init__.py
-Scanned: 2016-10-20 12:23:09.061390
-No vulnerabilities found.
-
-
-BethMwangi/Flask-social
-https://github.com/BethMwangi/Flask-social
-Entry file: None
-Scanned: 2016-10-20 12:23:18.047864
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mistermocha/flask-lesson
-https://github.com/mistermocha/flask-lesson
-Entry file: flask-lesson/webapp.py
-Scanned: 2016-10-20 12:23:18.594097
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Sustainabilist/Flask-tutorial
-https://github.com/Sustainabilist/Flask-tutorial
-Entry file: Flask-tutorial/flask_app.py
-Scanned: 2016-10-20 12:23:19.102950
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sanchitgupta001/Basic_Flask
-https://github.com/sanchitgupta001/Basic_Flask
-Entry file: None
-Scanned: 2016-10-20 12:23:26.189066
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanchitgupta001/Basic_Flask.
-
-teeracy/Flask-Workshop
-https://github.com/teeracy/Flask-Workshop
-Entry file: Flask-Workshop/step3.py
-Scanned: 2016-10-20 12:23:28.058413
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Stuj79/flask-test
-https://github.com/Stuj79/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:23:28.585394
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-AdamWawrow/flask-blog
-https://github.com/AdamWawrow/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:23:29.146157
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-xlliu/flask_celery
-https://github.com/xlliu/flask_celery
-Entry file: flask_celery/mongo2mysql.py
-Scanned: 2016-10-20 12:23:31.165396
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vero4karu/flask-examples
-https://github.com/vero4karu/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-20 12:23:32.203362
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marikgoran/hello-flask
-https://github.com/marikgoran/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:23:37.807607
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-JetPac33/simple_flask
-https://github.com/JetPac33/simple_flask
-Entry file: simple_flask/hello.py
-Scanned: 2016-10-20 12:23:46.808856
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-iamliamc/court_flask
-https://github.com/iamliamc/court_flask
-Entry file: court_flask/app/__init__.py
-Scanned: 2016-10-20 12:23:56.047403
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-mikolajtr/flask_sample
-https://github.com/mikolajtr/flask_sample
-Entry file: flask_sample/app_hello.py
-Scanned: 2016-10-20 12:23:56.568716
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-spotts-moz/flask_app
-https://github.com/spotts-moz/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:23:57.066173
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/spotts-moz/flask_app.
-
-gmtprime/flask-microservices
-https://github.com/gmtprime/flask-microservices
-Entry file: flask-microservices/app.py
-Scanned: 2016-10-20 12:23:58.394473
-No vulnerabilities found.
-
-
-devops-life/flask-todo
-https://github.com/devops-life/flask-todo
-Entry file: flask-todo/backend/app.py
-Scanned: 2016-10-20 12:23:58.933164
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chedom/restaurants-flask
-https://github.com/chedom/restaurants-flask
-Entry file: restaurants-flask/app.py
-Scanned: 2016-10-20 12:24:02.343601
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-newivan/flask_select
-https://github.com/newivan/flask_select
-Entry file: flask_select/app.py
-Scanned: 2016-10-20 12:24:03.669332
-No vulnerabilities found.
-
-
-vtrubets/flask-tutorial
-https://github.com/vtrubets/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:24:04.182857
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nikolzp/Flask_mongo
-https://github.com/nikolzp/Flask_mongo
-Entry file: None
-Scanned: 2016-10-20 12:24:11.018378
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kyokley/flask-scratch
-https://github.com/kyokley/flask-scratch
-Entry file: flask-scratch/app/__init__.py
-Scanned: 2016-10-20 12:24:12.939428
-No vulnerabilities found.
-
-
-wing3s/flask-chatterbot
-https://github.com/wing3s/flask-chatterbot
-Entry file: flask-chatterbot/flaskchatterbot/flaskchatterbot.py
-Scanned: 2016-10-20 12:24:14.321918
-No vulnerabilities found.
-
-
-stryjko/CV_Flask
-https://github.com/stryjko/CV_Flask
-Entry file: CV_Flask/app.py
-Scanned: 2016-10-20 12:24:23.333135
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: CV_Flask/CV_Flask_Virtual/lib/python2.7/genericpath.py
-
-samuelcg/flask_stormpath
-https://github.com/samuelcg/flask_stormpath
-Entry file: flask_stormpath/flaskr.py
-Scanned: 2016-10-20 12:24:24.713718
-No vulnerabilities found.
-
-
-krishnaxv/flask-battlefield
-https://github.com/krishnaxv/flask-battlefield
-Entry file: None
-Scanned: 2016-10-20 12:24:26.000474
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/krishnaxv/flask-battlefield.
-
-thechutrain/flask-microblog
-https://github.com/thechutrain/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:24:26.537251
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sunyton/flask_ecard
-https://github.com/sunyton/flask_ecard
-Entry file: flask_ecard/app2.py
-Scanned: 2016-10-20 12:24:27.831494
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ccsexyz/blog
-https://github.com/ccsexyz/blog
-Entry file: blog/flaskr.py
-Scanned: 2016-10-20 12:24:28.362002
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-HenryZivers/flablo
-https://github.com/HenryZivers/flablo
-Entry file: flablo/flablo/__init__.py
-Scanned: 2016-10-20 12:24:28.867727
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alannguyen90/FlaskCamServer
-https://github.com/alannguyen90/FlaskCamServer
-Entry file: FlaskCamServer/angular_flask/__init__.py
-Scanned: 2016-10-20 12:24:32.221843
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shivam-maharshi/FlaskPythonTutorial
-https://github.com/shivam-maharshi/FlaskPythonTutorial
-Entry file: FlaskPythonTutorial/src/__init__.py
-Scanned: 2016-10-20 12:24:33.674605
-No vulnerabilities found.
-
-
-chengruilin/FlaskMobileApi
-https://github.com/chengruilin/FlaskMobileApi
-Entry file: FlaskMobileApi/main.py
-Scanned: 2016-10-20 12:24:35.025122
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-deathanchor/flask_mongoengine_tutorial
-https://github.com/deathanchor/flask_mongoengine_tutorial
-Entry file: flask_mongoengine_tutorial/src/app/__init__.py
-Scanned: 2016-10-20 12:24:36.339996
-No vulnerabilities found.
-
-
-dzakok/Pemrograman-Web-Python-Flask
-https://github.com/dzakok/Pemrograman-Web-Python-Flask
-Entry file: Pemrograman-Web-Python-Flask/app.py
-Scanned: 2016-10-20 12:24:44.538523
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-RichardJTorres/flask-angular-wordcount
-https://github.com/RichardJTorres/flask-angular-wordcount
-Entry file: flask-angular-wordcount/app.py
-Scanned: 2016-10-20 12:24:47.754522
-No vulnerabilities found.
-
-
-MikeHannon/flask_quick_start
-https://github.com/MikeHannon/flask_quick_start
-Entry file: flask_quick_start/server.py
-Scanned: 2016-10-20 12:24:49.563205
-No vulnerabilities found.
-
-
-davidjb90/Introduction-to-Flask
-https://github.com/davidjb90/Introduction-to-Flask
-Entry file: Introduction-to-Flask/hello_world.py
-Scanned: 2016-10-20 12:24:50.859557
-No vulnerabilities found.
-
-
-g4b1s/RestfulAPI-with-flask
-https://github.com/g4b1s/RestfulAPI-with-flask
-Entry file: RestfulAPI-with-flask/app.py
-Scanned: 2016-10-20 12:24:52.157684
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xdanielsb/PersonalTrainer-Flask
-https://github.com/xdanielsb/PersonalTrainer-Flask
-Entry file: None
-Scanned: 2016-10-20 12:24:52.671813
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-TunedMystic/docker-flask-base
-https://github.com/TunedMystic/docker-flask-base
-Entry file: docker-flask-base/app/app.py
-Scanned: 2016-10-20 12:24:54.052523
-Vulnerability 1:
-File: docker-flask-base/app/app.py
- > User input at line 54, trigger word "get(":
- search_text = request.args.get('q', '').strip()
-File: docker-flask-base/app/app.py
- > reaches line 55, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = make_response(jsonify(message=search_text), 200, headers)
-
-
-
-cambers/ReallyRealFlask
-https://github.com/cambers/ReallyRealFlask
-Entry file: ReallyRealFlask/Hello_world/app.py
-Scanned: 2016-10-20 12:24:56.698086
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Paopand1/flask-hello-world
-https://github.com/Paopand1/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:24:57.252187
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-spot-test/flask_test_app
-https://github.com/spot-test/flask_test_app
-Entry file: flask_test_app/app.py
-Scanned: 2016-10-20 12:24:58.576619
-No vulnerabilities found.
-
-
-ghyoun/dojo_survey_flask
-https://github.com/ghyoun/dojo_survey_flask
-Entry file: dojo_survey_flask/survey.py
-Scanned: 2016-10-20 12:25:06.358433
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marvinmarnold/flask-meet-instructors
-https://github.com/marvinmarnold/flask-meet-instructors
-Entry file: flask-meet-instructors/hello.py
-Scanned: 2016-10-20 12:25:07.766340
-No vulnerabilities found.
-
-
-meloalright/flask
-https://github.com/meloalright/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:25:09.731229
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-paulgoblin/flask
-https://github.com/paulgoblin/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:25:10.311030
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-tayan-serna/flask
-https://github.com/tayan-serna/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:25:11.897393
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-gisumwa/Flask
-https://github.com/gisumwa/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:25:12.421528
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhouleian/flask
-https://github.com/zhouleian/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:25:14.020038
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-timmyreilly/intro-to-flask
-https://github.com/timmyreilly/intro-to-flask
-Entry file: intro-to-flask/hello.py
-Scanned: 2016-10-20 12:25:18.796882
-No vulnerabilities found.
-
-
-Revolution1/Flask-WhooshAlchemyPlus
-https://github.com/Revolution1/Flask-WhooshAlchemyPlus
-Entry file: Flask-WhooshAlchemyPlus/test/test_all.py
-Scanned: 2016-10-20 12:25:25.840491
-No vulnerabilities found.
-
-
-vrofze/flasky
-https://github.com/vrofze/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:25:28.797669
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ccsaber/flasker
-https://github.com/ccsaber/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 12:25:29.320967
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Gre4tWhite/Flasknightmare
-https://github.com/Gre4tWhite/Flasknightmare
-Entry file: Flasknightmare/app/__init__.py
-Scanned: 2016-10-20 12:25:35.899304
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gzeinieh/flaskr
-https://github.com/gzeinieh/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:25:36.428242
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rhildreth/flaskbook
-https://github.com/rhildreth/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:25:36.978412
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-TacticalGoat/flasktest
-https://github.com/TacticalGoat/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 12:25:37.494323
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-getser/flaskapiblog
-https://github.com/getser/flaskapiblog
-Entry file: flaskapiblog/__init__.py
-Scanned: 2016-10-20 12:25:46.338706
-Vulnerability 1:
-File: flaskapiblog/views.py
- > User input at line 112, trigger word "get(":
- post = Post.query.get(post_id)
-File: flaskapiblog/views.py
- > reaches line 115, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('post'post._asdict())
-
-Vulnerability 2:
-File: flaskapiblog/views.py
- > User input at line 187, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: flaskapiblog/views.py
- > Line 193: visitor = Visitor(email=email)
-File: flaskapiblog/views.py
- > reaches line 197, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True))
-
-Vulnerability 3:
-File: flaskapiblog/views.py
- > User input at line 187, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: flaskapiblog/views.py
- > Line 193: visitor = Visitor(email=email)
-File: flaskapiblog/views.py
- > reaches line 197, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True))
-
-
-
-Paopand1/flasktaskr
-https://github.com/Paopand1/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:25:48.853210
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vnxichow/flaskapp
-https://github.com/vnxichow/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:25:49.405359
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vnxichow/flaskapp.
-
-gabrielssilva/flasktasks
-https://github.com/gabrielssilva/flasktasks
-Entry file: flasktasks/flasktasks/__init__.py
-Scanned: 2016-10-20 12:25:53.461541
-Vulnerability 1:
-File: flasktasks/flasktasks/views.py
- > User input at line 35, trigger word "get(":
- mission = Mission.query.get_or_404(request.args.get('mission_id'))
-Reassigned in:
- File: flasktasks/flasktasks/views.py
- > Line 33: mission = None
-File: flasktasks/flasktasks/views.py
- > reaches line 44, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('task/index.html',tasks=tasks_by_status, mission=mission)
-
-Vulnerability 2:
-File: flasktasks/flasktasks/views.py
- > User input at line 96, trigger word "get(":
- color = Color(int(request.form.get('color_id')))
-Reassigned in:
- File: flasktasks/flasktasks/views.py
- > Line 99: tag = Tag(request.form.get('name'), color)
- File: flasktasks/flasktasks/views.py
- > Line 104: colors = {color.name : color.value for color in Color}
- File: flasktasks/flasktasks/views.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('missions'))
-File: flasktasks/flasktasks/views.py
- > reaches line 105, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tags/new.html',colors=colors)
-
-
-
-cjfoster10/flasktaskr
-https://github.com/cjfoster10/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:25:53.985796
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-weisongchen/flaskexercise
-https://github.com/weisongchen/flaskexercise
-Entry file: flaskexercise/hello.py
-Scanned: 2016-10-20 12:25:54.590459
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskexercise/venv/lib/python2.7/genericpath.py
-
-weisongchen/flaskapp
-https://github.com/weisongchen/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:25:55.118173
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/weisongchen/flaskapp.
-
-Apophus/flaskR
-https://github.com/Apophus/flaskR
-Entry file: flaskR/flaskr/flaskr.py
-Scanned: 2016-10-20 12:25:57.433707
-No vulnerabilities found.
-
-
-mplessard/FlaskBoilerplate
-https://github.com/mplessard/FlaskBoilerplate
-Entry file: None
-Scanned: 2016-10-20 12:25:57.987250
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mplessard/FlaskBoilerplate.
-
-microxuzh/FlaskTutorial
-https://github.com/microxuzh/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 12:25:58.494809
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gitskim/FlaskAPI
-https://github.com/gitskim/FlaskAPI
-Entry file: None
-Scanned: 2016-10-20 12:26:00.007375
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/gitskim/FlaskAPI.
-
-er3456qi/FlaskBlog
-https://github.com/er3456qi/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:26:07.609396
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ivorivetta/FlaskTest
-https://github.com/ivorivetta/FlaskTest
-Entry file: None
-Scanned: 2016-10-20 12:26:09.117380
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ivorivetta/FlaskTest.
-
-pkml/flaskHello
-https://github.com/pkml/flaskHello
-Entry file: flaskHello/app.py
-Scanned: 2016-10-20 12:26:18.540592
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskHello/myEnv/lib/python2.7/genericpath.py
-
-xiechengsheng/FlaskApp
-https://github.com/xiechengsheng/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:26:19.163760
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paulhendricks/flasky2
-https://github.com/paulhendricks/flasky2
-Entry file: flasky2/app/__init__.py
-Scanned: 2016-10-20 12:26:20.651738
-No vulnerabilities found.
-
-
-nitin42/Flask-App
-https://github.com/nitin42/Flask-App
-Entry file: Flask-App/Flask-SQLAlchemy/app.py
-Scanned: 2016-10-20 12:26:22.060817
-No vulnerabilities found.
-
-
-milanoid/flask-playground
-https://github.com/milanoid/flask-playground
-Entry file: flask-playground/app/__init__.py
-Scanned: 2016-10-20 12:26:22.563764
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kossman/flask_project
-https://github.com/kossman/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 12:26:23.353973
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-woosungchu/flask-mongo
-https://github.com/woosungchu/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-20 12:26:24.934234
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-holynova/flask_book
-https://github.com/holynova/flask_book
-Entry file: None
-Scanned: 2016-10-20 12:26:33.613381
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-debuggermalhotra/Flask-projects
-https://github.com/debuggermalhotra/Flask-projects
-Entry file: Flask-projects/mr-echobot/mr-echobot.py
-Scanned: 2016-10-20 12:26:34.903382
-No vulnerabilities found.
-
-
-andrefaranha/flask-blog
-https://github.com/andrefaranha/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:26:35.456709
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-CurataEng/flask-api
-https://github.com/CurataEng/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 12:26:35.977148
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ankurdh/Hello-Flask
-https://github.com/ankurdh/Hello-Flask
-Entry file: Hello-Flask/wamt/wamt.py
-Scanned: 2016-10-20 12:26:37.305113
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Isor/flask-view
-https://github.com/Isor/flask-view
-Entry file: flask-view/view.py
-Scanned: 2016-10-20 12:26:38.654181
-No vulnerabilities found.
-
-
-250lth/myFlask
-https://github.com/250lth/myFlask
-Entry file: myFlask/project.py
-Scanned: 2016-10-20 12:26:39.212412
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bernardoVale/flask-cloneme
-https://github.com/bernardoVale/flask-cloneme
-Entry file: flask-cloneme/app/__init__.py
-Scanned: 2016-10-20 12:26:40.518903
-No vulnerabilities found.
-
-
-yxzoro/Flask-SQLAlchemy
-https://github.com/yxzoro/Flask-SQLAlchemy
-Entry file: Flask-SQLAlchemy/app.py
-Scanned: 2016-10-20 12:26:41.041647
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kamillacrozara/flask-base
-https://github.com/kamillacrozara/flask-base
-Entry file: None
-Scanned: 2016-10-20 12:26:45.562754
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kamillacrozara/flask-base.
-
-songxiaowei112/flask-demo
-https://github.com/songxiaowei112/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:26:49.117090
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/songxiaowei112/flask-demo.
-
-HyperJ/Flask-Demo
-https://github.com/HyperJ/Flask-Demo
-Entry file: None
-Scanned: 2016-10-20 12:26:49.639484
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/HyperJ/Flask-Demo.
-
-Sustainabilist/Flask-tutorial
-https://github.com/Sustainabilist/Flask-tutorial
-Entry file: Flask-tutorial/flask_app.py
-Scanned: 2016-10-20 12:26:51.145295
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joshphiggins/flask-blog
-https://github.com/joshphiggins/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:26:54.687107
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-lnanhkhoa/WebFlask
-https://github.com/lnanhkhoa/WebFlask
-Entry file: WebFlask/server.py
-Scanned: 2016-10-20 12:26:56.130771
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sun3shines/ufs_flask
-https://github.com/sun3shines/ufs_flask
-Entry file: ufs_flask/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:26:59.940135
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ItEngine/flask-boilerplate
-https://github.com/ItEngine/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 12:27:00.448104
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ItEngine/flask-boilerplate.
-
-kennly/flask-backend
-https://github.com/kennly/flask-backend
-Entry file: flask-backend/blog.py
-Scanned: 2016-10-20 12:27:01.859043
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cebartling/flask-spikes
-https://github.com/cebartling/flask-spikes
-Entry file: flask-spikes/hello-world/app.py
-Scanned: 2016-10-20 12:27:03.155771
-No vulnerabilities found.
-
-
-igneel64/flask-web
-https://github.com/igneel64/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 12:27:03.729045
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lecamerone/flask_app
-https://github.com/lecamerone/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:27:08.245687
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lecamerone/flask_app.
-
-caelia/flask-gallery
-https://github.com/caelia/flask-gallery
-Entry file: flask-gallery/flask_gallery/gallery.py
-Scanned: 2016-10-20 12:27:10.562736
-No vulnerabilities found.
-
-
-dodoru/flask_bbs
-https://github.com/dodoru/flask_bbs
-Entry file: flask_bbs/src/app.py
-Scanned: 2016-10-20 12:27:12.459300
-Vulnerability 1:
-File: flask_bbs/src/views/channel.py
- > User input at line 28, trigger word "get(":
- channel = Channel.query.get(channel_id)
-File: flask_bbs/src/views/channel.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('channel.html',channel=channel, topics=topics)
-
-Vulnerability 2:
-File: flask_bbs/src/views/channel.py
- > User input at line 41, trigger word "get(":
- topic = Topic.query.get(topic_id)
-File: flask_bbs/src/views/channel.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('topic.html',topic=topic, replies=replies)
-
-Vulnerability 3:
-File: flask_bbs/src/views/channel.py
- > User input at line 50, trigger word "get(":
- channel_id = topic_dict.get('channel_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 52, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id))
-
-Vulnerability 4:
-File: flask_bbs/src/views/channel.py
- > User input at line 50, trigger word "get(":
- channel_id = topic_dict.get('channel_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 52, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id))
-
-Vulnerability 5:
-File: flask_bbs/src/views/channel.py
- > User input at line 58, trigger word "get(":
- topic_id = reply_dict.get('topic_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id))
-
-Vulnerability 6:
-File: flask_bbs/src/views/channel.py
- > User input at line 58, trigger word "get(":
- topic_id = reply_dict.get('topic_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id))
-
-
-
-Omega0/dnd-flask
-https://github.com/Omega0/dnd-flask
-Entry file: dnd-flask/run.py
-Scanned: 2016-10-20 12:27:28.333126
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-Thorntan/flask_study
-https://github.com/Thorntan/flask_study
-Entry file: flask_study/views.py
-Scanned: 2016-10-20 12:27:28.858428
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-baor/flask_test
-https://github.com/baor/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:27:29.447448
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BethMwangi/flask-app
-https://github.com/BethMwangi/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:27:29.976839
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vero4karu/flask-examples
-https://github.com/vero4karu/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-20 12:27:30.529179
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-marikgoran/hello-flask
-https://github.com/marikgoran/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:27:31.133322
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-mkulinski/flask-blog
-https://github.com/mkulinski/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:27:31.680539
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-shubhalasingh/flask-uploader
-https://github.com/shubhalasingh/flask-uploader
-Entry file: flask-uploader/flaskr.py
-Scanned: 2016-10-20 12:27:32.967272
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ohadcn/learnFlask
-https://github.com/ohadcn/learnFlask
-Entry file: None
-Scanned: 2016-10-20 12:27:35.964239
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ohadcn/learnFlask.
-
-laozhizi/flask-test
-https://github.com/laozhizi/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:27:36.494894
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-dogezhou/my_flask
-https://github.com/dogezhou/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 12:27:37.147375
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-thechutrain/flask-microblog
-https://github.com/thechutrain/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:27:38.649896
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sunyton/flask_ecard
-https://github.com/sunyton/flask_ecard
-Entry file: flask_ecard/app2.py
-Scanned: 2016-10-20 12:27:40.149696
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mohapsat/flask-microblog
-https://github.com/mohapsat/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:27:40.676838
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-BethMwangi/flask-blog
-https://github.com/BethMwangi/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:27:41.241042
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-RachelQ1103/flask-pattern
-https://github.com/RachelQ1103/flask-pattern
-Entry file: flask-pattern/problem.py
-Scanned: 2016-10-20 12:27:46.679808
-No vulnerabilities found.
-
-
-pkml/flask-blog
-https://github.com/pkml/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:27:49.254433
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-polomlin/flask_demo
-https://github.com/polomlin/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 12:27:49.811761
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-LennyLeng/flask-base
-https://github.com/LennyLeng/flask-base
-Entry file: None
-Scanned: 2016-10-20 12:27:51.330316
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/LennyLeng/flask-base.
-
-Junctionzc/flask-blog
-https://github.com/Junctionzc/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:27:54.875522
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-RachelQ1103/flask-problem
-https://github.com/RachelQ1103/flask-problem
-Entry file: flask-problem/problem.py
-Scanned: 2016-10-20 12:27:56.207891
-No vulnerabilities found.
-
-
-bryancalupitan/flask_social
-https://github.com/bryancalupitan/flask_social
-Entry file: flask_social/app.py
-Scanned: 2016-10-20 12:27:56.736732
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Han-Jiang/learn-flask
-https://github.com/Han-Jiang/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:28:01.426588
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-iam24/flask-blog
-https://github.com/iam24/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:28:01.977037
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-zhupr/myFlask
-https://github.com/zhupr/myFlask
-Entry file: myFlask/project.py
-Scanned: 2016-10-20 12:28:02.481324
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hanmaslah/flask-tuts
-https://github.com/hanmaslah/flask-tuts
-Entry file: flask-tuts/creating-first-flask-app/flasktest/blog.py
-Scanned: 2016-10-20 12:28:11.839571
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-nodroglegin/flask_udemy
-https://github.com/nodroglegin/flask_udemy
-Entry file: flask_udemy/hello.py
-Scanned: 2016-10-20 12:28:13.138787
-No vulnerabilities found.
-
-
-nicolaigj/flask-site
-https://github.com/nicolaigj/flask-site
-Entry file: None
-Scanned: 2016-10-20 12:28:13.639464
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-loongfeng/firstapp
-https://github.com/loongfeng/firstapp
-Entry file: None
-Scanned: 2016-10-20 12:28:14.909384
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/loongfeng/firstapp.
-
-silvia2013/firstapp
-https://github.com/silvia2013/firstapp
-Entry file: None
-Scanned: 2016-10-20 12:28:20.445905
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/silvia2013/firstapp.
-
-lbatalha/imagething
-https://github.com/lbatalha/imagething
-Entry file: imagething/main.py
-Scanned: 2016-10-20 12:28:35.051679
-Vulnerability 1:
-File: imagething/main.py
- > User input at line 28, trigger word "files[":
- file = request.files['fileupload']
-Reassigned in:
- File: imagething/main.py
- > Line 29: file = request.files['fileupload']
- File: imagething/main.py
- > Line 34: filename = secure_filename(file.filename)
- File: imagething/main.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html')
- File: imagething/main.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method'
- File: imagething/main.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed
-'
- File: imagething/main.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: imagething/main.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: imagething/main.py
- > User input at line 29, trigger word "files[":
- file = request.files['fileupload']
-Reassigned in:
- File: imagething/main.py
- > Line 28: file = request.files['fileupload']
- File: imagething/main.py
- > Line 34: filename = secure_filename(file.filename)
- File: imagething/main.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html')
- File: imagething/main.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method'
- File: imagething/main.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed
-'
- File: imagething/main.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: imagething/main.py
- > reaches line 36, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 3:
-File: imagething/main.py
- > User input at line 28, trigger word "files[":
- file = request.files['fileupload']
-Reassigned in:
- File: imagething/main.py
- > Line 29: file = request.files['fileupload']
- File: imagething/main.py
- > Line 34: filename = secure_filename(file.filename)
- File: imagething/main.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html')
- File: imagething/main.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method'
- File: imagething/main.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed
-'
- File: imagething/main.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: imagething/main.py
- > reaches line 36, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 4:
-File: imagething/main.py
- > User input at line 29, trigger word "files[":
- file = request.files['fileupload']
-Reassigned in:
- File: imagething/main.py
- > Line 28: file = request.files['fileupload']
- File: imagething/main.py
- > Line 34: filename = secure_filename(file.filename)
- File: imagething/main.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html')
- File: imagething/main.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method'
- File: imagething/main.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed
-'
- File: imagething/main.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: imagething/main.py
- > reaches line 36, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-n0x5/shitty_flask_website
-https://github.com/n0x5/shitty_flask_website
-Entry file: shitty_flask_website/app.py
-Scanned: 2016-10-20 12:28:36.510345
-No vulnerabilities found.
-
-
-kimjonathan1123/friendsgroup
-https://github.com/kimjonathan1123/friendsgroup
-Entry file: friendsgroup/server.py
-Scanned: 2016-10-20 12:28:37.952594
-No vulnerabilities found.
-
-
-joshphiggins/FlaskTaskr_py3
-https://github.com/joshphiggins/FlaskTaskr_py3
-Entry file: FlaskTaskr_py3/views.py
-Scanned: 2016-10-20 12:28:39.401133
-No vulnerabilities found.
-
-
-claudemuller/firstapp
-https://github.com/claudemuller/firstapp
-Entry file: None
-Scanned: 2016-10-20 12:28:39.927236
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/claudemuller/firstapp.
-
-ArtemKran/site_on_flask
-https://github.com/ArtemKran/site_on_flask
-Entry file: site_on_flask/app/__init__.py
-Scanned: 2016-10-20 12:28:41.663628
-Vulnerability 1:
-File: site_on_flask/app/main/views.py
- > User input at line 51, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 67: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: site_on_flask/app/main/views.py
- > Line 70: posts = pagination.items
- File: site_on_flask/app/main/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: site_on_flask/app/main/views.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: site_on_flask/app/main/views.py
- > User input at line 59, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 57: show_followed = False
- File: site_on_flask/app/main/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: site_on_flask/app/main/views.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: site_on_flask/app/main/views.py
- > User input at line 79, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 83: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: site_on_flask/app/main/views.py
- > Line 86: posts = pagination.items
-File: site_on_flask/app/main/views.py
- > reaches line 87, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: site_on_flask/app/main/views.py
- > User input at line 151, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 155: page = post.comments.count() - 1 // 21
- File: site_on_flask/app/main/views.py
- > Line 159: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=20, error_out=False)
- File: site_on_flask/app/main/views.py
- > Line 162: comments = pagination.items
- File: site_on_flask/app/main/views.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: site_on_flask/app/main/views.py
- > reaches line 163, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: site_on_flask/app/main/views.py
- > User input at line 232, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 236: pagination = user.followers.paginate(page,per_page=20, error_out=False)
- File: site_on_flask/app/main/views.py
- > Line 239: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: site_on_flask/app/main/views.py
- > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: site_on_flask/app/main/views.py
- > reaches line 242, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: site_on_flask/app/main/views.py
- > User input at line 258, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 262: pagination = user.followed.paginate(page,per_page=20, error_out=False)
- File: site_on_flask/app/main/views.py
- > Line 265: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: site_on_flask/app/main/views.py
- > Line 257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: site_on_flask/app/main/views.py
- > reaches line 268, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: site_on_flask/app/main/views.py
- > User input at line 297, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/main/views.py
- > Line 298: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/main/views.py
- > Line 301: comments = pagination.items
-File: site_on_flask/app/main/views.py
- > reaches line 302, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: site_on_flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: site_on_flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: site_on_flask/app/api_1_0/users.py
- > Line 23: next = None
-File: site_on_flask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: site_on_flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: site_on_flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: site_on_flask/app/api_1_0/users.py
- > Line 23: next = None
-File: site_on_flask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: site_on_flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: site_on_flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: site_on_flask/app/api_1_0/users.py
- > Line 23: next = None
-File: site_on_flask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: site_on_flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: site_on_flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: site_on_flask/app/api_1_0/users.py
- > Line 45: next = None
-File: site_on_flask/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: site_on_flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: site_on_flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: site_on_flask/app/api_1_0/users.py
- > Line 45: next = None
-File: site_on_flask/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: site_on_flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: site_on_flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: site_on_flask/app/api_1_0/users.py
- > Line 45: next = None
-File: site_on_flask/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: site_on_flask/app/api_1_0/posts.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/posts.py
- > Line 18: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/posts.py
- > Line 21: posts = pagination.items
- File: site_on_flask/app/api_1_0/posts.py
- > Line 22: prev = None
- File: site_on_flask/app/api_1_0/posts.py
- > Line 25: next = None
-File: site_on_flask/app/api_1_0/posts.py
- > reaches line 24, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: site_on_flask/app/api_1_0/posts.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/posts.py
- > Line 18: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/posts.py
- > Line 21: posts = pagination.items
- File: site_on_flask/app/api_1_0/posts.py
- > Line 22: prev = None
- File: site_on_flask/app/api_1_0/posts.py
- > Line 25: next = None
-File: site_on_flask/app/api_1_0/posts.py
- > reaches line 27, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: site_on_flask/app/api_1_0/posts.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/posts.py
- > Line 18: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/posts.py
- > Line 21: posts = pagination.items
- File: site_on_flask/app/api_1_0/posts.py
- > Line 22: prev = None
- File: site_on_flask/app/api_1_0/posts.py
- > Line 25: next = None
-File: site_on_flask/app/api_1_0/posts.py
- > reaches line 28, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: site_on_flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: site_on_flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: site_on_flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: site_on_flask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: site_on_flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: site_on_flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: site_on_flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: site_on_flask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: site_on_flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: site_on_flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: site_on_flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: site_on_flask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: site_on_flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: site_on_flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: site_on_flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: site_on_flask/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: site_on_flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: site_on_flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: site_on_flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: site_on_flask/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: site_on_flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: site_on_flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: site_on_flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: site_on_flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: site_on_flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: site_on_flask/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-passhole/flask-hello-world
-https://github.com/passhole/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:28:42.228284
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-gabeibarra/docker-flask-bigger
-https://github.com/gabeibarra/docker-flask-bigger
-Entry file: docker-flask-bigger/app/__init__.py
-Scanned: 2016-10-20 12:28:43.655933
-No vulnerabilities found.
-
-
-dmitry-moroz/flask
-https://github.com/dmitry-moroz/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:28:45.676860
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Aslkayn/flask
-https://github.com/Aslkayn/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:28:46.248145
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-gisumwa/Flask
-https://github.com/gisumwa/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:28:46.749838
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-timmyreilly/intro-to-flask
-https://github.com/timmyreilly/intro-to-flask
-Entry file: intro-to-flask/hello.py
-Scanned: 2016-10-20 12:28:50.534679
-No vulnerabilities found.
-
-
-postrational/rest_api_demo
-https://github.com/postrational/rest_api_demo
-Entry file: rest_api_demo/rest_api_demo/app.py
-Scanned: 2016-10-20 12:28:51.991700
-Vulnerability 1:
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > User input at line 8, trigger word "get(":
- category_id = data.get('category_id')
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > reaches line 9, trigger word "filter(":
- category = Category.query.filter(Category.id == category_id).one()
-
-Vulnerability 2:
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > User input at line 19, trigger word "get(":
- category_id = data.get('category_id')
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > reaches line 20, trigger word "filter(":
- post.category = Category.query.filter(Category.id == category_id).one()
-
-
-
-DanceCats/DanceCat
-https://github.com/DanceCats/DanceCat
-Entry file: DanceCat/DanceCat/__init__.py
-Scanned: 2016-10-20 12:28:59.901838
-Vulnerability 1:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 45, trigger word "get(":
- connection_id = received_data.get('connectionId', 0)
-Reassigned in:
- File: DanceCat/DanceCat/Socket.py
- > Line 55: running_connection = Connection.query.get(connection_id)
- File: DanceCat/DanceCat/Socket.py
- > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60))
- File: DanceCat/DanceCat/Socket.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime)
- File: DanceCat/DanceCat/Socket.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)])
- File: DanceCat/DanceCat/Socket.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!')
- File: DanceCat/DanceCat/Socket.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!')
- File: DanceCat/DanceCat/Socket.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 2:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 46, trigger word "get(":
- query = received_data.get('query', '')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 3:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 55, trigger word "get(":
- running_connection = Connection.query.get(connection_id)
-Reassigned in:
- File: DanceCat/DanceCat/Socket.py
- > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60))
- File: DanceCat/DanceCat/Socket.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime)
- File: DanceCat/DanceCat/Socket.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)])
- File: DanceCat/DanceCat/Socket.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!')
- File: DanceCat/DanceCat/Socket.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!')
- File: DanceCat/DanceCat/Socket.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 4:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 58, trigger word "get(":
- connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60))
-Reassigned in:
- File: DanceCat/DanceCat/Socket.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime)
- File: DanceCat/DanceCat/Socket.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)])
- File: DanceCat/DanceCat/Socket.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!')
- File: DanceCat/DanceCat/Socket.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!')
- File: DanceCat/DanceCat/Socket.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 5:
-File: DanceCat/DanceCat/JobWorker.py
- > User input at line 91, trigger word "get(":
- job = QueryDataJob.query.get(job_id)
-Reassigned in:
- File: DanceCat/DanceCat/JobWorker.py
- > Line 99: db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0))
- File: DanceCat/DanceCat/JobWorker.py
- > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all()
- File: DanceCat/DanceCat/JobWorker.py
- > Line 135: ret_MAYBE_FUNCTION_NAME = results
- File: DanceCat/DanceCat/JobWorker.py
- > Line 153: ret_MAYBE_FUNCTION_NAME = None
-File: DanceCat/DanceCat/JobWorker.py
- > reaches line 110, trigger word "execute(":
- db_connector.execute(job.query_string)
-
-Vulnerability 6:
-File: DanceCat/DanceCat/JobWorker.py
- > User input at line 99, trigger word "get(":
- db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0))
-Reassigned in:
- File: DanceCat/DanceCat/JobWorker.py
- > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all()
- File: DanceCat/DanceCat/JobWorker.py
- > Line 135: ret_MAYBE_FUNCTION_NAME = results
- File: DanceCat/DanceCat/JobWorker.py
- > Line 153: ret_MAYBE_FUNCTION_NAME = None
-File: DanceCat/DanceCat/JobWorker.py
- > reaches line 110, trigger word "execute(":
- db_connector.execute(job.query_string)
-
-Vulnerability 7:
-File: DanceCat/DanceCat/Views.py
- > User input at line 252, trigger word "form[":
- triggered_job = QueryDataJob.query.get_or_404(request.form['id'])
-Reassigned in:
- File: DanceCat/DanceCat/Views.py
- > Line 256: tracker = TrackJobRun(triggered_job.job_id)
-File: DanceCat/DanceCat/Views.py
- > reaches line 269, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('ack''tracker_id'Truetracker.track_job_run_id)
-
-
-
-menghao2015/flask_blog
-https://github.com/menghao2015/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:29:00.402311
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AmarKalabic/Football-Stream-Finder--Flask-
-https://github.com/AmarKalabic/Football-Stream-Finder--Flask-
-Entry file: Football-Stream-Finder--Flask-/main.py
-Scanned: 2016-10-20 12:29:01.837762
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-terryllowery/flasktaskr
-https://github.com/terryllowery/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:29:02.357362
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-moerekh/flaskyflaskssy
-https://github.com/moerekh/flaskyflaskssy
-Entry file: flaskyflaskssy/flasky.py
-Scanned: 2016-10-20 12:29:08.865864
-No vulnerabilities found.
-
-
-vinay13/Flaskngular
-https://github.com/vinay13/Flaskngular
-Entry file: Flaskngular/flask_app.py
-Scanned: 2016-10-20 12:29:10.314597
-No vulnerabilities found.
-
-
-dribnet/flaskapp
-https://github.com/dribnet/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:29:10.833180
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dribnet/flaskapp.
-
-rhildreth/flaskbook
-https://github.com/rhildreth/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 12:29:11.382484
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-TacticalGoat/flasktest
-https://github.com/TacticalGoat/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 12:29:11.900677
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-enricobacis/flaskey
-https://github.com/enricobacis/flaskey
-Entry file: flaskey/app/__init__.py
-Scanned: 2016-10-20 12:29:12.406279
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nehamarne/flaskdemo
-https://github.com/nehamarne/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 12:29:12.913375
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-playgrdstar/flaskapp
-https://github.com/playgrdstar/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:29:14.435978
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp.
-
-pkml/flasktaskr
-https://github.com/pkml/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:29:14.963994
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-davidwangv5/flasky
-https://github.com/davidwangv5/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:29:20.490596
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-QMickael/flaskBlog
-https://github.com/QMickael/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 12:29:29.161763
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-CircaVictor/flaskTemplate
-https://github.com/CircaVictor/flaskTemplate
-Entry file: flaskTemplate/flask-app/app/__init__.py
-Scanned: 2016-10-20 12:29:36.624792
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jutreras/flaskTest
-https://github.com/jutreras/flaskTest
-Entry file: flaskTest/url.py
-Scanned: 2016-10-20 12:29:37.187396
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-minwoo-jewon/FlaskStudy
-https://github.com/minwoo-jewon/FlaskStudy
-Entry file: FlaskStudy/flaskr.py
-Scanned: 2016-10-20 12:29:40.197627
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TheCulliganMan/reforestation-flask
-https://github.com/TheCulliganMan/reforestation-flask
-Entry file: reforestation-flask/lib/flask/sessions.py
-Scanned: 2016-10-20 12:29:45.875747
-No vulnerabilities found.
-
-
-vish-s/flask-sampleapp
-https://github.com/vish-s/flask-sampleapp
-Entry file: flask-sampleapp/main.py
-Scanned: 2016-10-20 12:29:48.459612
-No vulnerabilities found.
-
-
-opsolutely/flask-starter
-https://github.com/opsolutely/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 12:29:49.467524
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mschenk42/flask-resteasy
-https://github.com/mschenk42/flask-resteasy
-Entry file: flask-resteasy/flask_resteasy.py
-Scanned: 2016-10-20 12:29:50.029707
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-frederickOtus/copypaste_flask
-https://github.com/frederickOtus/copypaste_flask
-Entry file: copypaste_flask/server.py
-Scanned: 2016-10-20 12:29:52.061668
-No vulnerabilities found.
-
-
-ankurdh/Hello-Flask
-https://github.com/ankurdh/Hello-Flask
-Entry file: Hello-Flask/wamt/wamt.py
-Scanned: 2016-10-20 12:29:52.564274
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-amitkumarj441/Todo-Flask
-https://github.com/amitkumarj441/Todo-Flask
-Entry file: None
-Scanned: 2016-10-20 12:29:57.916396
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amitkumarj441/Todo-Flask.
-
-juanferreira/social-flask
-https://github.com/juanferreira/social-flask
-Entry file: social-flask/app.py
-Scanned: 2016-10-20 12:29:59.365686
-Vulnerability 1:
-File: social-flask/app.py
- > User input at line 113, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: social-flask/app.py
- > Line 120: user = current_user
-File: social-flask/app.py
- > reaches line 125, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: social-flask/app.py
- > User input at line 142, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-flask/app.py
- > reaches line 154, trigger word "flash(":
- flash('You're now following {}!'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: social-flask/app.py
- > User input at line 142, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-flask/app.py
- > reaches line 156, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: social-flask/app.py
- > User input at line 142, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-flask/app.py
- > reaches line 156, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: social-flask/app.py
- > User input at line 163, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-flask/app.py
- > reaches line 175, trigger word "flash(":
- flash('You've unfollowed {}!'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: social-flask/app.py
- > User input at line 163, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-flask/app.py
- > reaches line 177, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: social-flask/app.py
- > User input at line 163, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-flask/app.py
- > reaches line 177, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-kallolymess/discoverFlask
-https://github.com/kallolymess/discoverFlask
-Entry file: discoverFlask/project/__init__.py
-Scanned: 2016-10-20 12:30:00.981942
-No vulnerabilities found.
-
-
-yoophi/flask-dummyimage
-https://github.com/yoophi/flask-dummyimage
-Entry file: flask-dummyimage/flask_dummyimage/__init__.py
-Scanned: 2016-10-20 12:30:02.957763
-No vulnerabilities found.
-
-
-cebartling/flask-spikes
-https://github.com/cebartling/flask-spikes
-Entry file: flask-spikes/hello-world/app.py
-Scanned: 2016-10-20 12:30:04.272785
-No vulnerabilities found.
-
-
-JamesSkane/flask_ml
-https://github.com/JamesSkane/flask_ml
-Entry file: flask_ml/api/__init__.py
-Scanned: 2016-10-20 12:30:07.122098
-No vulnerabilities found.
-
-
-krpeacock/flask_intro
-https://github.com/krpeacock/flask_intro
-Entry file: flask_intro/first_app.py
-Scanned: 2016-10-20 12:30:07.659378
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py
-
-sergiolucero/flask_psumplot
-https://github.com/sergiolucero/flask_psumplot
-Entry file: flask_psumplot/flask_app.py
-Scanned: 2016-10-20 12:30:10.963125
-No vulnerabilities found.
-
-
-rasmi/flask-toasty
-https://github.com/rasmi/flask-toasty
-Entry file: flask-toasty/app.py
-Scanned: 2016-10-20 12:30:12.264575
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-leonlcw92/flask_test
-https://github.com/leonlcw92/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:30:12.847003
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dodoru/flask_bbs
-https://github.com/dodoru/flask_bbs
-Entry file: flask_bbs/src/app.py
-Scanned: 2016-10-20 12:30:14.734240
-Vulnerability 1:
-File: flask_bbs/src/views/channel.py
- > User input at line 28, trigger word "get(":
- channel = Channel.query.get(channel_id)
-File: flask_bbs/src/views/channel.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('channel.html',channel=channel, topics=topics)
-
-Vulnerability 2:
-File: flask_bbs/src/views/channel.py
- > User input at line 41, trigger word "get(":
- topic = Topic.query.get(topic_id)
-File: flask_bbs/src/views/channel.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('topic.html',topic=topic, replies=replies)
-
-Vulnerability 3:
-File: flask_bbs/src/views/channel.py
- > User input at line 50, trigger word "get(":
- channel_id = topic_dict.get('channel_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 52, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id))
-
-Vulnerability 4:
-File: flask_bbs/src/views/channel.py
- > User input at line 50, trigger word "get(":
- channel_id = topic_dict.get('channel_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 52, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id))
-
-Vulnerability 5:
-File: flask_bbs/src/views/channel.py
- > User input at line 58, trigger word "get(":
- topic_id = reply_dict.get('topic_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id))
-
-Vulnerability 6:
-File: flask_bbs/src/views/channel.py
- > User input at line 58, trigger word "get(":
- topic_id = reply_dict.get('topic_id')
-File: flask_bbs/src/views/channel.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id))
-
-
-
-ibrahimGhailani/TodoFlask
-https://github.com/ibrahimGhailani/TodoFlask
-Entry file: TodoFlask/app/__init__.py
-Scanned: 2016-10-20 12:30:16.013206
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fanne/flask_ansible
-https://github.com/fanne/flask_ansible
-Entry file: flask_ansible/flask_ansible.py
-Scanned: 2016-10-20 12:30:17.294616
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SohyunKate/Flask-Practice
-https://github.com/SohyunKate/Flask-Practice
-Entry file: Flask-Practice/hello.py
-Scanned: 2016-10-20 12:30:18.598531
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bruno78/flask-microblog
-https://github.com/bruno78/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:30:19.109169
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pliyosenpai/flask-api
-https://github.com/pliyosenpai/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 12:30:20.623654
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BethMwangi/flask-app
-https://github.com/BethMwangi/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:30:29.174815
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MalhotraVijay/flask-boilerplate
-https://github.com/MalhotraVijay/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 12:30:35.686988
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MalhotraVijay/flask-boilerplate.
-
-Mehdi-SIO/new_flask
-https://github.com/Mehdi-SIO/new_flask
-Entry file: new_flask/hello.py
-Scanned: 2016-10-20 12:30:38.041693
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-SIJP-ORG/flask-demo
-https://github.com/SIJP-ORG/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:30:39.567960
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SIJP-ORG/flask-demo.
-
-danchay/flask-blog
-https://github.com/danchay/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:30:41.127290
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-wiki-ai/flask-wikimediaui
-https://github.com/wiki-ai/flask-wikimediaui
-Entry file: flask-wikimediaui/wsgi.py
-Scanned: 2016-10-20 12:30:42.472038
-No vulnerabilities found.
-
-
-luotigerlsx/flask_example
-https://github.com/luotigerlsx/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:30:47.054561
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-luqee/flask-demo
-https://github.com/luqee/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:30:47.563108
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/luqee/flask-demo.
-
-PumOzenix/flask-sample
-https://github.com/PumOzenix/flask-sample
-Entry file: flask-sample/guild/app.py
-Scanned: 2016-10-20 12:30:49.074412
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AnandVetcha/Flask_App
-https://github.com/AnandVetcha/Flask_App
-Entry file: Flask_App/Flask_App/app.py
-Scanned: 2016-10-20 12:30:49.592268
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fulfilio/flask-fulfil
-https://github.com/fulfilio/flask-fulfil
-Entry file: flask-fulfil/flask_fulfil.py
-Scanned: 2016-10-20 12:30:51.021328
-No vulnerabilities found.
-
-
-zhupr/myFlask
-https://github.com/zhupr/myFlask
-Entry file: myFlask/project.py
-Scanned: 2016-10-20 12:30:51.570212
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dsk0506/flask_demo
-https://github.com/dsk0506/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 12:30:52.085688
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-curtis99877/flask-app
-https://github.com/curtis99877/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 12:30:52.592137
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bradkarels/restful-flask
-https://github.com/bradkarels/restful-flask
-Entry file: restful-flask/hello.py
-Scanned: 2016-10-20 12:30:53.893777
-No vulnerabilities found.
-
-
-silvia2013/firstapp
-https://github.com/silvia2013/firstapp
-Entry file: None
-Scanned: 2016-10-20 12:30:59.409144
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/silvia2013/firstapp.
-
-n0x5/shitty_flask_website
-https://github.com/n0x5/shitty_flask_website
-Entry file: shitty_flask_website/app.py
-Scanned: 2016-10-20 12:31:00.791968
-No vulnerabilities found.
-
-
-decentfox/relask
-https://github.com/decentfox/relask
-Entry file: relask/example/sqlalchemy/relasksa/__init__.py
-Scanned: 2016-10-20 12:31:04.836203
-Vulnerability 1:
-File: relask/example/sqlalchemy/relasksa/schema.py
- > User input at line 64, trigger word "get(":
- user = models.db.session.query(models.User).filter(models.User.login == args.get('login')).first()
-File: relask/example/sqlalchemy/relasksa/schema.py
- > reaches line 64, trigger word "filter(":
- user = models.db.session.query(models.User).filter(models.User.login == args.get('login')).first()
-
-
-
-rmed/akamatsu
-https://github.com/rmed/akamatsu
-Entry file: None
-Scanned: 2016-10-20 12:31:11.781963
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rmed/akamatsu.
-
-herrjemand/flask-fido-u2f
-https://github.com/herrjemand/flask-fido-u2f
-Entry file: flask-fido-u2f/examples/server.py
-Scanned: 2016-10-20 12:31:13.535039
-No vulnerabilities found.
-
-
-janhak/flask-flasky-learning
-https://github.com/janhak/flask-flasky-learning
-Entry file: flask-flasky-learning/app/__init__.py
-Scanned: 2016-10-20 12:31:15.621778
-No vulnerabilities found.
-
-
-mr1holmes/planup-backend
-https://github.com/mr1holmes/planup-backend
-Entry file: planup-backend/flaskapp/__init__.py
-Scanned: 2016-10-20 12:31:16.151598
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BoeingX/flask-restful-api
-https://github.com/BoeingX/flask-restful-api
-Entry file: flask-restful-api/restful/api.py
-Scanned: 2016-10-20 12:31:16.658712
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-spenserhale/social-network-flask
-https://github.com/spenserhale/social-network-flask
-Entry file: social-network-flask/app.py
-Scanned: 2016-10-20 12:31:18.203416
-Vulnerability 1:
-File: social-network-flask/app.py
- > User input at line 109, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: social-network-flask/app.py
- > Line 117: user = current_user
-File: social-network-flask/app.py
- > reaches line 120, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: social-network-flask/app.py
- > User input at line 135, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-network-flask/app.py
- > reaches line 147, trigger word "flash(":
- flash('You're now following {}!'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: social-network-flask/app.py
- > User input at line 135, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-network-flask/app.py
- > reaches line 148, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: social-network-flask/app.py
- > User input at line 135, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-network-flask/app.py
- > reaches line 148, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: social-network-flask/app.py
- > User input at line 155, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-network-flask/app.py
- > reaches line 167, trigger word "flash(":
- flash('You've unfollowed {}!'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: social-network-flask/app.py
- > User input at line 155, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-network-flask/app.py
- > reaches line 168, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: social-network-flask/app.py
- > User input at line 155, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: social-network-flask/app.py
- > reaches line 168, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-timlichen/pyFlaskLoginRegistration
-https://github.com/timlichen/pyFlaskLoginRegistration
-Entry file: pyFlaskLoginRegistration/server.py
-Scanned: 2016-10-20 12:31:19.994747
-No vulnerabilities found.
-
-
-linzhaolover/myFlaskWeb
-https://github.com/linzhaolover/myFlaskWeb
-Entry file: myFlaskWeb/myflask.py
-Scanned: 2016-10-20 12:31:21.424933
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prakharchoudhary/First_App_in_Flask
-https://github.com/prakharchoudhary/First_App_in_Flask
-Entry file: First_App_in_Flask/flask_project.py
-Scanned: 2016-10-20 12:31:22.779246
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vmuguerzac/flask_by_example
-https://github.com/vmuguerzac/flask_by_example
-Entry file: flask_by_example/app.py
-Scanned: 2016-10-20 12:31:29.502824
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py
-
-solcis/flask-weather-app
-https://github.com/solcis/flask-weather-app
-Entry file: flask-weather-app/flask_weather_app.py
-Scanned: 2016-10-20 12:31:42.740830
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arajago6/flask-json-api
-https://github.com/arajago6/flask-json-api
-Entry file: flask-json-api/app.py
-Scanned: 2016-10-20 12:31:44.072076
-Vulnerability 1:
-File: flask-json-api/app.py
- > User input at line 36, trigger word "get(":
- entity = 'id''title''description''installed'entities[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flask-json-api/app.py
- > reaches line 43, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('entity'entity), 201)
-
-
-
-Edubya77/hellow_world_flask
-https://github.com/Edubya77/hellow_world_flask
-Entry file: hellow_world_flask/hello_world.py
-Scanned: 2016-10-20 12:31:45.339922
-No vulnerabilities found.
-
-
-kmalfatti/library-flask-app
-https://github.com/kmalfatti/library-flask-app
-Entry file: library-flask-app/app.py
-Scanned: 2016-10-20 12:31:46.774757
-Vulnerability 1:
-File: library-flask-app/app.py
- > User input at line 63, trigger word "get(":
- found_author = Author.query.get(id)
-File: library-flask-app/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('books/index.html',author=found_author)
-
-Vulnerability 2:
-File: library-flask-app/app.py
- > User input at line 68, trigger word "get(":
- found_author = Author.query.get(id)
-File: library-flask-app/app.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('books/new.html',author=found_author)
-
-
-
-luhuisicnu/Flask_codeRepository
-https://github.com/luhuisicnu/Flask_codeRepository
-Entry file: Flask_codeRepository/code_repository/__init__.py
-Scanned: 2016-10-20 12:31:48.323817
-No vulnerabilities found.
-
-
-Myshj/SimpleBlogWithFlask
-https://github.com/Myshj/SimpleBlogWithFlask
-Entry file: SimpleBlogWithFlask/app/__init__.py
-Scanned: 2016-10-20 12:31:49.773266
-No vulnerabilities found.
-
-
-jcue/flask-hello-world
-https://github.com/jcue/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:31:50.332855
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-spenserhale/treebook-python-flask
-https://github.com/spenserhale/treebook-python-flask
-Entry file: treebook-python-flask/Flask.py
-Scanned: 2016-10-20 12:31:51.601826
-No vulnerabilities found.
-
-
-Sachinmurari/python_flask_proj
-https://github.com/Sachinmurari/python_flask_proj
-Entry file: python_flask_proj/app.py
-Scanned: 2016-10-20 12:31:52.921478
-No vulnerabilities found.
-
-
-ophidianwang/flask_mongokat_exp
-https://github.com/ophidianwang/flask_mongokat_exp
-Entry file: flask_mongokat_exp/simple_run.py
-Scanned: 2016-10-20 12:31:54.309576
-No vulnerabilities found.
-
-
-rajdeepd/heroku-force-oauth-flask
-https://github.com/rajdeepd/heroku-force-oauth-flask
-Entry file: heroku-force-oauth-flask/app.py
-Scanned: 2016-10-20 12:31:55.551349
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-VikramDesai/Rest-Server-Flask
-https://github.com/VikramDesai/Rest-Server-Flask
-Entry file: None
-Scanned: 2016-10-20 12:31:56.920370
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/VikramDesai/Rest-Server-Flask.
-
-roybayot/my-learning-flask
-https://github.com/roybayot/my-learning-flask
-Entry file: my-learning-flask/routes.py
-Scanned: 2016-10-20 12:32:04.717844
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my-learning-flask/venv/lib/python2.7/genericpath.py
-
-joselevelsup/FastInventoryFlask
-https://github.com/joselevelsup/FastInventoryFlask
-Entry file: FastInventoryFlask/venv/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-20 12:32:14.692411
-No vulnerabilities found.
-
-
-ezirmusitua/my-blog-with-flask
-https://github.com/ezirmusitua/my-blog-with-flask
-Entry file: my-blog-with-flask/my_blog/__init__.py
-Scanned: 2016-10-20 12:32:17.834621
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-Millyn/flask_py3_hr
-https://github.com/Millyn/flask_py3_hr
-Entry file: flask_py3_hr/app/__init__.py
-Scanned: 2016-10-20 12:32:19.841177
-Vulnerability 1:
-File: flask_py3_hr/app/user/views.py
- > User input at line 47, trigger word ".data":
- info = Info(realname=form.realname.data, id_care=form.id_care.data, birth=form.birth.data, tel=form.tel.data, work_status=1, group_id=str(form.group.data.id))
-File: flask_py3_hr/app/user/views.py
- > reaches line 52, trigger word "filter(":
- db.session.query(User).filter(User.id == current_user.id).update(User.info_idinfo.id)
-
-
-
-afurth89/python_flask_crudapp_booklist
-https://github.com/afurth89/python_flask_crudapp_booklist
-Entry file: python_flask_crudapp_booklist/app.py
-Scanned: 2016-10-20 12:32:21.233369
-No vulnerabilities found.
-
-
-Riffstation/flaskutilsexample
-https://github.com/Riffstation/flaskutilsexample
-Entry file: flaskutilsexample/src/app/__init__.py
-Scanned: 2016-10-20 12:32:24.105995
-No vulnerabilities found.
-
-
-dolv/Flask
-https://github.com/dolv/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:32:25.124429
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Mamun-dueee/flask
-https://github.com/Mamun-dueee/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:32:25.705955
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-nppat/Flask
-https://github.com/nppat/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:32:26.292969
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KyleSeem/Flask
-https://github.com/KyleSeem/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:32:26.852349
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Kirade/Flask
-https://github.com/Kirade/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:32:27.364770
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cloverstd/flask-wechatpy
-https://github.com/cloverstd/flask-wechatpy
-Entry file: flask-wechatpy/demo.py
-Scanned: 2016-10-20 12:32:28.803918
-No vulnerabilities found.
-
-
-QuentinMoss/reimagined-computing-machine
-https://github.com/QuentinMoss/reimagined-computing-machine
-Entry file: reimagined-computing-machine/app/__init__.py
-Scanned: 2016-10-20 12:32:31.059426
-No vulnerabilities found.
-
-
-13923858795/Tutorial
-https://github.com/13923858795/Tutorial
-Entry file: Tutorial/my/app/__init__.py
-Scanned: 2016-10-20 12:32:37.967455
-Vulnerability 1:
-File: Tutorial/my/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 33: posts = pagination.items
- File: Tutorial/my/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Tutorial/my/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 23: show_followed = False
- File: Tutorial/my/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Tutorial/my/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 44: posts = pagination.items
-File: Tutorial/my/app/main/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Tutorial/my/app/main/views.py
- > User input at line 109, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 111: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Tutorial/my/app/main/views.py
- > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 116: comments = pagination.items
- File: Tutorial/my/app/main/views.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Tutorial/my/app/main/views.py
- > reaches line 117, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Tutorial/my/app/main/views.py
- > User input at line 176, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 177: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 180: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Tutorial/my/app/main/views.py
- > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 182, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Tutorial/my/app/main/views.py
- > User input at line 193, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 194: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 197: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Tutorial/my/app/main/views.py
- > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 199, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Tutorial/my/app/main/views.py
- > User input at line 231, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 235: comments = pagination.items
-File: Tutorial/my/app/main/views.py
- > reaches line 236, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-szparag3/flask-hello-world
-https://github.com/szparag3/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:32:38.523052
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-penglee87/flaskweb
-https://github.com/penglee87/flaskweb
-Entry file: None
-Scanned: 2016-10-20 12:32:44.042917
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yuyanqiuqiu/flaskr
-https://github.com/yuyanqiuqiu/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:32:45.554220
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-WayneChen1987/flasky
-https://github.com/WayneChen1987/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:32:46.051208
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-IronFist16/flasky
-https://github.com/IronFist16/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:32:47.556969
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bsdtux/flaskblog
-https://github.com/bsdtux/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:32:49.070153
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-terryllowery/flasktaskr
-https://github.com/terryllowery/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:32:50.597287
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-LongstreetSolutions/flaskr
-https://github.com/LongstreetSolutions/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:32:51.128576
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-playgrdstar/flaskapp
-https://github.com/playgrdstar/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:32:52.657227
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp.
-
-NathanJ4620/flasker
-https://github.com/NathanJ4620/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 12:32:54.172647
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulmkumar/flaskapp
-https://github.com/rahulmkumar/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:32:55.687833
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp.
-
-chenglinguang/flaskky
-https://github.com/chenglinguang/flaskky
-Entry file: flaskky/hello1.py
-Scanned: 2016-10-20 12:32:57.309981
-No vulnerabilities found.
-
-
-feocco/flaskLab
-https://github.com/feocco/flaskLab
-Entry file: flaskLab/app.py
-Scanned: 2016-10-20 12:33:06.265305
-Vulnerability 1:
-File: flaskLab/auth.py
- > User input at line 26, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: flaskLab/auth.py
- > Line 32: user = User(username=username)
-File: flaskLab/auth.py
- > reaches line 36, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 2:
-File: flaskLab/auth.py
- > User input at line 26, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: flaskLab/auth.py
- > Line 32: user = User(username=username)
-File: flaskLab/auth.py
- > reaches line 36, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: flaskLab/auth.py
- > User input at line 42, trigger word "get(":
- user = session.query(User).get(id)
-File: flaskLab/auth.py
- > reaches line 45, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username)
-
-
-
-sarahbees/FlaskHeroku
-https://github.com/sarahbees/FlaskHeroku
-Entry file: FlaskHeroku/hello.py
-Scanned: 2016-10-20 12:33:07.547754
-No vulnerabilities found.
-
-
-jutreras/flaskTest
-https://github.com/jutreras/flaskTest
-Entry file: flaskTest/url.py
-Scanned: 2016-10-20 12:33:16.112232
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-954324919/FlaskDemo
-https://github.com/954324919/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 12:33:18.659353
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cdagli/flask-restful-example
-https://github.com/cdagli/flask-restful-example
-Entry file: flask-restful-example/api.py
-Scanned: 2016-10-20 12:33:21.158580
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pavelzamyatin/flask-mega-tutorial
-https://github.com/pavelzamyatin/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-20 12:33:22.697942
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alexeib2014/Flask-Android
-https://github.com/alexeib2014/Flask-Android
-Entry file: Flask-Android/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:33:23.337689
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jamesward/hello-flask
-https://github.com/jamesward/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:33:24.903841
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-skinnyal/flask_tutorial
-https://github.com/skinnyal/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 12:33:25.415139
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Steve-Duncan/Learning-Flask
-https://github.com/Steve-Duncan/Learning-Flask
-Entry file: Learning-Flask/friends/server.py
-Scanned: 2016-10-20 12:33:28.931613
-No vulnerabilities found.
-
-
-damyanbogoev/flask-cooking
-https://github.com/damyanbogoev/flask-cooking
-Entry file: flask-cooking/check.py
-Scanned: 2016-10-20 12:33:30.889404
-No vulnerabilities found.
-
-
-ylto/learningFlask
-https://github.com/ylto/learningFlask
-Entry file: learningFlask/hello.py
-Scanned: 2016-10-20 12:33:31.556580
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py
-
-yyoowwllgit/flask_pro
-https://github.com/yyoowwllgit/flask_pro
-Entry file: flask_pro/he.py
-Scanned: 2016-10-20 12:33:32.108137
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-egusahiroaki/flask_template
-https://github.com/egusahiroaki/flask_template
-Entry file: None
-Scanned: 2016-10-20 12:33:32.621959
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/egusahiroaki/flask_template.
-
-frederickOtus/copypaste_flask
-https://github.com/frederickOtus/copypaste_flask
-Entry file: copypaste_flask/server.py
-Scanned: 2016-10-20 12:33:34.158960
-No vulnerabilities found.
-
-
-king100/flask-blog
-https://github.com/king100/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:33:34.734221
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-yyoowwllgit/flask_server
-https://github.com/yyoowwllgit/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-20 12:33:35.263567
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-m4ra/flask-stripe
-https://github.com/m4ra/flask-stripe
-Entry file: flask-stripe/app/__init__.py
-Scanned: 2016-10-20 12:33:38.791397
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rspears74/flask-intro
-https://github.com/rspears74/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:33:44.430581
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-richardtbell/flask-tutorial
-https://github.com/richardtbell/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:33:45.982311
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-land-pack/flask-wordcounter
-https://github.com/land-pack/flask-wordcounter
-Entry file: flask-wordcounter/app.py
-Scanned: 2016-10-20 12:33:46.593499
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-wordcounter/env/lib/python2.7/genericpath.py
-
-ibrahimirdem/flask-calisma
-https://github.com/ibrahimirdem/flask-calisma
-Entry file: flask-calisma/Hello.py
-Scanned: 2016-10-20 12:33:48.107046
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-prodicus/docker-flask
-https://github.com/prodicus/docker-flask
-Entry file: None
-Scanned: 2016-10-20 12:33:49.618109
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/prodicus/docker-flask.
-
-ItamarLevyOr/Flask_Tutorial
-https://github.com/ItamarLevyOr/Flask_Tutorial
-Entry file: Flask_Tutorial/flaskr.py
-Scanned: 2016-10-20 12:33:51.286690
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorial/venv/lib/python2.7/genericpath.py
-
-kcamenzind/flask_opentracing
-https://github.com/kcamenzind/flask_opentracing
-Entry file: flask_opentracing/tests/test_flask_opentracing.py
-Scanned: 2016-10-20 12:33:54.257230
-No vulnerabilities found.
-
-
-monburan/learn_flask
-https://github.com/monburan/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 12:33:54.774034
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-plasx/flask-rest
-https://github.com/plasx/flask-rest
-Entry file: flask-rest/haystack/core.py
-Scanned: 2016-10-20 12:33:55.760463
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChrisXiongWHU/flask_test
-https://github.com/ChrisXiongWHU/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:33:56.870765
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cdumay/flask-zookeeper
-https://github.com/cdumay/flask-zookeeper
-Entry file: flask-zookeeper/tests/test_blueprint.py
-Scanned: 2016-10-20 12:33:59.305927
-No vulnerabilities found.
-
-
-vaishakp9/flask-ask
-https://github.com/vaishakp9/flask-ask
-Entry file: flask-ask/server.py
-Scanned: 2016-10-20 12:34:05.834266
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kflavin/flask-tutorial
-https://github.com/kflavin/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:34:07.344706
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-umutcoskun/flask-ready
-https://github.com/umutcoskun/flask-ready
-Entry file: flask-ready/src/app/__init__.py
-Scanned: 2016-10-20 12:34:23.430757
-Vulnerability 1:
-File: flask-ready/src/app/auth/validators.py
- > User input at line 15, trigger word ".data":
- entity = self.model.query.filter(self.field == field.data).first()
-File: flask-ready/src/app/auth/validators.py
- > reaches line 15, trigger word "filter(":
- entity = self.model.query.filter(self.field == field.data).first()
-
-Vulnerability 2:
-File: flask-ready/src/app/auth/views.py
- > User input at line 50, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-File: flask-ready/src/app/auth/views.py
- > reaches line 58, trigger word "flash(":
- flash('Welcome {}'.format(user.name), 'info')
-
-
-
-Amertz08/flask-docker
-https://github.com/Amertz08/flask-docker
-Entry file: flask-docker/app/setup.py
-Scanned: 2016-10-20 12:34:24.869013
-No vulnerabilities found.
-
-
-viniciusramos91/flask-skeleton
-https://github.com/viniciusramos91/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 12:34:25.391186
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/viniciusramos91/flask-skeleton.
-
-pythonadventurer/flask-blog
-https://github.com/pythonadventurer/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:34:25.932781
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-novking/Flask_AWS
-https://github.com/novking/Flask_AWS
-Entry file: Flask_AWS/PlagiarismDefender/home.py
-Scanned: 2016-10-20 12:34:27.385934
-Vulnerability 1:
-File: Flask_AWS/PlagiarismDefender/home.py
- > User input at line 26, trigger word "form[":
- text_to_filter = request.form['text_to_check']
-Reassigned in:
- File: Flask_AWS/PlagiarismDefender/home.py
- > Line 31: sentences = sentence_splitter.tokenize(text_to_filter)
- File: Flask_AWS/PlagiarismDefender/home.py
- > Line 40: is_it_plagiarized = str(probability_of_plagiarism / len(sentences) * 100) + '%'
- File: Flask_AWS/PlagiarismDefender/home.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('plagiarizer-submit.html')
-File: Flask_AWS/PlagiarismDefender/home.py
- > reaches line 41, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('plagiarizer-results.html',text_to_filter=text_to_filter, is_it_plagiarized=is_it_plagiarized)
-
-
-
-smeggingsmegger/flask-cookiecutter
-https://github.com/smeggingsmegger/flask-cookiecutter
-Entry file: flask-cookiecutter/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/__init__.py
-Scanned: 2016-10-20 12:34:27.913469
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lalvarezguillen/inmobiliaria_flask
-https://github.com/lalvarezguillen/inmobiliaria_flask
-Entry file: inmobiliaria_flask/web_stuff/web_app.py
-Scanned: 2016-10-20 12:34:28.421449
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JW275/flask_study
-https://github.com/JW275/flask_study
-Entry file: flask_study/views.py
-Scanned: 2016-10-20 12:34:28.993184
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-priteshgudge/django-flask
-https://github.com/priteshgudge/django-flask
-Entry file: django-flask/app.py
-Scanned: 2016-10-20 12:34:29.542733
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SIJP-ORG/flask-demo
-https://github.com/SIJP-ORG/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:34:32.071605
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SIJP-ORG/flask-demo.
-
-MalhotraVijay/flask-boilerplate
-https://github.com/MalhotraVijay/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 12:34:32.579776
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MalhotraVijay/flask-boilerplate.
-
-KOREAN139/flask-blog
-https://github.com/KOREAN139/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:34:33.139681
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-sumni-park/flask_blog
-https://github.com/sumni-park/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:34:33.653786
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vesperalwall860/flask_blank
-https://github.com/vesperalwall860/flask_blank
-Entry file: flask_blank/project/__init__.py
-Scanned: 2016-10-20 12:34:36.437859
-No vulnerabilities found.
-
-
-natfoster82/flask-alcohol
-https://github.com/natfoster82/flask-alcohol
-Entry file: flask-alcohol/example/app.py
-Scanned: 2016-10-20 12:34:39.992889
-Vulnerability 1:
-File: flask-alcohol/example/app.py
- > User input at line 138, trigger word "get(":
- email = request.json.get('email')
-File: flask-alcohol/example/app.py
- > reaches line 139, trigger word "filter(":
- user = cls.query.filter(db.func.lower(User.email) == db.func.lower(email)).first()
-
-Vulnerability 2:
-File: flask-alcohol/example/app.py
- > User input at line 279, trigger word "get(":
- project_id = request.args.get('project_id')
-Reassigned in:
- File: flask-alcohol/example/app.py
- > Line 282: ret_MAYBE_FUNCTION_NAME = query
-File: flask-alcohol/example/app.py
- > reaches line 278, trigger word "filter(":
- query = query.filter(Post.last_published_at != None)
-
-Vulnerability 3:
-File: flask-alcohol/example/app.py
- > User input at line 279, trigger word "get(":
- project_id = request.args.get('project_id')
-Reassigned in:
- File: flask-alcohol/example/app.py
- > Line 282: ret_MAYBE_FUNCTION_NAME = query
-File: flask-alcohol/example/app.py
- > reaches line 281, trigger word "filter(":
- query = query.filter(Post.project_id == project_id)
-
-
-
-liuzhangpei/myFlask
-https://github.com/liuzhangpei/myFlask
-Entry file: myFlask/project.py
-Scanned: 2016-10-20 12:34:44.671916
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stevenzhang18/Indeed-Flask
-https://github.com/stevenzhang18/Indeed-Flask
-Entry file: Indeed-Flask/main.py
-Scanned: 2016-10-20 12:34:46.292342
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-RAIRLab/Talos-Flask
-https://github.com/RAIRLab/Talos-Flask
-Entry file: None
-Scanned: 2016-10-20 12:34:46.810649
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/RAIRLab/Talos-Flask.
-
-stewill/flask_web
-https://github.com/stewill/flask_web
-Entry file: flask_web/helloflask.py
-Scanned: 2016-10-20 12:34:48.448190
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py
-
-bradkarels/restful-flask
-https://github.com/bradkarels/restful-flask
-Entry file: restful-flask/hello.py
-Scanned: 2016-10-20 12:34:50.771210
-No vulnerabilities found.
-
-
-linkcheng/flask_notes
-https://github.com/linkcheng/flask_notes
-Entry file: flask_notes/hello.py
-Scanned: 2016-10-20 12:34:52.189905
-No vulnerabilities found.
-
-
-Mamun-dueee/Flask-microblog
-https://github.com/Mamun-dueee/Flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:34:55.244541
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-andrealmar/flask-microblog
-https://github.com/andrealmar/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:34:55.746146
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vdnhnguyen/flask-upload
-https://github.com/vdnhnguyen/flask-upload
-Entry file: flask-upload/index.py
-Scanned: 2016-10-20 12:34:56.271918
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-smrati/dockerize_flask
-https://github.com/smrati/dockerize_flask
-Entry file: dockerize_flask/app/__init__.py
-Scanned: 2016-10-20 12:34:57.665508
-No vulnerabilities found.
-
-
-cococohen/Microblog
-https://github.com/cococohen/Microblog
-Entry file: Microblog/flask/lib/python3.4/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:35:07.003013
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BeFunes/App-FlaskExercise
-https://github.com/BeFunes/App-FlaskExercise
-Entry file: App-FlaskExercise/app.py
-Scanned: 2016-10-20 12:35:07.521908
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Nonja/FlaskArticleSearchNYT
-https://github.com/Nonja/FlaskArticleSearchNYT
-Entry file: FlaskArticleSearchNYT/app/__init__.py
-Scanned: 2016-10-20 12:35:17.866694
-Vulnerability 1:
-File: FlaskArticleSearchNYT/app/hummus.py
- > User input at line 23, trigger word "get(":
- begindate = request.args.get('begindate', '').replace('-', '')
-Reassigned in:
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params)
-File: FlaskArticleSearchNYT/app/hummus.py
- > reaches line 23, trigger word "replace(":
- begindate = request.args.get('begindate', '').replace('-', '')
-
-Vulnerability 2:
-File: FlaskArticleSearchNYT/app/hummus.py
- > User input at line 24, trigger word "get(":
- enddate = request.args.get('enddate', '').replace('-', '')
-Reassigned in:
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params)
-File: FlaskArticleSearchNYT/app/hummus.py
- > reaches line 24, trigger word "replace(":
- enddate = request.args.get('enddate', '').replace('-', '')
-
-Vulnerability 3:
-File: FlaskArticleSearchNYT/app/hummus.py
- > User input at line 22, trigger word "get(":
- searchquery = request.args.get('searchrequest', '')
-Reassigned in:
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params)
-File: FlaskArticleSearchNYT/app/hummus.py
- > reaches line 51, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(news=news, results=results, totalpages=totalpages, page=page, searchquery=searchquery)
-
-Vulnerability 4:
-File: FlaskArticleSearchNYT/app/hummus.py
- > User input at line 25, trigger word "get(":
- page = request.args.get('page', '')
-Reassigned in:
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 31: page = 0
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params)
- File: FlaskArticleSearchNYT/app/hummus.py
- > Line 41: page = data['response']['meta']['offset'] / 10 + 1
-File: FlaskArticleSearchNYT/app/hummus.py
- > reaches line 51, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(news=news, results=results, totalpages=totalpages, page=page, searchquery=searchquery)
-
-
-
-mr1holmes/planup-backend
-https://github.com/mr1holmes/planup-backend
-Entry file: planup-backend/flaskapp/__init__.py
-Scanned: 2016-10-20 12:35:24.408222
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tonuidavies/Discover
-https://github.com/tonuidavies/Discover
-Entry file: Discover/app.py
-Scanned: 2016-10-20 12:35:26.183411
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Discover/venv/lib/python2.7/genericpath.py
-
-RydrDojo/Ridr_app
-https://github.com/RydrDojo/Ridr_app
-Entry file: None
-Scanned: 2016-10-20 12:35:26.724376
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stephenjjones/flask-auth-service
-https://github.com/stephenjjones/flask-auth-service
-Entry file: flask-auth-service/app/__init__.py
-Scanned: 2016-10-20 12:35:28.040181
-Vulnerability 1:
-File: flask-auth-service/app/main/views.py
- > User input at line 18, trigger word ".data":
- email = result.data['email']
-Reassigned in:
- File: flask-auth-service/app/main/views.py
- > Line 22: user = User(email=email)
-File: flask-auth-service/app/main/views.py
- > reaches line 26, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 2:
-File: flask-auth-service/app/main/views.py
- > User input at line 18, trigger word ".data":
- email = result.data['email']
-Reassigned in:
- File: flask-auth-service/app/main/views.py
- > Line 22: user = User(email=email)
-File: flask-auth-service/app/main/views.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: flask-auth-service/app/main/views.py
- > User input at line 31, trigger word "get(":
- user = User.query.get(id)
-File: flask-auth-service/app/main/views.py
- > reaches line 34, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('email'user.email)
-
-
-
-thomasobrien99/flask_user_template
-https://github.com/thomasobrien99/flask_user_template
-Entry file: flask_user_template/app.py
-Scanned: 2016-10-20 12:35:29.362892
-No vulnerabilities found.
-
-
-thomasobrien99/flask-movie-crud
-https://github.com/thomasobrien99/flask-movie-crud
-Entry file: flask-movie-crud/app.py
-Scanned: 2016-10-20 12:35:30.924846
-Vulnerability 1:
-File: flask-movie-crud/app.py
- > User input at line 47, trigger word "get(":
- show_dir = Director.query.get(id)
-File: flask-movie-crud/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/directors/show.html',dir=show_dir)
-
-Vulnerability 2:
-File: flask-movie-crud/app.py
- > User input at line 52, trigger word "get(":
- edit_dir = Director.query.get(id)
-File: flask-movie-crud/app.py
- > reaches line 53, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/directors/edit.html',dir=edit_dir)
-
-Vulnerability 3:
-File: flask-movie-crud/app.py
- > User input at line 73, trigger word "get(":
- director = Director.query.get(id)
-File: flask-movie-crud/app.py
- > reaches line 74, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('movies/index.html',director=director)
-
-Vulnerability 4:
-File: flask-movie-crud/app.py
- > User input at line 86, trigger word "get(":
- director = Director.query.get(id)
-File: flask-movie-crud/app.py
- > reaches line 88, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('movies/new.html',director=director, tags=tags)
-
-Vulnerability 5:
-File: flask-movie-crud/app.py
- > User input at line 92, trigger word "get(":
- movie = Movie.query.get(movie_id)
-File: flask-movie-crud/app.py
- > reaches line 94, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('movies/edit.html',movie=movie, tags=tags)
-
-Vulnerability 6:
-File: flask-movie-crud/app.py
- > User input at line 98, trigger word "get(":
- movie = Movie.query.get(movie_id)
-File: flask-movie-crud/app.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('movies/show.html',movie=movie)
-
-Vulnerability 7:
-File: flask-movie-crud/app.py
- > User input at line 136, trigger word "get(":
- tag = Tag.query.get(id)
-File: flask-movie-crud/app.py
- > reaches line 137, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tags/show.html',tag=tag)
-
-Vulnerability 8:
-File: flask-movie-crud/app.py
- > User input at line 141, trigger word "get(":
- tag = Tag.query.get(id)
-File: flask-movie-crud/app.py
- > reaches line 142, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tags/edit.html',tag=tag)
-
-
-
-chavli/heroku-flask-start
-https://github.com/chavli/heroku-flask-start
-Entry file: heroku-flask-start/app.py
-Scanned: 2016-10-20 12:35:32.316844
-No vulnerabilities found.
-
-
-kmalfatti/library-flask-app
-https://github.com/kmalfatti/library-flask-app
-Entry file: library-flask-app/app.py
-Scanned: 2016-10-20 12:35:33.755905
-Vulnerability 1:
-File: library-flask-app/app.py
- > User input at line 63, trigger word "get(":
- found_author = Author.query.get(id)
-File: library-flask-app/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('books/index.html',author=found_author)
-
-Vulnerability 2:
-File: library-flask-app/app.py
- > User input at line 68, trigger word "get(":
- found_author = Author.query.get(id)
-File: library-flask-app/app.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('books/new.html',author=found_author)
-
-
-
-vmuguerzac/flask_by_example
-https://github.com/vmuguerzac/flask_by_example
-Entry file: flask_by_example/app.py
-Scanned: 2016-10-20 12:35:34.422802
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py
-
-xilixjd/flask_project_blog
-https://github.com/xilixjd/flask_project_blog
-Entry file: flask_project_blog/models.py
-Scanned: 2016-10-20 12:35:38.529233
-No vulnerabilities found.
-
-
-thomasobrien99/flask-migrate-and-auth
-https://github.com/thomasobrien99/flask-migrate-and-auth
-Entry file: flask-migrate-and-auth/app.py
-Scanned: 2016-10-20 12:35:39.981926
-No vulnerabilities found.
-
-
-rbudzak/learnFlaskMigrate
-https://github.com/rbudzak/learnFlaskMigrate
-Entry file: learnFlaskMigrate/app.py
-Scanned: 2016-10-20 12:35:41.332838
-No vulnerabilities found.
-
-
-krpeacock/flask_migrate_template
-https://github.com/krpeacock/flask_migrate_template
-Entry file: flask_migrate_template/app.py
-Scanned: 2016-10-20 12:35:42.766453
-No vulnerabilities found.
-
-
-sh4nks/flask-caching
-https://github.com/sh4nks/flask-caching
-Entry file: flask-caching/setup.py
-Scanned: 2016-10-20 12:35:49.464541
-No vulnerabilities found.
-
-
-mani-python/flask
-https://github.com/mani-python/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:35:50.053205
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-manikandaraj123ster/flask
-https://github.com/manikandaraj123ster/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:35:50.658813
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Kirade/Flask
-https://github.com/Kirade/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:35:51.170281
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-salhernandez/Flask
-https://github.com/salhernandez/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:35:51.698383
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-murilobsd/zeus
-https://github.com/murilobsd/zeus
-Entry file: None
-Scanned: 2016-10-20 12:35:52.216118
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/murilobsd/zeus.
-
-xuelangZF/NaHan
-https://github.com/xuelangZF/NaHan
-Entry file: NaHan/nahan/__init__.py
-Scanned: 2016-10-20 12:35:53.232879
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-haklabrador/podatci-s-burza
-https://github.com/haklabrador/podatci-s-burza
-Entry file: podatci-s-burza/webserver.py
-Scanned: 2016-10-20 12:35:55.768806
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-weinbergdavid/python-flask-security
-https://github.com/weinbergdavid/python-flask-security
-Entry file: python-flask-security/run.py
-Scanned: 2016-10-20 12:36:04.870499
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-aaossa/flask-openshift
-https://github.com/aaossa/flask-openshift
-Entry file: flask-openshift/flask_openshift_template.py
-Scanned: 2016-10-20 12:36:06.575562
-Vulnerability 1:
-File: flask-openshift/flask_openshift_template.py
- > User input at line 14, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-openshift/flask_openshift_template.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flask-openshift/flask_openshift_template.py
- > reaches line 15, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username))
-
-Vulnerability 2:
-File: flask-openshift/flask_openshift_template.py
- > User input at line 14, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-openshift/flask_openshift_template.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flask-openshift/flask_openshift_template.py
- > reaches line 15, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username))
-
-
-
-nsujan/flaskbot
-https://github.com/nsujan/flaskbot
-Entry file: flaskbot/wsgi/myflaskapp.py
-Scanned: 2016-10-20 12:36:08.024170
-No vulnerabilities found.
-
-
-davbrink/flaskblog
-https://github.com/davbrink/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:36:09.054562
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-ToDolin/flaskgit
-https://github.com/ToDolin/flaskgit
-Entry file: flaskgit/flasky/app/__init__.py
-Scanned: 2016-10-20 12:36:10.586493
-No vulnerabilities found.
-
-
-yolandaz/flaskcars
-https://github.com/yolandaz/flaskcars
-Entry file: flaskcars/app.py
-Scanned: 2016-10-20 12:36:17.297788
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/genericpath.py
-
-penglee87/flaskweb
-https://github.com/penglee87/flaskweb
-Entry file: None
-Scanned: 2016-10-20 12:36:24.858756
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yuyanqiuqiu/flaskr
-https://github.com/yuyanqiuqiu/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:36:26.365959
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stevehaigh/flasktest
-https://github.com/stevehaigh/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 12:36:27.384487
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-LongstreetSolutions/flaskr
-https://github.com/LongstreetSolutions/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:36:28.926909
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-juniorkrvl/flasky
-https://github.com/juniorkrvl/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:36:30.459276
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Halcae/flaskapp
-https://github.com/Halcae/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:36:31.980431
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp.
-
-themuppet2/flasktaskr
-https://github.com/themuppet2/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:36:33.519508
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-NathanJ4620/flasker
-https://github.com/NathanJ4620/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-20 12:36:35.048879
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SuZhiBai/flaskblog
-https://github.com/SuZhiBai/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:36:35.582729
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-AkshayBhagat/FlaskApp
-https://github.com/AkshayBhagat/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:36:39.207052
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ncmadhu/FlaskDemo
-https://github.com/ncmadhu/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 12:36:42.216280
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Qqlick/flaskRP
-https://github.com/Qqlick/flaskRP
-Entry file: flaskRP/flaskRP.py
-Scanned: 2016-10-20 12:36:44.668632
-Vulnerability 1:
-File: flaskRP/flaskRP.py
- > User input at line 46, trigger word "form[":
- title = request.form['title']
-File: flaskRP/flaskRP.py
- > reaches line 53, trigger word "execute(":
- g.db.execute('INSERT into posts (title, posts) VALUES (?,?)', [title, post])
-
-Vulnerability 2:
-File: flaskRP/flaskRP.py
- > User input at line 47, trigger word "form[":
- post = request.form['post']
-File: flaskRP/flaskRP.py
- > reaches line 53, trigger word "execute(":
- g.db.execute('INSERT into posts (title, posts) VALUES (?,?)', [title, post])
-
-
-
-YoDaMa/FlaskApp
-https://github.com/YoDaMa/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:36:45.278583
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stylianos-kampakis/flask-test
-https://github.com/stylianos-kampakis/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:36:50.815846
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-erose/tictactoe-flask
-https://github.com/erose/tictactoe-flask
-Entry file: tictactoe-flask/app.py
-Scanned: 2016-10-20 12:36:52.619679
-No vulnerabilities found.
-
-
-alexeib2014/Flask-Android
-https://github.com/alexeib2014/Flask-Android
-Entry file: Flask-Android/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:36:53.237587
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-valasek/taekwondo-flask
-https://github.com/valasek/taekwondo-flask
-Entry file: None
-Scanned: 2016-10-20 12:36:53.755427
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/valasek/taekwondo-flask.
-
-jdgwartney/flask-blueprint
-https://github.com/jdgwartney/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 12:36:54.278949
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rjantos/flask-blog
-https://github.com/rjantos/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:36:56.346970
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-leofofeo/flask-stuff
-https://github.com/leofofeo/flask-stuff
-Entry file: flask-stuff/flask_test.py
-Scanned: 2016-10-20 12:36:57.664626
-No vulnerabilities found.
-
-
-greenapplepark/flask_docker
-https://github.com/greenapplepark/flask_docker
-Entry file: flask_docker/app/flaskEntry.py
-Scanned: 2016-10-20 12:37:07.022942
-No vulnerabilities found.
-
-
-karloku/beginners_flask
-https://github.com/karloku/beginners_flask
-Entry file: beginners_flask/application/__init__.py
-Scanned: 2016-10-20 12:37:08.463711
-No vulnerabilities found.
-
-
-s2tephen/flask-network
-https://github.com/s2tephen/flask-network
-Entry file: flask-network/app.py
-Scanned: 2016-10-20 12:37:09.761801
-No vulnerabilities found.
-
-
-julianparismorgan/flask_cellcounter
-https://github.com/julianparismorgan/flask_cellcounter
-Entry file: flask_cellcounter/cell-app.py
-Scanned: 2016-10-20 12:37:17.981185
-No vulnerabilities found.
-
-
-jdgwartney/hello-flask
-https://github.com/jdgwartney/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:37:18.581307
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-rohanagrawal/flask_social
-https://github.com/rohanagrawal/flask_social
-Entry file: flask_social/app.py
-Scanned: 2016-10-20 12:37:19.090565
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-monburan/learn_flask
-https://github.com/monburan/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 12:37:25.657810
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChrisXiongWHU/flask_test
-https://github.com/ChrisXiongWHU/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:37:27.255153
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jiaominlong/flask-web
-https://github.com/jiaominlong/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 12:37:27.765049
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Amertz08/flask-docker
-https://github.com/Amertz08/flask-docker
-Entry file: flask-docker/app/setup.py
-Scanned: 2016-10-20 12:37:29.232357
-No vulnerabilities found.
-
-
-viniciusramos91/flask-skeleton
-https://github.com/viniciusramos91/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 12:37:29.795101
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/viniciusramos91/flask-skeleton.
-
-falterfriday/python-flask
-https://github.com/falterfriday/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 12:37:31.322107
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jcue/flask-blog
-https://github.com/jcue/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:37:32.884274
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-metiago/flask-skeleton
-https://github.com/metiago/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 12:37:35.894354
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/metiago/flask-skeleton.
-
-rodolfolottin/flask-sortingservice
-https://github.com/rodolfolottin/flask-sortingservice
-Entry file: flask-sortingservice/src/app.py
-Scanned: 2016-10-20 12:37:43.070752
-No vulnerabilities found.
-
-
-xubiaosunny/flask-blog
-https://github.com/xubiaosunny/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:37:43.650282
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-lklacar/flask-api
-https://github.com/lklacar/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 12:37:44.160139
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coder-zhuyu/flask-framework
-https://github.com/coder-zhuyu/flask-framework
-Entry file: flask-framework/app/__init__.py
-Scanned: 2016-10-20 12:37:45.762777
-Vulnerability 1:
-File: flask-framework/app/auth/views.py
- > User input at line 71, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-framework/app/auth/views.py
- > Line 73: pagination = query.paginate(page,per_page=current_app.config['FLASKY_USERS_PER_PAGE'], error_out=False)
- File: flask-framework/app/auth/views.py
- > Line 76: users = pagination.items
-File: flask-framework/app/auth/views.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('auth/confirm.html',pagination=pagination, users=users)
-
-
-
-cdumay/flask-tat
-https://github.com/cdumay/flask-tat
-Entry file: flask-tat/examples/simple.py
-Scanned: 2016-10-20 12:37:47.290716
-No vulnerabilities found.
-
-
-wizardbeard/demoservice_flask
-https://github.com/wizardbeard/demoservice_flask
-Entry file: demoservice_flask/env/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-20 12:38:00.763038
-No vulnerabilities found.
-
-
-mvbn6789/flask-blog
-https://github.com/mvbn6789/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:38:01.384744
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-andrew-j-price/python-flask
-https://github.com/andrew-j-price/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 12:38:01.911391
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-VarmintWorks/VarmintFlask
-https://github.com/VarmintWorks/VarmintFlask
-Entry file: VarmintFlask/main.py
-Scanned: 2016-10-20 12:38:03.650197
-No vulnerabilities found.
-
-
-dqisme/Learn-Flask
-https://github.com/dqisme/Learn-Flask
-Entry file: Learn-Flask/hello.py
-Scanned: 2016-10-20 12:38:04.953069
-No vulnerabilities found.
-
-
-bakslash/flask_social
-https://github.com/bakslash/flask_social
-Entry file: flask_social/app.py
-Scanned: 2016-10-20 12:38:05.474084
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jiri-fiala/flask-hellow
-https://github.com/jiri-fiala/flask-hellow
-Entry file: flask-hellow/app.py
-Scanned: 2016-10-20 12:38:06.788506
-No vulnerabilities found.
-
-
-fmlvn/quiz
-https://github.com/fmlvn/quiz
-Entry file: quiz/quiz/__init__.py
-Scanned: 2016-10-20 12:38:08.582000
-No vulnerabilities found.
-
-
-kawilliams/new-db-Pronto-Flask
-https://github.com/kawilliams/new-db-Pronto-Flask
-Entry file: new-db-Pronto-Flask/syllabi_manager.py
-Scanned: 2016-10-20 12:38:09.114368
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stephenjjones/flask-auth-service
-https://github.com/stephenjjones/flask-auth-service
-Entry file: flask-auth-service/app/__init__.py
-Scanned: 2016-10-20 12:38:10.442032
-Vulnerability 1:
-File: flask-auth-service/app/main/views.py
- > User input at line 18, trigger word ".data":
- email = result.data['email']
-Reassigned in:
- File: flask-auth-service/app/main/views.py
- > Line 22: user = User(email=email)
-File: flask-auth-service/app/main/views.py
- > reaches line 26, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 2:
-File: flask-auth-service/app/main/views.py
- > User input at line 18, trigger word ".data":
- email = result.data['email']
-Reassigned in:
- File: flask-auth-service/app/main/views.py
- > Line 22: user = User(email=email)
-File: flask-auth-service/app/main/views.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: flask-auth-service/app/main/views.py
- > User input at line 31, trigger word "get(":
- user = User.query.get(id)
-File: flask-auth-service/app/main/views.py
- > reaches line 34, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('email'user.email)
-
-
-
-maikeulb/flask-by-example
-https://github.com/maikeulb/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:38:11.110733
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-atelic/flask-react-skeleton
-https://github.com/atelic/flask-react-skeleton
-Entry file: None
-Scanned: 2016-10-20 12:38:11.636940
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/atelic/flask-react-skeleton.
-
-cdumay/flask-graylog-bundle
-https://github.com/cdumay/flask-graylog-bundle
-Entry file: flask-graylog-bundle/examples/auth.py
-Scanned: 2016-10-20 12:38:20.108628
-No vulnerabilities found.
-
-
-xufuou/flask-by-example
-https://github.com/xufuou/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:38:26.301270
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Michael728/awesome-flask-todo
-https://github.com/Michael728/awesome-flask-todo
-Entry file: None
-Scanned: 2016-10-20 12:38:27.802777
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Michael728/awesome-flask-todo.
-
-ayttew/flask-simple-app
-https://github.com/ayttew/flask-simple-app
-Entry file: flask-simple-app/app/src/app.py
-Scanned: 2016-10-20 12:38:29.143316
-No vulnerabilities found.
-
-
-chiefspace/flask_media_streaming_server
-https://github.com/chiefspace/flask_media_streaming_server
-Entry file: flask_media_streaming_server/run.py
-Scanned: 2016-10-20 12:38:29.783857
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_media_streaming_server/flask/lib/python2.7/genericpath.py
-
-vigevenoj/flask-hue-sensors
-https://github.com/vigevenoj/flask-hue-sensors
-Entry file: flask-hue-sensors/app/__init__.py
-Scanned: 2016-10-20 12:38:31.913126
-No vulnerabilities found.
-
-
-kyouko-taiga/Flask-SocketAPI
-https://github.com/kyouko-taiga/Flask-SocketAPI
-Entry file: Flask-SocketAPI/test_socketapi.py
-Scanned: 2016-10-20 12:38:33.535105
-No vulnerabilities found.
-
-
-learningpython08/flask-file-sharing
-https://github.com/learningpython08/flask-file-sharing
-Entry file: flask-file-sharing/upload/handlers.py
-Scanned: 2016-10-20 12:38:35.086043
-Vulnerability 1:
-File: flask-file-sharing/upload/handlers.py
- > User input at line 55, trigger word "get(":
- file_obj = request.files.get('file')
-Reassigned in:
- File: flask-file-sharing/upload/handlers.py
- > Line 66: fname = secure_filename(file_obj.filename)
- File: flask-file-sharing/upload/handlers.py
- > Line 68: fname = secure_filename(file_name)
- File: flask-file-sharing/upload/handlers.py
- > Line 70: url_path = '/'.join([subdir, fname])
- File: flask-file-sharing/upload/handlers.py
- > Line 79: fname = secure_filename(file_name)
- File: flask-file-sharing/upload/handlers.py
- > Line 80: url_path = '/'.join([subdir, fname])
- File: flask-file-sharing/upload/handlers.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201)
-File: flask-file-sharing/upload/handlers.py
- > reaches line 86, trigger word "url_for(":
- prv_url = url_for('preview',path=url_path, _external=True)
-
-Vulnerability 2:
-File: flask-file-sharing/upload/handlers.py
- > User input at line 55, trigger word "get(":
- file_obj = request.files.get('file')
-Reassigned in:
- File: flask-file-sharing/upload/handlers.py
- > Line 66: fname = secure_filename(file_obj.filename)
- File: flask-file-sharing/upload/handlers.py
- > Line 68: fname = secure_filename(file_name)
- File: flask-file-sharing/upload/handlers.py
- > Line 70: url_path = '/'.join([subdir, fname])
- File: flask-file-sharing/upload/handlers.py
- > Line 79: fname = secure_filename(file_name)
- File: flask-file-sharing/upload/handlers.py
- > Line 80: url_path = '/'.join([subdir, fname])
- File: flask-file-sharing/upload/handlers.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201)
-File: flask-file-sharing/upload/handlers.py
- > reaches line 87, trigger word "url_for(":
- dl_url = url_for('download',path=url_path, _external=True)
-
-Vulnerability 3:
-File: flask-file-sharing/upload/handlers.py
- > User input at line 55, trigger word "get(":
- file_obj = request.files.get('file')
-Reassigned in:
- File: flask-file-sharing/upload/handlers.py
- > Line 66: fname = secure_filename(file_obj.filename)
- File: flask-file-sharing/upload/handlers.py
- > Line 68: fname = secure_filename(file_name)
- File: flask-file-sharing/upload/handlers.py
- > Line 70: url_path = '/'.join([subdir, fname])
- File: flask-file-sharing/upload/handlers.py
- > Line 79: fname = secure_filename(file_name)
- File: flask-file-sharing/upload/handlers.py
- > Line 80: url_path = '/'.join([subdir, fname])
- File: flask-file-sharing/upload/handlers.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201)
-File: flask-file-sharing/upload/handlers.py
- > reaches line 89, trigger word "jsonify(":
- resp = jsonify(download=dl_url, preview=prv_url)
-
-
-
-StephenWeber/rundeck-sensu-flask
-https://github.com/StephenWeber/rundeck-sensu-flask
-Entry file: rundeck-sensu-flask/rsf/__init__.py
-Scanned: 2016-10-20 12:38:36.476019
-No vulnerabilities found.
-
-
-chiefspace/miguelgrinberg_flask_mega
-https://github.com/chiefspace/miguelgrinberg_flask_mega
-Entry file: None
-Scanned: 2016-10-20 12:38:37.035465
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mikefromit/flask-jsonschema-example
-https://github.com/mikefromit/flask-jsonschema-example
-Entry file: flask-jsonschema-example/app.py
-Scanned: 2016-10-20 12:38:44.940790
-No vulnerabilities found.
-
-
-beibeiyang/cf-flask-bokeh-demo
-https://github.com/beibeiyang/cf-flask-bokeh-demo
-Entry file: cf-flask-bokeh-demo/stocks.py
-Scanned: 2016-10-20 12:38:46.351810
-Vulnerability 1:
-File: cf-flask-bokeh-demo/stocks.py
- > User input at line 47, trigger word "get(":
- symbol = request.args.get('symbol')
-Reassigned in:
- File: cf-flask-bokeh-demo/stocks.py
- > Line 52: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % symbol
- File: cf-flask-bokeh-demo/stocks.py
- > Line 55: raw_data = session.get(api_url).text
- File: cf-flask-bokeh-demo/stocks.py
- > Line 56: json_data = json.loads(raw_data)
- File: cf-flask-bokeh-demo/stocks.py
- > Line 59: df = DataFrame(data=json_data['data'], columns=json_data['column_names'])
- File: cf-flask-bokeh-demo/stocks.py
- > Line 68: df['left'] = pd.DatetimeIndex(df.Date) - pd.DateOffset(days=0.5)
- File: cf-flask-bokeh-demo/stocks.py
- > Line 69: df['right'] = pd.DatetimeIndex(df.Date) + pd.DateOffset(days=0.5)
- File: cf-flask-bokeh-demo/stocks.py
- > Line 114: header = '
%s of %s
Name: %s
Description (from our data provider): %s
Zoom into the chart to see more detail.
' % (json_data['source_name'], json_data['code'], json_data['name'], json_data['description'])
-File: cf-flask-bokeh-demo/stocks.py
- > reaches line 122, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, header=header)
-
-Vulnerability 2:
-File: cf-flask-bokeh-demo/stocks.py
- > User input at line 55, trigger word "get(":
- raw_data = session.get(api_url).text
-Reassigned in:
- File: cf-flask-bokeh-demo/stocks.py
- > Line 56: json_data = json.loads(raw_data)
- File: cf-flask-bokeh-demo/stocks.py
- > Line 59: df = DataFrame(data=json_data['data'], columns=json_data['column_names'])
- File: cf-flask-bokeh-demo/stocks.py
- > Line 68: df['left'] = pd.DatetimeIndex(df.Date) - pd.DateOffset(days=0.5)
- File: cf-flask-bokeh-demo/stocks.py
- > Line 69: df['right'] = pd.DatetimeIndex(df.Date) + pd.DateOffset(days=0.5)
- File: cf-flask-bokeh-demo/stocks.py
- > Line 114: header = '
%s of %s
Name: %s
Description (from our data provider): %s
Zoom into the chart to see more detail.
' % (json_data['source_name'], json_data['code'], json_data['name'], json_data['description'])
-File: cf-flask-bokeh-demo/stocks.py
- > reaches line 122, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, header=header)
-
-
-
-Omrigan/flask-github-ci
-https://github.com/Omrigan/flask-github-ci
-Entry file: flask-github-ci/service.py
-Scanned: 2016-10-20 12:38:46.876610
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-krisekenes/productsDashFlask
-https://github.com/krisekenes/productsDashFlask
-Entry file: productsDashFlask/server.py
-Scanned: 2016-10-20 12:38:48.295103
-No vulnerabilities found.
-
-
-bmd/flask-docker-cookiecutter
-https://github.com/bmd/flask-docker-cookiecutter
-Entry file: flask-docker-cookiecutter/{{ cookiecutter.app_name }}/{{ cookiecutter.app_name }}/{{ cookiecutter.app_name }}/app.py
-Scanned: 2016-10-20 12:38:48.811022
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Athsheep/Flask_Web_Development
-https://github.com/Athsheep/Flask_Web_Development
-Entry file: Flask_Web_Development/app/__init__.py
-Scanned: 2016-10-20 12:38:59.865679
-Vulnerability 1:
-File: Flask_Web_Development/app/main/views.py
- > User input at line 32, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/main/views.py
- > Line 40: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/main/views.py
- > Line 42: posts = pagination.items
- File: Flask_Web_Development/app/main/views.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask_Web_Development/app/main/views.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Flask_Web_Development/app/main/views.py
- > User input at line 35, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Flask_Web_Development/app/main/views.py
- > Line 33: show_followed = False
- File: Flask_Web_Development/app/main/views.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask_Web_Development/app/main/views.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Flask_Web_Development/app/main/views.py
- > User input at line 136, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/main/views.py
- > Line 138: page = post.comments.count() - 1 / 10 + 1
- File: Flask_Web_Development/app/main/views.py
- > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/main/views.py
- > Line 141: comments = pagination.items
- File: Flask_Web_Development/app/main/views.py
- > Line 135: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Flask_Web_Development/app/main/views.py
- > reaches line 142, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: Flask_Web_Development/app/main/views.py
- > User input at line 182, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/main/views.py
- > Line 183: pagination = user.followers.paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/main/views.py
- > Line 185: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Flask_Web_Development/app/main/views.py
- > Line 181: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask_Web_Development/app/main/views.py
- > reaches line 187, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: Flask_Web_Development/app/main/views.py
- > User input at line 196, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/main/views.py
- > Line 197: pagination = user.followed.paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/main/views.py
- > Line 199: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Flask_Web_Development/app/main/views.py
- > Line 195: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask_Web_Development/app/main/views.py
- > reaches line 201, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Flask_Web_Development/app/main/views.py
- > User input at line 223, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/main/views.py
- > Line 225: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/main/views.py
- > Line 227: comments = pagination.items
-File: Flask_Web_Development/app/main/views.py
- > reaches line 229, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 7:
-File: Flask_Web_Development/app/api_1_0/users.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 17: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 18: prev = None
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 21: next = None
-File: Flask_Web_Development/app/api_1_0/users.py
- > reaches line 20, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: Flask_Web_Development/app/api_1_0/users.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 17: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 18: prev = None
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 21: next = None
-File: Flask_Web_Development/app/api_1_0/users.py
- > reaches line 23, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: Flask_Web_Development/app/api_1_0/users.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 17: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 18: prev = None
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 21: next = None
-File: Flask_Web_Development/app/api_1_0/users.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: Flask_Web_Development/app/api_1_0/users.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 37: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 38: prev = None
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 41: next = None
-File: Flask_Web_Development/app/api_1_0/users.py
- > reaches line 40, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: Flask_Web_Development/app/api_1_0/users.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 37: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 38: prev = None
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 41: next = None
-File: Flask_Web_Development/app/api_1_0/users.py
- > reaches line 43, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: Flask_Web_Development/app/api_1_0/users.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 37: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 38: prev = None
- File: Flask_Web_Development/app/api_1_0/users.py
- > Line 41: next = None
-File: Flask_Web_Development/app/api_1_0/users.py
- > reaches line 44, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 13:
-File: Flask_Web_Development/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask_Web_Development/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: Flask_Web_Development/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask_Web_Development/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: Flask_Web_Development/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask_Web_Development/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask_Web_Development/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 16:
-File: Flask_Web_Development/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 13: prev = None
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 16: next = None
-File: Flask_Web_Development/app/api_1_0/comments.py
- > reaches line 15, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 17:
-File: Flask_Web_Development/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 13: prev = None
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 16: next = None
-File: Flask_Web_Development/app/api_1_0/comments.py
- > reaches line 18, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 18:
-File: Flask_Web_Development/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 13: prev = None
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 16: next = None
-File: Flask_Web_Development/app/api_1_0/comments.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 19:
-File: Flask_Web_Development/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 38: prev = None
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 41: next = None
-File: Flask_Web_Development/app/api_1_0/comments.py
- > reaches line 40, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 20:
-File: Flask_Web_Development/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 38: prev = None
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 41: next = None
-File: Flask_Web_Development/app/api_1_0/comments.py
- > reaches line 43, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 21:
-File: Flask_Web_Development/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 38: prev = None
- File: Flask_Web_Development/app/api_1_0/comments.py
- > Line 41: next = None
-File: Flask_Web_Development/app/api_1_0/comments.py
- > reaches line 44, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-kukuhsain/learn-flask-python
-https://github.com/kukuhsain/learn-flask-python
-Entry file: learn-flask-python/helloworld.py
-Scanned: 2016-10-20 12:39:02.807745
-No vulnerabilities found.
-
-
-Artadys/flask-by-example
-https://github.com/Artadys/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:39:03.515416
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gorogoro13/mFlask-TumbleLog
-https://github.com/gorogoro13/mFlask-TumbleLog
-Entry file: mFlask-TumbleLog/init.py
-Scanned: 2016-10-20 12:39:04.824323
-No vulnerabilities found.
-
-
-saileshpatnala/flask-by-example
-https://github.com/saileshpatnala/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:39:05.517672
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Kontiomaa/flask-sqlalchemy-demo
-https://github.com/Kontiomaa/flask-sqlalchemy-demo
-Entry file: flask-sqlalchemy-demo/app.py
-Scanned: 2016-10-20 12:39:07.425928
-Vulnerability 1:
-File: flask-sqlalchemy-demo/app.py
- > User input at line 76, trigger word "get(":
- order = Order.query.get(order_id)
-Reassigned in:
- File: flask-sqlalchemy-demo/app.py
- > Line 81: orderData = 'Orderer''status''Items'order.customer.usernameorder.status['Name''Amount'row.itemonrow.productNamerow.count for row in order.orderrow]
-File: flask-sqlalchemy-demo/app.py
- > reaches line 83, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(orderData)
-
-
-
-1131909224/flask
-https://github.com/1131909224/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:39:10.802516
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-wangrenlearn/flask
-https://github.com/wangrenlearn/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:39:11.871353
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-dongshuiquan/flasky
-https://github.com/dongshuiquan/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:39:26.371294
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-caseydunham/flaskr
-https://github.com/caseydunham/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:39:27.885463
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-francium/flaskr
-https://github.com/francium/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:39:28.406341
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Qqlick/Flasktaskr
-https://github.com/Qqlick/Flasktaskr
-Entry file: Flasktaskr/flask_api.py
-Scanned: 2016-10-20 12:39:29.967842
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yolandaz/flaskcars
-https://github.com/yolandaz/flaskcars
-Entry file: flaskcars/app.py
-Scanned: 2016-10-20 12:39:30.635491
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/genericpath.py
-
-PansFortress/flaskr
-https://github.com/PansFortress/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:39:33.164344
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-goodman1209/flaskrestserver
-https://github.com/goodman1209/flaskrestserver
-Entry file: flaskrestserver/hello.py
-Scanned: 2016-10-20 12:39:35.502716
-No vulnerabilities found.
-
-
-Ivicel/flasky
-https://github.com/Ivicel/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:39:36.024272
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-k0itsu/flasktaskr
-https://github.com/k0itsu/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:39:37.526739
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-atsk1618/flasko
-https://github.com/atsk1618/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-20 12:39:38.171906
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py
-
-penglee87/flaskblog
-https://github.com/penglee87/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:39:44.718946
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-Halcae/flaskapp
-https://github.com/Halcae/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:39:46.221858
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp.
-
-Kermit95/Flaskr
-https://github.com/Kermit95/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:39:47.732146
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-juniorkrvl/flasky
-https://github.com/juniorkrvl/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:39:48.234560
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-davbrink/flasktaskr
-https://github.com/davbrink/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:39:49.748498
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ptrees/flaskr
-https://github.com/ptrees/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:39:52.277398
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-langlangago/Flasky
-https://github.com/langlangago/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 12:40:00.784933
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jcue/flasktaskr
-https://github.com/jcue/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:40:02.324757
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-qhdong/flaskr
-https://github.com/qhdong/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:40:03.886849
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aksenovpb/flaskproject
-https://github.com/aksenovpb/flaskproject
-Entry file: None
-Scanned: 2016-10-20 12:40:04.392148
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ncmadhu/FlaskDemo
-https://github.com/ncmadhu/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 12:40:05.915488
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-LiKePAIN/FlaskStudy
-https://github.com/LiKePAIN/FlaskStudy
-Entry file: FlaskStudy/flaskr.py
-Scanned: 2016-10-20 12:40:06.426589
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-playscforever/flaskProject
-https://github.com/playscforever/flaskProject
-Entry file: flaskProject/helloFlask/app.py
-Scanned: 2016-10-20 12:40:06.984551
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MarkoArsenovic/FlaskAuth
-https://github.com/MarkoArsenovic/FlaskAuth
-Entry file: FlaskAuth/testapp/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 12:40:08.680996
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PythonWorkshop/TensorFlowFlask
-https://github.com/PythonWorkshop/TensorFlowFlask
-Entry file: TensorFlowFlask/main.py
-Scanned: 2016-10-20 12:40:13.074949
-Vulnerability 1:
-File: TensorFlowFlask/main.py
- > User input at line 48, trigger word ".data":
- filename = secure_filename(form.training_data.data.filename)
-Reassigned in:
- File: TensorFlowFlask/main.py
- > Line 52: dataframe = pd.read_csv('wine_quality/data/' + filename,sep=',')
- File: TensorFlowFlask/main.py
- > Line 55: filename = None
-File: TensorFlowFlask/main.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('test_data_upload.html',form=form, filename=filename)
-
-
-
-bigzhao/flask-wechat
-https://github.com/bigzhao/flask-wechat
-Entry file: flask-wechat/fenghuang/__init__.py
-Scanned: 2016-10-20 12:40:13.596893
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vishukamble/PythonFlask
-https://github.com/vishukamble/PythonFlask
-Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py
-Scanned: 2016-10-20 12:40:20.512298
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-szparag3/flask-blog
-https://github.com/szparag3/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:40:21.048800
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-ketanrk/flask_practice
-https://github.com/ketanrk/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 12:40:21.638103
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jdgwartney/flask-blueprint
-https://github.com/jdgwartney/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 12:40:27.148521
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cooleo/flask-cassandra
-https://github.com/cooleo/flask-cassandra
-Entry file: flask-cassandra/app/__init__.py
-Scanned: 2016-10-20 12:40:29.949112
-Vulnerability 1:
-File: flask-cassandra/app/models/app.py
- > User input at line 301, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-cassandra/app/models/app.py
- > Line 304: user = User(username=username)
- File: flask-cassandra/app/models/app.py
- > Line 307: session['id'] = user.id
- File: flask-cassandra/app/models/app.py
- > Line 309: user = current_user()
- File: flask-cassandra/app/models/app.py
- > Line 302: user = User.query.filter_by(username=username).first()
- File: flask-cassandra/app/models/app.py
- > Line 308: ret_MAYBE_FUNCTION_NAME = redirect('/')
-File: flask-cassandra/app/models/app.py
- > reaches line 310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',user=user)
-
-
-
-abhishekg785/flask-gevent
-https://github.com/abhishekg785/flask-gevent
-Entry file: flask-gevent/chatServer.py
-Scanned: 2016-10-20 12:40:31.581114
-No vulnerabilities found.
-
-
-lucilecoutouly/back-flask
-https://github.com/lucilecoutouly/back-flask
-Entry file: back-flask/back_nsa/app/__init__.py
-Scanned: 2016-10-20 12:40:32.230303
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-ggrumbley/flask_example
-https://github.com/ggrumbley/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:40:32.743171
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mehemken/generic-flask
-https://github.com/mehemken/generic-flask
-Entry file: generic-flask/app.py
-Scanned: 2016-10-20 12:40:34.066168
-No vulnerabilities found.
-
-
-Keita1/flask-blog
-https://github.com/Keita1/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:40:35.659438
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-ja8zyjits/redis-flask
-https://github.com/ja8zyjits/redis-flask
-Entry file: redis-flask/flask_app.py
-Scanned: 2016-10-20 12:40:36.960147
-Vulnerability 1:
-File: redis-flask/flask_app.py
- > User input at line 13, trigger word "get(":
- number = int(request.values.get('number'))
-Reassigned in:
- File: redis-flask/flask_app.py
- > Line 14: value = find_sum(number)
-File: redis-flask/flask_app.py
- > reaches line 15, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('sum_finder.html',sum_value=value)
-
-
-
-themikepearce/flask-blog
-https://github.com/themikepearce/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:40:38.521944
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Momingcoder/learn-flask
-https://github.com/Momingcoder/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:40:39.191785
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-greenapplepark/flask_docker
-https://github.com/greenapplepark/flask_docker
-Entry file: flask_docker/app/flaskEntry.py
-Scanned: 2016-10-20 12:40:45.502362
-No vulnerabilities found.
-
-
-karloku/beginners_flask
-https://github.com/karloku/beginners_flask
-Entry file: beginners_flask/application/__init__.py
-Scanned: 2016-10-20 12:40:47.964509
-No vulnerabilities found.
-
-
-s2tephen/flask-network
-https://github.com/s2tephen/flask-network
-Entry file: flask-network/app.py
-Scanned: 2016-10-20 12:40:49.269410
-No vulnerabilities found.
-
-
-julianparismorgan/flask_cellcounter
-https://github.com/julianparismorgan/flask_cellcounter
-Entry file: flask_cellcounter/cell-app.py
-Scanned: 2016-10-20 12:40:57.539620
-No vulnerabilities found.
-
-
-vigneshrajkumar/simple-flask
-https://github.com/vigneshrajkumar/simple-flask
-Entry file: simple-flask/simple.py
-Scanned: 2016-10-20 12:40:58.878222
-No vulnerabilities found.
-
-
-linkinshurik/api_flask
-https://github.com/linkinshurik/api_flask
-Entry file: api_flask/app/__init__.py
-Scanned: 2016-10-20 12:41:00.342849
-No vulnerabilities found.
-
-
-pranavbadami/damson-flask
-https://github.com/pranavbadami/damson-flask
-Entry file: damson-flask/damson.py
-Scanned: 2016-10-20 12:41:00.965343
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coding2000/flask_web
-https://github.com/coding2000/flask_web
-Entry file: flask_web/helloflask.py
-Scanned: 2016-10-20 12:41:02.544849
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py
-
-shihanng/appengine-flask
-https://github.com/shihanng/appengine-flask
-Entry file: appengine-flask/src/application/__init__.py
-Scanned: 2016-10-20 12:41:04.947795
-No vulnerabilities found.
-
-
-cristopher-rodrigues/phyton-flask
-https://github.com/cristopher-rodrigues/phyton-flask
-Entry file: None
-Scanned: 2016-10-20 12:41:05.523273
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alodavi/flask_blog
-https://github.com/alodavi/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:41:06.029213
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sharan-monikantan/hello-flask
-https://github.com/sharan-monikantan/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:41:06.629527
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-Mubbly/flask_test
-https://github.com/Mubbly/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:41:07.201226
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-asherkhb/flask-tutorial
-https://github.com/asherkhb/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:41:08.704733
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-awproksel/docker_flask
-https://github.com/awproksel/docker_flask
-Entry file: docker_flask/code/app.py
-Scanned: 2016-10-20 12:41:11.132480
-No vulnerabilities found.
-
-
-tigerisnotinwood/flask_wx
-https://github.com/tigerisnotinwood/flask_wx
-Entry file: flask_wx/run.py
-Scanned: 2016-10-20 12:41:12.656058
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sdzharkov/bitFlask
-https://github.com/sdzharkov/bitFlask
-Entry file: None
-Scanned: 2016-10-20 12:41:14.193960
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SverreHerland/flask-intro
-https://github.com/SverreHerland/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:41:14.712250
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-valexandersaulys/flask-ladder
-https://github.com/valexandersaulys/flask-ladder
-Entry file: flask-ladder/app/__init__.py
-Scanned: 2016-10-20 12:41:22.530051
-No vulnerabilities found.
-
-
-Subh1994/flask_demo
-https://github.com/Subh1994/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 12:41:23.050049
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zheins/portalFlask
-https://github.com/zheins/portalFlask
-Entry file: portalFlask/portalFlask.py
-Scanned: 2016-10-20 12:41:27.565466
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yvonnendutaw/flask-template
-https://github.com/yvonnendutaw/flask-template
-Entry file: None
-Scanned: 2016-10-20 12:41:29.102698
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yvonnendutaw/flask-template.
-
-devtye/learn-flask
-https://github.com/devtye/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:41:30.820754
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laerciosb/flask_challanges
-https://github.com/laerciosb/flask_challanges
-Entry file: flask_challanges/v2/app/core.py
-Scanned: 2016-10-20 12:41:32.339987
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-python-ning/jira_flask
-https://github.com/python-ning/jira_flask
-Entry file: jira_flask/jira.py
-Scanned: 2016-10-20 12:41:32.855275
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ricleal/TornadoFlask
-https://github.com/ricleal/TornadoFlask
-Entry file: TornadoFlask/flasky.py
-Scanned: 2016-10-20 12:41:34.295977
-No vulnerabilities found.
-
-
-ekozlowski/flask_demo
-https://github.com/ekozlowski/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 12:41:35.866200
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lucidfrontier45/flask-rethinkview
-https://github.com/lucidfrontier45/flask-rethinkview
-Entry file: flask-rethinkview/examples/main.py
-Scanned: 2016-10-20 12:41:37.193870
-No vulnerabilities found.
-
-
-chriskoh/intraday-flask
-https://github.com/chriskoh/intraday-flask
-Entry file: None
-Scanned: 2016-10-20 12:41:38.727176
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pouya-abbassi/rashapay-flask
-https://github.com/pouya-abbassi/rashapay-flask
-Entry file: rashapay-flask/main.py
-Scanned: 2016-10-20 12:41:40.257308
-No vulnerabilities found.
-
-
-c03rcion/flask-weather
-https://github.com/c03rcion/flask-weather
-Entry file: flask-weather/app.py
-Scanned: 2016-10-20 12:41:44.793706
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neoden/flask-filecache
-https://github.com/neoden/flask-filecache
-Entry file: flask-filecache/flask_filecache.py
-Scanned: 2016-10-20 12:41:48.238317
-No vulnerabilities found.
-
-
-lstmemery/flask-sqlalchemy
-https://github.com/lstmemery/flask-sqlalchemy
-Entry file: flask-sqlalchemy/run.py
-Scanned: 2016-10-20 12:41:48.765930
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-charoleizer/TDD-Flask
-https://github.com/charoleizer/TDD-Flask
-Entry file: TDD-Flask/fonts/py/WebService/app.py
-Scanned: 2016-10-20 12:41:57.399649
-No vulnerabilities found.
-
-
-botheredbybees/flask-rss
-https://github.com/botheredbybees/flask-rss
-Entry file: flask-rss/headlines.py
-Scanned: 2016-10-20 12:41:59.983068
-Vulnerability 1:
-File: flask-rss/headlines.py
- > User input at line 21, trigger word "get(":
- query = urllib.parse.unquote_plus(request.args.get('publication'))
-Reassigned in:
- File: flask-rss/headlines.py
- > Line 23: query = 'ABC Hobart'
- File: flask-rss/headlines.py
- > Line 24: feed = feedparser.parse(RSS_FEEDS[query])
- File: flask-rss/headlines.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = 'no news is good news'
-File: flask-rss/headlines.py
- > reaches line 26, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',articles=feed['entries'], header=query, rssFeeds=RSS_FEEDS, weather=weather)
-
-
-
-coding2000/flask_base
-https://github.com/coding2000/flask_base
-Entry file: flask_base/flask_01.py
-Scanned: 2016-10-20 12:42:01.254845
-No vulnerabilities found.
-
-
-afrancisboeuf/workshop_flask
-https://github.com/afrancisboeuf/workshop_flask
-Entry file: workshop_flask/1_get_started/6.py
-Scanned: 2016-10-20 12:42:01.944855
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: workshop_flask/1_get_started/venv/lib/python2.7/genericpath.py
-
-tyfulcrum/Flask_Demo
-https://github.com/tyfulcrum/Flask_Demo
-Entry file: Flask_Demo/hello.py
-Scanned: 2016-10-20 12:42:04.248927
-No vulnerabilities found.
-
-
-chenkaiyu1997/flask-learning
-https://github.com/chenkaiyu1997/flask-learning
-Entry file: flask-learning/app/__init__.py
-Scanned: 2016-10-20 12:42:05.564277
-No vulnerabilities found.
-
-
-tpugh/flask_sample
-https://github.com/tpugh/flask_sample
-Entry file: flask_sample/app_hello.py
-Scanned: 2016-10-20 12:42:06.100156
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-schenkd/flask-core
-https://github.com/schenkd/flask-core
-Entry file: flask-core/app/__init__.py
-Scanned: 2016-10-20 12:42:15.092396
-No vulnerabilities found.
-
-
-sasakalaba/flask_project
-https://github.com/sasakalaba/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 12:42:15.952186
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jorgezepeda/flask-hello-world
-https://github.com/jorgezepeda/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:42:16.503828
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-rajarshi98/giftsaver
-https://github.com/rajarshi98/giftsaver
-Entry file: giftsaver/app.py
-Scanned: 2016-10-20 12:42:17.024738
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-newkdukem/flask4e
-https://github.com/newkdukem/flask4e
-Entry file: flask4e/headlines.py
-Scanned: 2016-10-20 12:42:18.846224
-No vulnerabilities found.
-
-
-fmlvn/quiz
-https://github.com/fmlvn/quiz
-Entry file: quiz/quiz/__init__.py
-Scanned: 2016-10-20 12:42:20.598626
-No vulnerabilities found.
-
-
-top2topii/FlaskServiceWin32
-https://github.com/top2topii/FlaskServiceWin32
-Entry file: FlaskServiceWin32/myapp.py
-Scanned: 2016-10-20 12:42:21.909786
-No vulnerabilities found.
-
-
-jpvillavicencio/FlaskDemoAPI
-https://github.com/jpvillavicencio/FlaskDemoAPI
-Entry file: FlaskDemoAPI/app.py
-Scanned: 2016-10-20 12:42:23.454295
-No vulnerabilities found.
-
-
-cdumay/flask-graylog-bundle
-https://github.com/cdumay/flask-graylog-bundle
-Entry file: flask-graylog-bundle/examples/auth.py
-Scanned: 2016-10-20 12:42:31.236857
-No vulnerabilities found.
-
-
-ankitkmishra/flask_microblog_tutorial
-https://github.com/ankitkmishra/flask_microblog_tutorial
-Entry file: None
-Scanned: 2016-10-20 12:42:40.700851
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Karthik-Ramvijay/Flask_API-PROJECT
-https://github.com/Karthik-Ramvijay/Flask_API-PROJECT
-Entry file: None
-Scanned: 2016-10-20 12:42:41.694340
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Karthik-Ramvijay/Flask_API-PROJECT.
-
-themese/flask
-https://github.com/themese/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:42:43.763381
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-bTanya/flask
-https://github.com/bTanya/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:42:44.338029
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-rafaelhenrique/flask_tutorial
-https://github.com/rafaelhenrique/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 12:42:45.315602
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sousic/flask_study
-https://github.com/sousic/flask_study
-Entry file: flask_study/views.py
-Scanned: 2016-10-20 12:42:47.324264
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-davidgomes/flask-pygood
-https://github.com/davidgomes/flask-pygood
-Entry file: flask-pygood/flask_pygood/test/demo.py
-Scanned: 2016-10-20 12:42:49.740768
-No vulnerabilities found.
-
-
-goodman1209/flaskrestserver
-https://github.com/goodman1209/flaskrestserver
-Entry file: flaskrestserver/hello.py
-Scanned: 2016-10-20 12:42:52.063620
-No vulnerabilities found.
-
-
-marvinmarnold/flasky
-https://github.com/marvinmarnold/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:42:59.608684
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bassel-meet/flasky
-https://github.com/bassel-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:01.128967
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sima16-meet/flasky
-https://github.com/sima16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:02.643651
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tamar16-meet/flasky
-https://github.com/tamar16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:04.163227
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alma16-meet/flasky
-https://github.com/alma16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:05.696864
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-guy16-meet/flasky
-https://github.com/guy16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:06.225371
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aixiamomo/flasky
-https://github.com/aixiamomo/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:06.739505
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dina16-meet/flasky
-https://github.com/dina16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:16.260212
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-orr16-meet/flasky
-https://github.com/orr16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:16.780149
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-roni16-meet/flasky
-https://github.com/roni16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:17.283497
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rama16-meet/flasky
-https://github.com/rama16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:17.789628
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yuyanqiuqiu/flaskblog
-https://github.com/yuyanqiuqiu/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:43:18.315558
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-wwpika/flaskww
-https://github.com/wwpika/flaskww
-Entry file: flaskww/app/__init__.py
-Scanned: 2016-10-20 12:43:25.908817
-Vulnerability 1:
-File: flaskww/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/main/views.py
- > Line 32: posts = pagination.items
- File: flaskww/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskww/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskww/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 22: show_followed = False
- File: flaskww/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskww/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskww/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/main/views.py
- > Line 45: posts = pagination.items
-File: flaskww/app/main/views.py
- > reaches line 46, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskww/app/main/views.py
- > User input at line 103, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 105: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskww/app/main/views.py
- > Line 107: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/main/views.py
- > Line 111: comments = pagination.items
- File: flaskww/app/main/views.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskww/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskww/app/main/views.py
- > User input at line 168, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 169: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskww/app/main/views.py
- > Line 173: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskww/app/main/views.py
- > Line 167: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskww/app/main/views.py
- > reaches line 175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskww/app/main/views.py
- > User input at line 185, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 186: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskww/app/main/views.py
- > Line 190: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskww/app/main/views.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskww/app/main/views.py
- > reaches line 192, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskww/app/main/views.py
- > User input at line 214, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/main/views.py
- > Line 215: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/main/views.py
- > Line 219: comments = pagination.items
-File: flaskww/app/main/views.py
- > reaches line 220, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flaskww/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('get', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/users.py
- > Line 18: posts = pagination.items
- File: flaskww/app/api_1_0/users.py
- > Line 19: prev = None
- File: flaskww/app/api_1_0/users.py
- > Line 22: next = None
-File: flaskww/app/api_1_0/users.py
- > reaches line 21, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flaskww/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('get', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/users.py
- > Line 18: posts = pagination.items
- File: flaskww/app/api_1_0/users.py
- > Line 19: prev = None
- File: flaskww/app/api_1_0/users.py
- > Line 22: next = None
-File: flaskww/app/api_1_0/users.py
- > reaches line 24, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flaskww/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('get', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/users.py
- > Line 18: posts = pagination.items
- File: flaskww/app/api_1_0/users.py
- > Line 19: prev = None
- File: flaskww/app/api_1_0/users.py
- > Line 22: next = None
-File: flaskww/app/api_1_0/users.py
- > reaches line 25, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flaskww/app/api_1_0/users.py
- > User input at line 35, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/users.py
- > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False)
- File: flaskww/app/api_1_0/users.py
- > Line 40: posts = pagination.items
- File: flaskww/app/api_1_0/users.py
- > Line 41: prev = None
- File: flaskww/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskww/app/api_1_0/users.py
- > reaches line 43, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flaskww/app/api_1_0/users.py
- > User input at line 35, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/users.py
- > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False)
- File: flaskww/app/api_1_0/users.py
- > Line 40: posts = pagination.items
- File: flaskww/app/api_1_0/users.py
- > Line 41: prev = None
- File: flaskww/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskww/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flaskww/app/api_1_0/users.py
- > User input at line 35, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/users.py
- > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False)
- File: flaskww/app/api_1_0/users.py
- > Line 40: posts = pagination.items
- File: flaskww/app/api_1_0/users.py
- > Line 41: prev = None
- File: flaskww/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskww/app/api_1_0/users.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flaskww/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskww/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskww/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskww/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flaskww/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskww/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskww/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskww/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flaskww/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskww/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskww/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskww/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flaskww/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskww/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskww/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskww/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flaskww/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskww/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskww/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskww/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flaskww/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskww/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskww/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskww/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flaskww/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskww/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskww/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskww/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flaskww/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskww/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskww/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskww/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flaskww/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskww/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskww/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskww/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskww/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskww/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-yasmeen16-meet/flasky
-https://github.com/yasmeen16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:26.450986
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-amjad16-meet/flasky
-https://github.com/amjad16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:26.963609
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elias16-meet/flasky
-https://github.com/elias16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:27.471562
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bluethon/flasky
-https://github.com/bluethon/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:28.984505
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-teodorgarzdin/Flaskr
-https://github.com/teodorgarzdin/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:43:30.569491
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-langlangago/Flasky
-https://github.com/langlangago/Flasky
-Entry file: Flasky/app/__init__.py
-Scanned: 2016-10-20 12:43:32.077585
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aksenovpb/flaskproject
-https://github.com/aksenovpb/flaskproject
-Entry file: None
-Scanned: 2016-10-20 12:43:41.611862
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pengshiqi/Flaskr
-https://github.com/pengshiqi/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:43:42.123893
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stylianos-kampakis/flasktaskr
-https://github.com/stylianos-kampakis/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:43:42.630146
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yara16-meet/flasky
-https://github.com/yara16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:44.140546
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nimala16-meet/Flasky-
-https://github.com/nimala16-meet/Flasky-
-Entry file: None
-Scanned: 2016-10-20 12:43:44.664520
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nimala16-meet/Flasky-.
-
-shiran16-meet/flasky
-https://github.com/shiran16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:45.163682
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fadi16-meet/flasky
-https://github.com/fadi16-meet/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:43:45.677391
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chijie/flaskdemo
-https://github.com/chijie/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 12:43:46.196597
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-decherd/flasktaskr
-https://github.com/decherd/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:43:47.706433
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arsalanam/flasktasker7
-https://github.com/arsalanam/flasktasker7
-Entry file: flasktasker7/project/__init__.py
-Scanned: 2016-10-20 12:43:50.179698
-No vulnerabilities found.
-
-
-LiKePAIN/FlaskStudy
-https://github.com/LiKePAIN/FlaskStudy
-Entry file: FlaskStudy/flaskr.py
-Scanned: 2016-10-20 12:43:51.702394
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Recad/FlaskSO
-https://github.com/Recad/FlaskSO
-Entry file: FlaskSO/Flask-vbox-so.py
-Scanned: 2016-10-20 12:44:01.149960
-No vulnerabilities found.
-
-
-NateLove/FlaskTest
-https://github.com/NateLove/FlaskTest
-Entry file: None
-Scanned: 2016-10-20 12:44:01.654477
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/NateLove/FlaskTest.
-
-playscforever/flaskProject
-https://github.com/playscforever/flaskProject
-Entry file: flaskProject/helloFlask/app.py
-Scanned: 2016-10-20 12:44:03.174353
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-winray/FlaskNote
-https://github.com/winray/FlaskNote
-Entry file: FlaskNote/microblog/app/__init__.py
-Scanned: 2016-10-20 12:44:05.609045
-No vulnerabilities found.
-
-
-anilkunchalaece/flaskForm
-https://github.com/anilkunchalaece/flaskForm
-Entry file: flaskForm/flaskApp.py
-Scanned: 2016-10-20 12:44:06.135531
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bigzhao/flask-wechat
-https://github.com/bigzhao/flask-wechat
-Entry file: flask-wechat/fenghuang/__init__.py
-Scanned: 2016-10-20 12:44:07.127286
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-CaveMike/flask_rest
-https://github.com/CaveMike/flask_rest
-Entry file: None
-Scanned: 2016-10-20 12:44:16.704173
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/CaveMike/flask_rest.
-
-wlingxiao/HelloFlask
-https://github.com/wlingxiao/HelloFlask
-Entry file: HelloFlask/src/application.py
-Scanned: 2016-10-20 12:44:17.217408
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-juliocesarfort/flask-demos
-https://github.com/juliocesarfort/flask-demos
-Entry file: flask-demos/json-contentsniffing.py
-Scanned: 2016-10-20 12:44:18.534335
-No vulnerabilities found.
-
-
-Keita1/flask-blog
-https://github.com/Keita1/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:44:19.083853
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Gherero/analitika-flask
-https://github.com/Gherero/analitika-flask
-Entry file: analitika-flask/app/main.py
-Scanned: 2016-10-20 12:44:26.029344
-No vulnerabilities found.
-
-
-ooldDoctor/Flask-Shell
-https://github.com/ooldDoctor/Flask-Shell
-Entry file: Flask-Shell/server.py
-Scanned: 2016-10-20 12:44:27.463294
-No vulnerabilities found.
-
-
-opentracing-contrib/python-flask
-https://github.com/opentracing-contrib/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 12:44:28.480994
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rysev-a/flask-blueprints
-https://github.com/rysev-a/flask-blueprints
-Entry file: flask-blueprints/ch05/application/__init__.py
-Scanned: 2016-10-20 12:44:30.044760
-No vulnerabilities found.
-
-
-jen8/Flask-Intro
-https://github.com/jen8/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-20 12:44:30.616522
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-keik/flask-tutorial
-https://github.com/keik/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:44:31.118296
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-evereux/flask_template
-https://github.com/evereux/flask_template
-Entry file: None
-Scanned: 2016-10-20 12:44:42.131065
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/evereux/flask_template.
-
-Jareechang/flask-basic
-https://github.com/Jareechang/flask-basic
-Entry file: flask-basic/templates.py
-Scanned: 2016-10-20 12:44:43.631358
-No vulnerabilities found.
-
-
-alodavi/flask_blog
-https://github.com/alodavi/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:44:44.145167
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sdzharkov/bitFlask
-https://github.com/sdzharkov/bitFlask
-Entry file: None
-Scanned: 2016-10-20 12:44:44.661103
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SverreHerland/flask-intro
-https://github.com/SverreHerland/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:44:45.152997
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-doblel/Flask-Hooker
-https://github.com/doblel/Flask-Hooker
-Entry file: Flask-Hooker/test.py
-Scanned: 2016-10-20 12:44:45.668243
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ainjii/20160719_flask
-https://github.com/ainjii/20160719_flask
-Entry file: 20160719_flask/nice.py
-Scanned: 2016-10-20 12:44:47.013837
-No vulnerabilities found.
-
-
-whitneybelba/Flask-Intro
-https://github.com/whitneybelba/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-20 12:44:47.525350
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ahmsolo/flask-intro
-https://github.com/ahmsolo/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:44:48.020913
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aaron4444/master_flask
-https://github.com/aaron4444/master_flask
-Entry file: master_flask/main.py
-Scanned: 2016-10-20 12:44:50.446640
-No vulnerabilities found.
-
-
-scotteggs/flask_tutor
-https://github.com/scotteggs/flask_tutor
-Entry file: flask_tutor/tmp/main.py
-Scanned: 2016-10-20 12:44:51.972790
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-v2hey/flask-blog
-https://github.com/v2hey/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:45:00.519408
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-defhook/flask-blog
-https://github.com/defhook/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:45:02.063785
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-boyxiaolong/flask_blog
-https://github.com/boyxiaolong/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:45:03.590936
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-n4s/flask-test
-https://github.com/n4s/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:45:05.131694
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-ricleal/TornadoFlask
-https://github.com/ricleal/TornadoFlask
-Entry file: TornadoFlask/flasky.py
-Scanned: 2016-10-20 12:45:07.478306
-No vulnerabilities found.
-
-
-apastewk/flask-intro
-https://github.com/apastewk/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:08.028870
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-thepomeranian/flask-intro
-https://github.com/thepomeranian/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:08.529170
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ibhan88/Flask-Intro
-https://github.com/ibhan88/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-20 12:45:17.092609
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-eflagg/flask-intro
-https://github.com/eflagg/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:17.605847
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MariaAngela24/flask-intro
-https://github.com/MariaAngela24/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:18.114604
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-13923858795/flask-blog
-https://github.com/13923858795/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:45:20.155488
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-shankj3/flask_version
-https://github.com/shankj3/flask_version
-Entry file: flask_version/render_with_jinja/render_with_jinja.py
-Scanned: 2016-10-20 12:45:26.708219
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neldevfull/flask_api
-https://github.com/neldevfull/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 12:45:28.236970
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tarzioo/flask-intro
-https://github.com/tarzioo/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:28.753585
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lingsitu1290/Flask-Intro
-https://github.com/lingsitu1290/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-20 12:45:29.267043
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sarahdwyer/flask-intro
-https://github.com/sarahdwyer/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:30.823837
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-decherd/flask-blog
-https://github.com/decherd/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:45:31.372646
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-thesiti92/flask_example
-https://github.com/thesiti92/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:45:32.895599
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rayramsay/flask-intro
-https://github.com/rayramsay/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:45:42.411092
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aig-/flask_google
-https://github.com/aig-/flask_google
-Entry file: flask_google/app.py
-Scanned: 2016-10-20 12:45:43.745443
-Vulnerability 1:
-File: flask_google/app.py
- > User input at line 93, trigger word "get(":
- response = 'state''status'task.statetask.info.get('status', '')
-Reassigned in:
- File: flask_google/app.py
- > Line 88: response = 'state''status'task.state'Pending...'
- File: flask_google/app.py
- > Line 101: response = 'state''status'task.statestr(task.info)
-File: flask_google/app.py
- > reaches line 105, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-yfalcon8/Flask_Intro
-https://github.com/yfalcon8/Flask_Intro
-Entry file: Flask_Intro/nice.py
-Scanned: 2016-10-20 12:45:44.366364
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Intro/env/lib/python2.7/genericpath.py
-
-chriskoh/intraday-flask
-https://github.com/chriskoh/intraday-flask
-Entry file: None
-Scanned: 2016-10-20 12:45:44.889940
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-laylasian/poke-flask
-https://github.com/laylasian/poke-flask
-Entry file: poke-flask/poke/app.py
-Scanned: 2016-10-20 12:45:46.539379
-No vulnerabilities found.
-
-
-YuliYaSokolova/home_flask
-https://github.com/YuliYaSokolova/home_flask
-Entry file: home_flask/__init__.py
-Scanned: 2016-10-20 12:45:47.749711
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: home_flask/.envi/lib/python3.4/struct.py
-
-alodavi/flask_simple
-https://github.com/alodavi/flask_simple
-Entry file: flask_simple/hello.py
-Scanned: 2016-10-20 12:45:49.061460
-No vulnerabilities found.
-
-
-cdagli/flask-blueprint
-https://github.com/cdagli/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 12:45:49.591509
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-charoleizer/TDD-Flask
-https://github.com/charoleizer/TDD-Flask
-Entry file: TDD-Flask/fonts/py/WebService/app.py
-Scanned: 2016-10-20 12:45:57.223917
-No vulnerabilities found.
-
-
-thechutrain/flask-tutorial
-https://github.com/thechutrain/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:46:01.279919
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-RetardedPigeon/flask_project
-https://github.com/RetardedPigeon/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 12:46:03.105549
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-radajin/flask
-https://github.com/radajin/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:46:07.563774
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-suryadana/Flask
-https://github.com/suryadana/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:46:08.074606
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Jzengzhan/Flask
-https://github.com/Jzengzhan/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:46:08.606573
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-crazw/flask
-https://github.com/crazw/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:46:17.209416
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-mwongeraE/Flask
-https://github.com/mwongeraE/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:46:17.747337
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TheNixNinja/flask-boilerplate
-https://github.com/TheNixNinja/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 12:46:18.244968
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/TheNixNinja/flask-boilerplate.
-
-clef/flask-nameko
-https://github.com/clef/flask-nameko
-Entry file: flask-nameko/tests/test_flask_pooled_cluster_rpc_proxy.py
-Scanned: 2016-10-20 12:46:20.799607
-No vulnerabilities found.
-
-
-weihg/flaskr
-https://github.com/weihg/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:46:26.795218
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Dasmemes/flasky
-https://github.com/Dasmemes/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:46:28.291317
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dhan12/Flaskblog
-https://github.com/dhan12/Flaskblog
-Entry file: Flaskblog/run.py
-Scanned: 2016-10-20 12:46:33.465937
-Vulnerability 1:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 42, trigger word "form[":
- searchText = request.form['search']
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 54: searchText = request.args.get('search', '')
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-Vulnerability 2:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 54, trigger word "get(":
- searchText = request.args.get('search', '')
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 42: searchText = request.form['search']
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-Vulnerability 3:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 42, trigger word "form[":
- searchText = request.form['search']
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 54: searchText = request.args.get('search', '')
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-Vulnerability 4:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 54, trigger word "get(":
- searchText = request.args.get('search', '')
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 42: searchText = request.form['search']
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-
-
-SachinMaharana/flaskblog
-https://github.com/SachinMaharana/flaskblog
-Entry file: flaskblog/flat.py
-Scanned: 2016-10-20 12:46:34.042139
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py
-
-linjialongmao/flasky
-https://github.com/linjialongmao/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:46:34.546066
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-algalanb/flaskapp
-https://github.com/algalanb/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:46:35.055101
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp.
-
-sinwar/flaskr
-https://github.com/sinwar/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:46:35.569506
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-igoroppo6/flasky
-https://github.com/igoroppo6/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:46:43.085888
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-evanzd/flasky
-https://github.com/evanzd/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:46:43.611296
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Dawson-G/flaskwebapp
-https://github.com/Dawson-G/flaskwebapp
-Entry file: flaskwebapp/main.py
-Scanned: 2016-10-20 12:46:45.945875
-No vulnerabilities found.
-
-
-diazdeentr/flasktest
-https://github.com/diazdeentr/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 12:46:46.453466
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mtlevine0/FlaskPhoto
-https://github.com/mtlevine0/FlaskPhoto
-Entry file: FlaskPhoto/flaskphoto.py
-Scanned: 2016-10-20 12:46:50.920639
-No vulnerabilities found.
-
-
-TitledPythonFile/FlaskItems
-https://github.com/TitledPythonFile/FlaskItems
-Entry file: FlaskItems/app/__init__.py
-Scanned: 2016-10-20 12:46:51.436263
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sT00ne/FlaskMega
-https://github.com/sT00ne/FlaskMega
-Entry file: FlaskMega/app/__init__.py
-Scanned: 2016-10-20 12:46:55.254660
-No vulnerabilities found.
-
-
-dedystyawan/flask2
-https://github.com/dedystyawan/flask2
-Entry file: flask2/app.py
-Scanned: 2016-10-20 12:46:55.790661
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laketiticaca/FlaskApp
-https://github.com/laketiticaca/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:46:56.362177
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yipersevere/FlaskTutorial
-https://github.com/yipersevere/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 12:46:58.359207
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kerol/flask-utils
-https://github.com/kerol/flask-utils
-Entry file: flask-utils/logger.py
-Scanned: 2016-10-20 12:47:02.843333
-No vulnerabilities found.
-
-
-jk34/Blog_Flask
-https://github.com/jk34/Blog_Flask
-Entry file: Blog_Flask/app.py
-Scanned: 2016-10-20 12:47:03.492811
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Blog_Flask/lib/python2.7/genericpath.py
-
-Wangbicong/flask-newspaper
-https://github.com/Wangbicong/flask-newspaper
-Entry file: flask-newspaper/app/__init__.py
-Scanned: 2016-10-20 12:47:06.479637
-Vulnerability 1:
-File: flask-newspaper/app/main/views.py
- > User input at line 29, trigger word "get(":
- tab = request.args.get('tab')
-Reassigned in:
- File: flask-newspaper/app/main/views.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = redirect('/login/')
- File: flask-newspaper/app/main/views.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = render_template('news.html',news_data=news_data)
- File: flask-newspaper/app/main/views.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('index.html',news_data=news_data, user_data=user_data, tab_mark='user')
- File: flask-newspaper/app/main/views.py
- > Line 67: ret_MAYBE_FUNCTION_NAME = render_template('record.html',record_data=record_data)
-File: flask-newspaper/app/main/views.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',news_data=news_data, user_data=user_data, tab_mark=tab)
-
-
-
-anupam0601/flask-REST
-https://github.com/anupam0601/flask-REST
-Entry file: None
-Scanned: 2016-10-20 12:47:06.989629
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/anupam0601/flask-REST.
-
-vanalex/restful-flask
-https://github.com/vanalex/restful-flask
-Entry file: restful-flask/restful-flask.py
-Scanned: 2016-10-20 12:47:09.316497
-No vulnerabilities found.
-
-
-chicaum/flask_blog
-https://github.com/chicaum/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:47:09.855455
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hicris/flask-note
-https://github.com/hicris/flask-note
-Entry file: flask-note/note.py
-Scanned: 2016-10-20 12:47:17.894060
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Faoxis/flask-microblog
-https://github.com/Faoxis/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:47:18.411395
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-evereux/flask_template
-https://github.com/evereux/flask_template
-Entry file: None
-Scanned: 2016-10-20 12:47:18.909553
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/evereux/flask_template.
-
-yyoowwllgit/flask_agent
-https://github.com/yyoowwllgit/flask_agent
-Entry file: flask_agent/flask_agent_server/agent_server.py
-Scanned: 2016-10-20 12:47:20.417108
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AndrewSmiley/flask-demo
-https://github.com/AndrewSmiley/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:47:21.928663
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewSmiley/flask-demo.
-
-volny/flask-openid
-https://github.com/volny/flask-openid
-Entry file: flask-openid/app/__init__.py
-Scanned: 2016-10-20 12:47:29.906713
-No vulnerabilities found.
-
-
-brianbrittain/flask-blog
-https://github.com/brianbrittain/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:47:30.470485
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-broschke/flask_api
-https://github.com/broschke/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 12:47:35.031682
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-welserjr/Flask_Recaptcha
-https://github.com/welserjr/Flask_Recaptcha
-Entry file: Flask_Recaptcha/app.py
-Scanned: 2016-10-20 12:47:36.471597
-Vulnerability 1:
-File: Flask_Recaptcha/app.py
- > User input at line 36, trigger word "get(":
- comments = session.get('comments', [])
-File: Flask_Recaptcha/app.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form)
-
-
-
-jearnest88/flask_practice
-https://github.com/jearnest88/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 12:47:37.222152
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cbenderust/flask_dev
-https://github.com/cbenderust/flask_dev
-Entry file: flask_dev/flaskr/flaskr_app/__init__.py
-Scanned: 2016-10-20 12:47:37.749989
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scagle/Flask-Website
-https://github.com/scagle/Flask-Website
-Entry file: Flask-Website/hello.py
-Scanned: 2016-10-20 12:47:44.070112
-No vulnerabilities found.
-
-
-jfcorsini/testing-flask
-https://github.com/jfcorsini/testing-flask
-Entry file: None
-Scanned: 2016-10-20 12:47:44.614902
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-josenavarro-famoco/flask-pg
-https://github.com/josenavarro-famoco/flask-pg
-Entry file: flask-pg/pogo/ext_api.py
-Scanned: 2016-10-20 12:47:45.231387
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-apjanco/flask_blog
-https://github.com/apjanco/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:47:47.234737
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChaosSoong/python_flask
-https://github.com/ChaosSoong/python_flask
-Entry file: None
-Scanned: 2016-10-20 12:47:51.774989
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChaosSoong/python_flask.
-
-mwave1239/Flask_Tutorials
-https://github.com/mwave1239/Flask_Tutorials
-Entry file: Flask_Tutorials/registration_form/server.py
-Scanned: 2016-10-20 12:47:52.467370
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorials/registration_form/venv/lib/python2.7/genericpath.py
-
-yehiaa/flask-play
-https://github.com/yehiaa/flask-play
-Entry file: flask-play/app.py
-Scanned: 2016-10-20 12:47:56.840940
-No vulnerabilities found.
-
-
-tleskin/microblog-flask
-https://github.com/tleskin/microblog-flask
-Entry file: None
-Scanned: 2016-10-20 12:47:57.846530
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ecfairle/flask_site
-https://github.com/ecfairle/flask_site
-Entry file: flask_site/mysite.py
-Scanned: 2016-10-20 12:47:58.361485
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shankj3/flask_version
-https://github.com/shankj3/flask_version
-Entry file: flask_version/render_with_jinja/render_with_jinja.py
-Scanned: 2016-10-20 12:48:02.893459
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neldevfull/flask_api
-https://github.com/neldevfull/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 12:48:04.900258
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lanyuan27/flask-web
-https://github.com/lanyuan27/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 12:48:07.414346
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bjgill/flask-testing
-https://github.com/bjgill/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-20 12:48:08.918814
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-guoweikuang/flask-hello
-https://github.com/guoweikuang/flask-hello
-Entry file: flask-hello/hello.py
-Scanned: 2016-10-20 12:48:10.463519
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-aiden0z/Flask-Thriftclient
-https://github.com/aiden0z/Flask-Thriftclient
-Entry file: Flask-Thriftclient/tests/thriftclient.py
-Scanned: 2016-10-20 12:48:12.776192
-No vulnerabilities found.
-
-
-hputiprawan2/flask-aprt
-https://github.com/hputiprawan2/flask-aprt
-Entry file: flask-aprt/app.py
-Scanned: 2016-10-20 12:48:18.394698
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-aprt/venv/lib/python2.7/genericpath.py
-
-datasciencemonkey/flask_test
-https://github.com/datasciencemonkey/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:48:18.983365
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KittuJain/explore_Flask
-https://github.com/KittuJain/explore_Flask
-Entry file: explore_Flask/Hello.py
-Scanned: 2016-10-20 12:48:20.307927
-No vulnerabilities found.
-
-
-c75/flask-blueprint
-https://github.com/c75/flask-blueprint
-Entry file: flask-blueprint/api/__init__.py
-Scanned: 2016-10-20 12:48:20.821687
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-darbik/flask_fun
-https://github.com/darbik/flask_fun
-Entry file: flask_fun/blog/flaskr.py
-Scanned: 2016-10-20 12:48:22.370470
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-NujjLTD/nujjWebsiteNew
-https://github.com/NujjLTD/nujjWebsiteNew
-Entry file: None
-Scanned: 2016-10-20 12:48:29.393390
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pengxy8/TimeManager
-https://github.com/pengxy8/TimeManager
-Entry file: None
-Scanned: 2016-10-20 12:48:30.949759
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pengxy8/TimeManager.
-
-vennyk/flask-hello-world
-https://github.com/vennyk/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:48:35.545209
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-saifulazad/FlaskLargeApp
-https://github.com/saifulazad/FlaskLargeApp
-Entry file: FlaskLargeApp/run.py
-Scanned: 2016-10-20 12:48:38.616659
-No vulnerabilities found.
-
-
-jpvillavicencio/FlaskSQLAlchemyAPI
-https://github.com/jpvillavicencio/FlaskSQLAlchemyAPI
-Entry file: FlaskSQLAlchemyAPI/app.py
-Scanned: 2016-10-20 12:48:39.942593
-No vulnerabilities found.
-
-
-bradleygolden/cookiecutter-flaskrestful-barebones
-https://github.com/bradleygolden/cookiecutter-flaskrestful-barebones
-Entry file: cookiecutter-flaskrestful-barebones/{{cookiecutter.project_name}}/app.py
-Scanned: 2016-10-20 12:48:40.477231
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-HiiYL/vision-flask-demo
-https://github.com/HiiYL/vision-flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:48:44.021187
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/HiiYL/vision-flask-demo.
-
-yfalcon8/Project_Tracker_Flask
-https://github.com/yfalcon8/Project_Tracker_Flask
-Entry file: Project_Tracker_Flask/hackbright-web.py
-Scanned: 2016-10-20 12:48:45.548444
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-myhro/flask-gunicorn-example
-https://github.com/myhro/flask-gunicorn-example
-Entry file: flask-gunicorn-example/web.py
-Scanned: 2016-10-20 12:48:46.859582
-No vulnerabilities found.
-
-
-brettlangdon/cookiecutter-flask-app
-https://github.com/brettlangdon/cookiecutter-flask-app
-Entry file: cookiecutter-flask-app/{{cookiecutter.project_name}}/{{cookiecutter.project_name}}/__init__.py
-Scanned: 2016-10-20 12:48:52.408456
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-heratyian/flask-cat-tinder
-https://github.com/heratyian/flask-cat-tinder
-Entry file: flask-cat-tinder/app.py
-Scanned: 2016-10-20 12:48:54.620762
-No vulnerabilities found.
-
-
-brevno/test_pg_flask
-https://github.com/brevno/test_pg_flask
-Entry file: test_pg_flask/app/__init__.py
-Scanned: 2016-10-20 12:48:56.994117
-Vulnerability 1:
-File: test_pg_flask/app/views.py
- > User input at line 20, trigger word "form[":
- user = User.query.get_or_404(request.form['id'])
-Reassigned in:
- File: test_pg_flask/app/views.py
- > Line 25: user = User(request.form.to_dict())
-File: test_pg_flask/app/views.py
- > reaches line 28, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify([user.as_dict()])
-
-
-
-yfalcon8/Flask_Intro_Lab
-https://github.com/yfalcon8/Flask_Intro_Lab
-Entry file: Flask_Intro_Lab/nice.py
-Scanned: 2016-10-20 12:48:58.305792
-No vulnerabilities found.
-
-
-yfalcon8/Flask_Job_Application
-https://github.com/yfalcon8/Flask_Job_Application
-Entry file: Flask_Job_Application/application.py
-Scanned: 2016-10-20 12:48:59.600890
-No vulnerabilities found.
-
-
-mwave1239/MySQL-Flask-Examples
-https://github.com/mwave1239/MySQL-Flask-Examples
-Entry file: MySQL-Flask-Examples/friends/server.py
-Scanned: 2016-10-20 12:49:07.148732
-No vulnerabilities found.
-
-
-jksutow/flask_login_reg
-https://github.com/jksutow/flask_login_reg
-Entry file: flask_login_reg/login.py
-Scanned: 2016-10-20 12:49:07.876145
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-FromZeus/python_flask_learning
-https://github.com/FromZeus/python_flask_learning
-Entry file: python_flask_learning/lesson-02/app/__init__.py
-Scanned: 2016-10-20 12:49:08.398591
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-knalavadi/project-tracker-flask-felowship
-https://github.com/knalavadi/project-tracker-flask-felowship
-Entry file: project-tracker-flask-felowship/hackbright-web.py
-Scanned: 2016-10-20 12:49:08.900118
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ssmores/20160726_project_tracker_flask
-https://github.com/ssmores/20160726_project_tracker_flask
-Entry file: 20160726_project_tracker_flask/hackbright-web.py
-Scanned: 2016-10-20 12:49:09.414637
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-polarisc8t/HB---project_tracker_flask
-https://github.com/polarisc8t/HB---project_tracker_flask
-Entry file: HB---project_tracker_flask/hackbright-web.py
-Scanned: 2016-10-20 12:49:09.933775
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jen8/Project-Tracker-Flask
-https://github.com/jen8/Project-Tracker-Flask
-Entry file: Project-Tracker-Flask/hackbright-web.py
-Scanned: 2016-10-20 12:49:10.445686
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ElizabethLane/HB-flask-sequel-exercise
-https://github.com/ElizabethLane/HB-flask-sequel-exercise
-Entry file: HB-flask-sequel-exercise/hackbright-web.py
-Scanned: 2016-10-20 12:49:11.964703
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jeanhl/HB_SQL_Flask
-https://github.com/jeanhl/HB_SQL_Flask
-Entry file: HB_SQL_Flask/hackbright-web.py
-Scanned: 2016-10-20 12:49:18.499255
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-feistiller/LearnPythonFlask
-https://github.com/feistiller/LearnPythonFlask
-Entry file: LearnPythonFlask/Demo1HelloWorld.py
-Scanned: 2016-10-20 12:49:19.847159
-Vulnerability 1:
-File: LearnPythonFlask/Demo4WtfHelloWorld.py
- > User input at line 18, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: LearnPythonFlask/Demo4WtfHelloWorld.py
- > Line 15: name = None
-File: LearnPythonFlask/Demo4WtfHelloWorld.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('wtfIndex.html',form=form, name=name)
-
-
-
-eriknguyen/basic-auth-flask
-https://github.com/eriknguyen/basic-auth-flask
-Entry file: basic-auth-flask/flask_intro/__init__.py
-Scanned: 2016-10-20 12:49:21.270327
-No vulnerabilities found.
-
-
-micaiahparker/startkit-flask-heroku
-https://github.com/micaiahparker/startkit-flask-heroku
-Entry file: startkit-flask-heroku/app.py
-Scanned: 2016-10-20 12:49:22.648866
-No vulnerabilities found.
-
-
-thepomeranian/project-tracker-flask
-https://github.com/thepomeranian/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-20 12:49:23.190853
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottx611x/AWS-SNS-Flask
-https://github.com/scottx611x/AWS-SNS-Flask
-Entry file: AWS-SNS-Flask/recieve_SNS.py
-Scanned: 2016-10-20 12:49:30.025760
-No vulnerabilities found.
-
-
-sepihere/flask
-https://github.com/sepihere/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:49:32.273677
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Coolwater7/flask
-https://github.com/Coolwater7/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:49:35.878483
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-SicunStudio/aunet-flask
-https://github.com/SicunStudio/aunet-flask
-Entry file: None
-Scanned: 2016-10-20 12:49:36.389936
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SicunStudio/aunet-flask.
-
-afropolymath/papers
-https://github.com/afropolymath/papers
-Entry file: papers/api/__init__.py
-Scanned: 2016-10-20 12:49:40.867023
-Vulnerability 1:
-File: papers/api/controllers/files.py
- > User input at line 149, trigger word "get(":
- parent_id = args.get('parent_id', None)
-Reassigned in:
- File: papers/api/controllers/files.py
- > Line 161: update_fields['tag'] = parent_id == '0'g.file['id']'{}#{}'.format(folder_access['tag'], folder['last_index'])
- File: papers/api/controllers/files.py
- > Line 166: update_fields['parent_id'] = parent_id
- File: papers/api/controllers/files.py
- > Line 152: update_fields['name'] = name
-File: papers/api/controllers/files.py
- > reaches line 156, trigger word "filter(":
- folder_access = Folder.filter('id''creator'parent_iduser_id)
-
-
-
-munendrasn/Flaskr
-https://github.com/munendrasn/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:49:41.451750
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Eyali1001/flaskcalculator
-https://github.com/Eyali1001/flaskcalculator
-Entry file: flaskcalculator/calculator.py
-Scanned: 2016-10-20 12:49:45.748653
-Vulnerability 1:
-File: flaskcalculator/calculator.py
- > User input at line 14, trigger word "form[":
- result = int(request.form['title']) + int(request.form['text'])
-File: flaskcalculator/calculator.py
- > reaches line 15, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultpage.html',result=result)
-
-
-
-penglee87/flaskr
-https://github.com/penglee87/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:49:46.265771
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pecone/flaskr
-https://github.com/pecone/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:49:46.783474
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lechain/flaskr
-https://github.com/lechain/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:49:48.286521
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fiezwang/flasky
-https://github.com/fiezwang/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:49:48.808369
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-swdmike/flasky
-https://github.com/swdmike/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:49:53.371896
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChuckiePae/flaskr
-https://github.com/ChuckiePae/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:49:53.886851
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-linjialongmao/flasky
-https://github.com/linjialongmao/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:49:56.394466
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-algalanb/flaskapp
-https://github.com/algalanb/flaskapp
-Entry file: None
-Scanned: 2016-10-20 12:49:57.907093
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp.
-
-Unknown22/Flaskr
-https://github.com/Unknown22/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 12:49:59.410787
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sinwar/flaskr
-https://github.com/sinwar/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:50:00.919601
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lux600/flasktest
-https://github.com/lux600/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 12:50:08.502876
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sagaragarwal94/flask-site-builder
-https://github.com/sagaragarwal94/flask-site-builder
-Entry file: flask-site-builder/sitebuilder.py
-Scanned: 2016-10-20 12:50:09.021314
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Melvie/FlaskLearns
-https://github.com/Melvie/FlaskLearns
-Entry file: None
-Scanned: 2016-10-20 12:50:09.519514
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Leon14451/FlaskMultisite
-https://github.com/Leon14451/FlaskMultisite
-Entry file: FlaskMultisite/wwwroot/__init__.py
-Scanned: 2016-10-20 12:50:10.853255
-No vulnerabilities found.
-
-
-laketiticaca/FlaskApp
-https://github.com/laketiticaca/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:50:11.433854
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rssenar/FlaskApp
-https://github.com/rssenar/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:50:12.004134
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nenodias/flask-webservice
-https://github.com/nenodias/flask-webservice
-Entry file: flask-webservice/app.py
-Scanned: 2016-10-20 12:50:19.856167
-Vulnerability 1:
-File: flask-webservice/app.py
- > User input at line 32, trigger word "get(":
- dev = Developer(request.json.name, request.json.get('hireDate', ''), request.json.get('focus', ''))
-File: flask-webservice/app.py
- > reaches line 35, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('developer'dev), 201)
-
-Vulnerability 2:
-File: flask-webservice/app.py
- > User input at line 45, trigger word "get(":
- dev = Developer.query.get(id)
-Reassigned in:
- File: flask-webservice/app.py
- > Line 46: dev.name = request.json.get('name', dev.name)
- File: flask-webservice/app.py
- > Line 47: dev.hireDate = request.json.get('hireDate', dev.name)
- File: flask-webservice/app.py
- > Line 48: dev.focus = request.json.get('focus', dev.focus)
-File: flask-webservice/app.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('dev'dev)
-
-
-
-StrGlee/flask-demo
-https://github.com/StrGlee/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:50:20.397908
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/StrGlee/flask-demo.
-
-rconnol/PromotionsFlask
-https://github.com/rconnol/PromotionsFlask
-Entry file: PromotionsFlask/app/__init__.py
-Scanned: 2016-10-20 12:50:21.700560
-No vulnerabilities found.
-
-
-dschmaryl/golf-flask
-https://github.com/dschmaryl/golf-flask
-Entry file: golf-flask/stats.py
-Scanned: 2016-10-20 12:50:23.240429
-No vulnerabilities found.
-
-
-Dudeguy409/flask_demo
-https://github.com/Dudeguy409/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 12:50:23.784139
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-1572766337/py_flask
-https://github.com/1572766337/py_flask
-Entry file: py_flask/app/__init__.py
-Scanned: 2016-10-20 12:50:30.991749
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-letterli/Flask-blog
-https://github.com/letterli/Flask-blog
-Entry file: Flask-blog/app/__init__.py
-Scanned: 2016-10-20 12:50:32.516031
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-srinivasb07/Flask_Sample
-https://github.com/srinivasb07/Flask_Sample
-Entry file: Flask_Sample/app.py
-Scanned: 2016-10-20 12:50:36.107872
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Jollyhrothgar/flask_template
-https://github.com/Jollyhrothgar/flask_template
-Entry file: None
-Scanned: 2016-10-20 12:50:36.617685
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jollyhrothgar/flask_template.
-
-apengok/flask_tutor
-https://github.com/apengok/flask_tutor
-Entry file: flask_tutor/tmp/main.py
-Scanned: 2016-10-20 12:50:40.123658
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ArioShaman/flask-site
-https://github.com/ArioShaman/flask-site
-Entry file: None
-Scanned: 2016-10-20 12:50:41.659651
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ibrewdudes/flask-server
-https://github.com/ibrewdudes/flask-server
-Entry file: None
-Scanned: 2016-10-20 12:50:45.178652
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ibrewdudes/flask-server.
-
-hackrole/flask_demo
-https://github.com/hackrole/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 12:50:46.701840
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-YeongjinOh/flask_pratice
-https://github.com/YeongjinOh/flask_pratice
-Entry file: flask_pratice/app/__init__.py
-Scanned: 2016-10-20 12:50:48.136832
-No vulnerabilities found.
-
-
-DylanVerstraete/ItsyouonlineFlask
-https://github.com/DylanVerstraete/ItsyouonlineFlask
-Entry file: ItsyouonlineFlask/itsyouonline-flask/ItsYouOnlineServer/app.py
-Scanned: 2016-10-20 12:50:55.610944
-No vulnerabilities found.
-
-
-jauschalley/flask_practice
-https://github.com/jauschalley/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 12:50:56.278646
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jubjub55/flask_test
-https://github.com/jubjub55/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 12:50:56.850627
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sourav2406/learnFlask
-https://github.com/sourav2406/learnFlask
-Entry file: None
-Scanned: 2016-10-20 12:50:57.388700
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sourav2406/learnFlask.
-
-chrisco/flask-demo
-https://github.com/chrisco/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:50:57.901638
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/chrisco/flask-demo.
-
-aripddev/cms_flask
-https://github.com/aripddev/cms_flask
-Entry file: cms_flask/app/__init__.py
-Scanned: 2016-10-20 12:51:05.371087
-Vulnerability 1:
-File: cms_flask/app/core/controllers.py
- > User input at line 76, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 83: ret_MAYBE_FUNCTION_NAME = render_template('contact.html',form=form)
- File: cms_flask/app/core/controllers.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = abort(400)
-File: cms_flask/app/core/controllers.py
- > reaches line 82, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-Vulnerability 2:
-File: cms_flask/app/core/controllers.py
- > User input at line 76, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 83: ret_MAYBE_FUNCTION_NAME = render_template('contact.html',form=form)
- File: cms_flask/app/core/controllers.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = abort(400)
-File: cms_flask/app/core/controllers.py
- > reaches line 82, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-Vulnerability 3:
-File: cms_flask/app/core/controllers.py
- > User input at line 94, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 97, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.show.html',post=post)
-
-Vulnerability 4:
-File: cms_flask/app/core/controllers.py
- > User input at line 120, trigger word "form[":
- post = Post(headline=request.form['headline'], subheadline=request.form['subheadline'], body=request.form['body'])
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 114: ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.new.html')
- File: cms_flask/app/core/controllers.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_new'))
-File: cms_flask/app/core/controllers.py
- > reaches line 124, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id))
-
-Vulnerability 5:
-File: cms_flask/app/core/controllers.py
- > User input at line 120, trigger word "form[":
- post = Post(headline=request.form['headline'], subheadline=request.form['subheadline'], body=request.form['body'])
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 114: ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.new.html')
- File: cms_flask/app/core/controllers.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_new'))
-File: cms_flask/app/core/controllers.py
- > reaches line 124, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id))
-
-Vulnerability 6:
-File: cms_flask/app/core/controllers.py
- > User input at line 129, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 131: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 132, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.edit.html',post=post)
-
-Vulnerability 7:
-File: cms_flask/app/core/controllers.py
- > User input at line 137, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 143, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id))
-
-Vulnerability 8:
-File: cms_flask/app/core/controllers.py
- > User input at line 137, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 143, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id))
-
-Vulnerability 9:
-File: cms_flask/app/core/controllers.py
- > User input at line 137, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 150, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id))
-
-Vulnerability 10:
-File: cms_flask/app/core/controllers.py
- > User input at line 137, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 150, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id))
-
-Vulnerability 11:
-File: cms_flask/app/core/controllers.py
- > User input at line 161, trigger word "get(":
- category = Category.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 163: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 165, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.show.html',category=category, posts=posts)
-
-Vulnerability 12:
-File: cms_flask/app/core/controllers.py
- > User input at line 172, trigger word "get(":
- page = Page.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('page.show.html',page=page)
-
-Vulnerability 13:
-File: cms_flask/app/core/controllers.py
- > User input at line 193, trigger word "form[":
- page = Page(title=request.form['title'], body=request.form['body'])
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.new.html')
- File: cms_flask/app/core/controllers.py
- > Line 191: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_new'))
-File: cms_flask/app/core/controllers.py
- > reaches line 197, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id))
-
-Vulnerability 14:
-File: cms_flask/app/core/controllers.py
- > User input at line 193, trigger word "form[":
- page = Page(title=request.form['title'], body=request.form['body'])
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.new.html')
- File: cms_flask/app/core/controllers.py
- > Line 191: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_new'))
-File: cms_flask/app/core/controllers.py
- > reaches line 197, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id))
-
-Vulnerability 15:
-File: cms_flask/app/core/controllers.py
- > User input at line 202, trigger word "get(":
- page = Page.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 204: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 205, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.edit.html',page=page)
-
-Vulnerability 16:
-File: cms_flask/app/core/controllers.py
- > User input at line 210, trigger word "get(":
- page = Page.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 216, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id))
-
-Vulnerability 17:
-File: cms_flask/app/core/controllers.py
- > User input at line 210, trigger word "get(":
- page = Page.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 216, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id))
-
-Vulnerability 18:
-File: cms_flask/app/core/controllers.py
- > User input at line 210, trigger word "get(":
- page = Page.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 222, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id))
-
-Vulnerability 19:
-File: cms_flask/app/core/controllers.py
- > User input at line 210, trigger word "get(":
- page = Page.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 222, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id))
-
-Vulnerability 20:
-File: cms_flask/app/core/controllers.py
- > User input at line 249, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 251: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 252, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/admin/user.edit.html',user=user)
-
-Vulnerability 21:
-File: cms_flask/app/core/controllers.py
- > User input at line 257, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 263, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_edit',id=user.id))
-
-Vulnerability 22:
-File: cms_flask/app/core/controllers.py
- > User input at line 257, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 263, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_edit',id=user.id))
-
-Vulnerability 23:
-File: cms_flask/app/core/controllers.py
- > User input at line 257, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 269, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_show',id=user.id))
-
-Vulnerability 24:
-File: cms_flask/app/core/controllers.py
- > User input at line 257, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 269, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_show',id=user.id))
-
-Vulnerability 25:
-File: cms_flask/app/core/controllers.py
- > User input at line 274, trigger word "get(":
- user = User.query.get(id)
-Reassigned in:
- File: cms_flask/app/core/controllers.py
- > Line 276: ret_MAYBE_FUNCTION_NAME = abort(404)
-File: cms_flask/app/core/controllers.py
- > reaches line 277, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/admin/user.show.html',user=user)
-
-
-
-northwestyam/flask_hello
-https://github.com/northwestyam/flask_hello
-Entry file: flask_hello/hello_world.py
-Scanned: 2016-10-20 12:51:06.042027
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ibhan88/Flask-Testing
-https://github.com/ibhan88/Flask-Testing
-Entry file: Flask-Testing/party.py
-Scanned: 2016-10-20 12:51:06.561442
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-titov-andrei/microblog-flask
-https://github.com/titov-andrei/microblog-flask
-Entry file: None
-Scanned: 2016-10-20 12:51:09.108775
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-glenpadua/flask-blog
-https://github.com/glenpadua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:51:09.653987
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-juliuskrah/flask-blog
-https://github.com/juliuskrah/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:51:10.206969
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-elthran/flask-game
-https://github.com/elthran/flask-game
-Entry file: flask-game/flask-intro/app.py
-Scanned: 2016-10-20 12:51:17.749720
-No vulnerabilities found.
-
-
-ChaosSoong/python_flask
-https://github.com/ChaosSoong/python_flask
-Entry file: None
-Scanned: 2016-10-20 12:51:18.742016
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChaosSoong/python_flask.
-
-TheDeadMays/flask-bootstrap
-https://github.com/TheDeadMays/flask-bootstrap
-Entry file: flask-bootstrap/app/__init__.py
-Scanned: 2016-10-20 12:51:20.584199
-No vulnerabilities found.
-
-
-whitneybelba/Flask-Testing
-https://github.com/whitneybelba/Flask-Testing
-Entry file: Flask-Testing/party.py
-Scanned: 2016-10-20 12:51:21.111656
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MadhuriHB/Testing-flask
-https://github.com/MadhuriHB/Testing-flask
-Entry file: Testing-flask/party.py
-Scanned: 2016-10-20 12:51:21.635800
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-langep/flask-template
-https://github.com/langep/flask-template
-Entry file: None
-Scanned: 2016-10-20 12:51:23.984357
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/langep/flask-template.
-
-tuvttran/flask-learning
-https://github.com/tuvttran/flask-learning
-Entry file: flask-learning/hello.py
-Scanned: 2016-10-20 12:51:25.313158
-No vulnerabilities found.
-
-
-couldtt/flask-foundation
-https://github.com/couldtt/flask-foundation
-Entry file: flask-foundation/app/__init__.py
-Scanned: 2016-10-20 12:51:31.421959
-No vulnerabilities found.
-
-
-haithamslaibi/Flask_Template
-https://github.com/haithamslaibi/Flask_Template
-Entry file: Flask_Template/web_app.py
-Scanned: 2016-10-20 12:51:32.805267
-No vulnerabilities found.
-
-
-XiongZhijun/simple-flask
-https://github.com/XiongZhijun/simple-flask
-Entry file: simple-flask/app/app.py
-Scanned: 2016-10-20 12:51:34.256843
-Vulnerability 1:
-File: simple-flask/app/auth/views.py
- > User input at line 16, trigger word ".data":
- user = User.query.filter(or_(User.username == form.username.data)).first()
-File: simple-flask/app/auth/views.py
- > reaches line 16, trigger word "filter(":
- user = User.query.filter(or_(User.username == form.username.data)).first()
-
-
-
-lanyuan27/flask-web
-https://github.com/lanyuan27/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 12:51:36.808796
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-italomaia/flask-rev
-https://github.com/italomaia/flask-rev
-Entry file: flask-rev/tests/runtests.py
-Scanned: 2016-10-20 12:51:38.341293
-No vulnerabilities found.
-
-
-ckaren28/python-Flask
-https://github.com/ckaren28/python-Flask
-Entry file: python-Flask/PYTHON_FLASK/friends/server.py
-Scanned: 2016-10-20 12:51:41.057302
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py
-
-ssong319/Flask-Testing
-https://github.com/ssong319/Flask-Testing
-Entry file: Flask-Testing/party.py
-Scanned: 2016-10-20 12:51:42.578607
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrb101/Flask-Sauce
-https://github.com/mrb101/Flask-Sauce
-Entry file: Flask-Sauce/app/__init__.py
-Scanned: 2016-10-20 12:51:47.158473
-No vulnerabilities found.
-
-
-mattalat/flask-microblog
-https://github.com/mattalat/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:51:47.676162
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yehe01/minitwit-mongo
-https://github.com/yehe01/minitwit-mongo
-Entry file: minitwit-mongo/minitwit/main.py
-Scanned: 2016-10-20 12:51:49.099326
-No vulnerabilities found.
-
-
-pythonbean/microblog
-https://github.com/pythonbean/microblog
-Entry file: None
-Scanned: 2016-10-20 12:51:49.637411
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vseeker/app
-https://github.com/vseeker/app
-Entry file: app/__init__.py
-Scanned: 2016-10-20 12:51:56.957861
-No vulnerabilities found.
-
-
-redtreelchao/microblog
-https://github.com/redtreelchao/microblog
-Entry file: None
-Scanned: 2016-10-20 12:51:57.693872
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-katiayx/hblab_0805_Testing-Balloonicorn-After-Party
-https://github.com/katiayx/hblab_0805_Testing-Balloonicorn-After-Party
-Entry file: hblab_0805_Testing-Balloonicorn-After-Party/party.py
-Scanned: 2016-10-20 12:51:58.212570
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-iverstraeten/headlines
-https://github.com/iverstraeten/headlines
-Entry file: headlines/headlines.py
-Scanned: 2016-10-20 12:51:58.755434
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Mizzlr/FlaskWebApp
-https://github.com/Mizzlr/FlaskWebApp
-Entry file: FlaskWebApp/FanGuardFlask/__init__.py
-Scanned: 2016-10-20 12:51:59.273440
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MusaTamzid05/FlaskYoutubeTest
-https://github.com/MusaTamzid05/FlaskYoutubeTest
-Entry file: None
-Scanned: 2016-10-20 12:52:06.904526
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MusaTamzid05/FlaskYoutubeTest.
-
-ApexMuse/FlaskWebDevelopmentPractice
-https://github.com/ApexMuse/FlaskWebDevelopmentPractice
-Entry file: FlaskWebDevelopmentPractice/extensions.py
-Scanned: 2016-10-20 12:52:08.213414
-No vulnerabilities found.
-
-
-brizow/FlaskTriviaApp
-https://github.com/brizow/FlaskTriviaApp
-Entry file: FlaskTriviaApp/FlaskWebProject1/__init__.py
-Scanned: 2016-10-20 12:52:12.684043
-Vulnerability 1:
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > User input at line 37, trigger word "form[":
- question = request.form['question']
-Reassigned in:
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = '
Invalid Request
'
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = render_template('CreateQuestion.html',title='Create a question', year=year)
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('CreatedQuestion.html',question=question, title='Thanks!', year=year)
-
-Vulnerability 2:
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > User input at line 56, trigger word "get(":
- question = r.get(title + ':question')
-Reassigned in:
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year)
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year)
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = '
Invalid Request
'
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year)
-
-Vulnerability 3:
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > User input at line 60, trigger word "form[":
- submittedAnswer = request.form['submittedAnswer']
-Reassigned in:
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = '
Invalid Request
'
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year)
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year)
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > reaches line 66, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year)
-
-Vulnerability 4:
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > User input at line 62, trigger word "get(":
- answer = r.get(title + ':answer')
-Reassigned in:
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = '
Invalid Request
'
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year)
- File: FlaskTriviaApp/FlaskWebProject1/views.py
- > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year)
-File: FlaskTriviaApp/FlaskWebProject1/views.py
- > reaches line 66, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year)
-
-
-
-Chi-Qingjun/FlaskWechatDev
-https://github.com/Chi-Qingjun/FlaskWechatDev
-Entry file: FlaskWechatDev/app/__init__.py
-Scanned: 2016-10-20 12:52:14.115808
-Vulnerability 1:
-File: FlaskWechatDev/app/main/views.py
- > User input at line 30, trigger word ".data":
- tree = ET.fromstring(request.data.decode('utf-8'))
-File: FlaskWechatDev/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('text.xml',to_user_name=tree.find('FromUserName').text, from_user_name=tree.find('ToUserName').text, timestamp=datetime.utcnow().timestamp(), content=tree.find('Content').text)
-
-
-
-lindsaynchan/hb_flask_testing
-https://github.com/lindsaynchan/hb_flask_testing
-Entry file: hb_flask_testing/party.py
-Scanned: 2016-10-20 12:52:14.649168
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-simsinght/microblog_flask_tutorial
-https://github.com/simsinght/microblog_flask_tutorial
-Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 12:52:20.018206
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-measurigtime/flask-by-example
-https://github.com/measurigtime/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 12:52:20.694083
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Anthonyhawkins/flask_megatutorial_lab
-https://github.com/Anthonyhawkins/flask_megatutorial_lab
-Entry file: flask_megatutorial_lab/app/__init__.py
-Scanned: 2016-10-20 12:52:22.006738
-No vulnerabilities found.
-
-
-beatricep/hblab_0805_testing-flask
-https://github.com/beatricep/hblab_0805_testing-flask
-Entry file: hblab_0805_testing-flask/party.py
-Scanned: 2016-10-20 12:52:22.531132
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottx611x/AWS-SNS-Flask
-https://github.com/scottx611x/AWS-SNS-Flask
-Entry file: AWS-SNS-Flask/recieve_SNS.py
-Scanned: 2016-10-20 12:52:24.277492
-No vulnerabilities found.
-
-
-daniellawrence/flask-rest-sqla
-https://github.com/daniellawrence/flask-rest-sqla
-Entry file: flask-rest-sqla/web.py
-Scanned: 2016-10-20 12:52:24.802000
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-12DReflections/docker_flask_mdb
-https://github.com/12DReflections/docker_flask_mdb
-Entry file: docker_flask_mdb/app.py
-Scanned: 2016-10-20 12:52:26.105510
-No vulnerabilities found.
-
-
-yucealiosman1/flask-deneme1
-https://github.com/yucealiosman1/flask-deneme1
-Entry file: flask-deneme1/app.py
-Scanned: 2016-10-20 12:52:31.679397
-No vulnerabilities found.
-
-
-vecelo/flask_lear_proj
-https://github.com/vecelo/flask_lear_proj
-Entry file: flask_lear_proj/blogs/Lib/site-packages/flask-0.11.1-py2.7.egg/flask/sessions.py
-Scanned: 2016-10-20 12:52:39.088618
-No vulnerabilities found.
-
-
-dinhnv/nginx-flask-stub
-https://github.com/dinhnv/nginx-flask-stub
-Entry file: nginx-flask-stub/webapp/eanstub_app.py
-Scanned: 2016-10-20 12:52:40.604651
-No vulnerabilities found.
-
-
-tinapastelero/HB-flask-test
-https://github.com/tinapastelero/HB-flask-test
-Entry file: HB-flask-test/party.py
-Scanned: 2016-10-20 12:52:41.129819
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-laurelkorwin/hb-flask-testing
-https://github.com/laurelkorwin/hb-flask-testing
-Entry file: hb-flask-testing/party.py
-Scanned: 2016-10-20 12:52:41.697162
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lgorham/flask_testing_0805
-https://github.com/lgorham/flask_testing_0805
-Entry file: flask_testing_0805/party.py
-Scanned: 2016-10-20 12:52:42.218986
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-eugenepark81/flask-hello-world
-https://github.com/eugenepark81/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 12:52:42.785356
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-NexusRJ/react_flask_blog
-https://github.com/NexusRJ/react_flask_blog
-Entry file: react_flask_blog/app/__init__.py
-Scanned: 2016-10-20 12:52:47.713949
-Vulnerability 1:
-File: react_flask_blog/app/admin/views.py
- > User input at line 102, trigger word "get(":
- x = Article.query.filter_by(id=request.args.get('id')).first()
-File: react_flask_blog/app/admin/views.py
- > reaches line 106, trigger word "flash(":
- flash('已删除' + x.title)
-
-
-
-stonewm/flask_by_example
-https://github.com/stonewm/flask_by_example
-Entry file: flask_by_example/app.py
-Scanned: 2016-10-20 12:52:48.419540
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py
-
-thechutrain/flask-burrito-app
-https://github.com/thechutrain/flask-burrito-app
-Entry file: flask-burrito-app/tacocat.py
-Scanned: 2016-10-20 12:52:48.952554
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jordanagreen/flask-todo-lists
-https://github.com/jordanagreen/flask-todo-lists
-Entry file: flask-todo-lists/app.py
-Scanned: 2016-10-20 12:52:51.390555
-Vulnerability 1:
-File: flask-todo-lists/views.py
- > User input at line 24, trigger word "get(":
- l = TodoList.query.get(id)
-File: flask-todo-lists/views.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('list.html',title=l.title, list=l)
-
-Vulnerability 2:
-File: flask-todo-lists/views.py
- > User input at line 45, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask-todo-lists/views.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form)
- File: flask-todo-lists/views.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form)
- File: flask-todo-lists/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = abort(400)
-File: flask-todo-lists/views.py
- > reaches line 48, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-Vulnerability 3:
-File: flask-todo-lists/views.py
- > User input at line 45, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask-todo-lists/views.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form)
- File: flask-todo-lists/views.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form)
- File: flask-todo-lists/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = abort(400)
-File: flask-todo-lists/views.py
- > reaches line 48, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-
-
-Coolwater7/flask
-https://github.com/Coolwater7/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:52:59.781910
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-KeyJia/Flask
-https://github.com/KeyJia/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:53:00.286335
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yangliu2/flask
-https://github.com/yangliu2/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:53:00.857822
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-tis86/flask
-https://github.com/tis86/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:53:07.474175
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-vipitsoft/flask
-https://github.com/vipitsoft/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:53:08.043072
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-reed-chi/flask
-https://github.com/reed-chi/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:53:10.614662
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-huhjuang/Flask
-https://github.com/huhjuang/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:53:14.129406
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mosquito/flask-example
-https://github.com/mosquito/flask-example
-Entry file: flask-example/main.py
-Scanned: 2016-10-20 12:53:16.133390
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-teuton0215/microblog
-https://github.com/teuton0215/microblog
-Entry file: None
-Scanned: 2016-10-20 12:53:18.649989
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-babydeya/flaskr
-https://github.com/babydeya/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:53:19.145283
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rouzazari/flaskangular
-https://github.com/rouzazari/flaskangular
-Entry file: flaskangular/app/__init__.py
-Scanned: 2016-10-20 12:53:21.594318
-No vulnerabilities found.
-
-
-nocotan/flaski
-https://github.com/nocotan/flaski
-Entry file: flaski/app.py
-Scanned: 2016-10-20 12:53:23.035238
-No vulnerabilities found.
-
-
-berezovskiydenis/flasktaskr
-https://github.com/berezovskiydenis/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:53:23.550929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-penglee87/flaskr
-https://github.com/penglee87/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:53:24.052842
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rouzazari/flaskfirst
-https://github.com/rouzazari/flaskfirst
-Entry file: flaskfirst/app/__init__.py
-Scanned: 2016-10-20 12:53:26.478581
-No vulnerabilities found.
-
-
-smilemlz/flasktest
-https://github.com/smilemlz/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 12:53:26.993806
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Runningdogs/flasky
-https://github.com/Runningdogs/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:53:31.511208
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-YaleYeah/flasky
-https://github.com/YaleYeah/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:53:33.010857
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-seizans/flasko
-https://github.com/seizans/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-20 12:53:40.680698
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py
-
-faridalrafi/flaskopencv
-https://github.com/faridalrafi/flaskopencv
-Entry file: flaskopencv/app.py
-Scanned: 2016-10-20 12:53:41.191767
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-pecone/flaskr
-https://github.com/pecone/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:53:41.690047
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bencelder/flaskr
-https://github.com/bencelder/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:53:43.202846
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChuckiePae/flaskr
-https://github.com/ChuckiePae/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:53:43.718015
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-KamiNoSierhej/flaskkk
-https://github.com/KamiNoSierhej/flaskkk
-Entry file: flaskkk/flaskkk/Polczan.py
-Scanned: 2016-10-20 12:53:47.246251
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sampathweb/ml-cookiecutter-starter-flask-app
-https://github.com/sampathweb/ml-cookiecutter-starter-flask-app
-Entry file: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/__init__.py
-Scanned: 2016-10-20 12:53:50.436305
-Vulnerability 1:
-File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > User input at line 32, trigger word ".data":
- submitted_data = form.data
-Reassigned in:
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 36: sepal_length = float(submitted_data['sepal_length'])
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 37: sepal_width = float(submitted_data['sepal_width'])
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 38: petal_length = float(submitted_data['petal_length'])
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 39: petal_width = float(submitted_data['petal_width'])
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 42: flower_instance = [sepal_length, sepal_width, petal_length, petal_width]
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 47: my_predictions = estimator.predict([flower_instance])
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 50: my_prediction = my_predictions[0]
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 54: data = [flower_instance]
- File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > Line 28: data = []
-File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prediction=predicted_iris, data=json.dumps(data))
-
-
-
-roemhildtg/flask-can-crud
-https://github.com/roemhildtg/flask-can-crud
-Entry file: flask-can-crud/flaskapp.py
-Scanned: 2016-10-20 12:53:54.638647
-No vulnerabilities found.
-
-
-thippo/FlaskFrame
-https://github.com/thippo/FlaskFrame
-Entry file: FlaskFrame/myweb/__init__.py
-Scanned: 2016-10-20 12:53:56.309129
-Vulnerability 1:
-File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > User input at line 12, trigger word ".data":
- data = form.q.data.strip()
-Reassigned in:
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 18: transfer_dict['pkuc'] = data
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 19: transfer_dict['pkc'] = utils.WIF_to_compressed(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 20: p2a = py3private2address.Private2Address(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 21: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 22: transfer_dict['bac'] = p2a.bitcoinaddress_compressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 24: transfer_dict['type'] = 1
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 25: transfer_dict['pkc'] = data
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 26: transfer_dict['pkuc'] = utils.compressed_to_WIF(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 27: p2a = py3private2address.Private2Address(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 28: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 29: transfer_dict['bac'] = p2a.bitcoinaddress_compressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 34: transfer_dict['type'] = 2
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 36: transfer_dict['type'] = 2
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 38: transfer_dict['type'] = 0
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('bitcoin',transfer_dict=transfer_dict, form=form)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 14: transfer_dict['type'] = 2
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 17: transfer_dict['type'] = 1
-File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('bitcoinaddress',data=data, form=form)
-
-
-
-omokehinde/FlaskExam
-https://github.com/omokehinde/FlaskExam
-Entry file: FlaskExam/app.py
-Scanned: 2016-10-20 12:53:59.801322
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-famesprinter/FlaskDemo
-https://github.com/famesprinter/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 12:54:00.315895
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fantingdong/flasky1
-https://github.com/fantingdong/flasky1
-Entry file: flasky1/app/__init__.py
-Scanned: 2016-10-20 12:54:01.933597
-Vulnerability 1:
-File: flasky1/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/main/views.py
- > Line 55: posts = pagination.items
- File: flasky1/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky1/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flasky1/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 45: show_followed = False
- File: flasky1/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky1/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flasky1/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/main/views.py
- > Line 67: posts = pagination.items
-File: flasky1/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flasky1/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flasky1/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/main/views.py
- > Line 134: comments = pagination.items
- File: flasky1/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flasky1/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flasky1/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky1/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flasky1/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky1/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flasky1/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky1/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flasky1/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky1/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flasky1/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/main/views.py
- > Line 246: comments = pagination.items
-File: flasky1/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flasky1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky1/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flasky1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky1/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flasky1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky1/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flasky1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky1/app/api_1_0/users.py
- > Line 46: next = None
-File: flasky1/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flasky1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky1/app/api_1_0/users.py
- > Line 46: next = None
-File: flasky1/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flasky1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky1/app/api_1_0/users.py
- > Line 46: next = None
-File: flasky1/app/api_1_0/users.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flasky1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky1/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flasky1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky1/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flasky1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky1/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flasky1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky1/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flasky1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky1/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flasky1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky1/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flasky1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky1/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flasky1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky1/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flasky1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky1/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-jmelchio/FlaskCF
-https://github.com/jmelchio/FlaskCF
-Entry file: FlaskCF/FlaskCF.py
-Scanned: 2016-10-20 12:54:03.264742
-No vulnerabilities found.
-
-
-lidingke/flaskStudy
-https://github.com/lidingke/flaskStudy
-Entry file: flaskStudy/user/app/__init__.py
-Scanned: 2016-10-20 12:54:04.686064
-No vulnerabilities found.
-
-
-xyq946692052/flaskLearn
-https://github.com/xyq946692052/flaskLearn
-Entry file: None
-Scanned: 2016-10-20 12:54:08.225218
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xyq946692052/flaskLearn.
-
-wccosby/flaskML
-https://github.com/wccosby/flaskML
-Entry file: flaskML/app/__init__.py
-Scanned: 2016-10-20 12:54:10.180146
-Vulnerability 1:
-File: flaskML/app/views.py
- > User input at line 32, trigger word ".data":
- submitted_data = form.data
-Reassigned in:
- File: flaskML/app/views.py
- > Line 36: sepal_length = float(submitted_data['sepal_length'])
- File: flaskML/app/views.py
- > Line 37: sepal_width = float(submitted_data['sepal_width'])
- File: flaskML/app/views.py
- > Line 38: petal_length = float(submitted_data['petal_length'])
- File: flaskML/app/views.py
- > Line 39: petal_width = float(submitted_data['petal_width'])
- File: flaskML/app/views.py
- > Line 42: flower_instance = [sepal_length, sepal_width, petal_length, petal_width]
- File: flaskML/app/views.py
- > Line 47: my_predictions = estimator.predict([flower_instance])
- File: flaskML/app/views.py
- > Line 50: my_prediction = my_predictions[0]
- File: flaskML/app/views.py
- > Line 54: data = [flower_instance]
- File: flaskML/app/views.py
- > Line 28: data = []
-File: flaskML/app/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prediction=predicted_iris, data=json.dumps(data))
-
-
-
-nenodias/flask-webservice
-https://github.com/nenodias/flask-webservice
-Entry file: flask-webservice/app.py
-Scanned: 2016-10-20 12:54:11.613711
-Vulnerability 1:
-File: flask-webservice/app.py
- > User input at line 32, trigger word "get(":
- dev = Developer(request.json.name, request.json.get('hireDate', ''), request.json.get('focus', ''))
-File: flask-webservice/app.py
- > reaches line 35, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('developer'dev), 201)
-
-Vulnerability 2:
-File: flask-webservice/app.py
- > User input at line 45, trigger word "get(":
- dev = Developer.query.get(id)
-Reassigned in:
- File: flask-webservice/app.py
- > Line 46: dev.name = request.json.get('name', dev.name)
- File: flask-webservice/app.py
- > Line 47: dev.hireDate = request.json.get('hireDate', dev.name)
- File: flask-webservice/app.py
- > Line 48: dev.focus = request.json.get('focus', dev.focus)
-File: flask-webservice/app.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('dev'dev)
-
-
-
-StrGlee/flask-demo
-https://github.com/StrGlee/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:54:14.134705
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/StrGlee/flask-demo.
-
-petersowa/flask_blog
-https://github.com/petersowa/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:54:14.646062
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SachinMaharana/firstapp-flask
-https://github.com/SachinMaharana/firstapp-flask
-Entry file: firstapp-flask/hello.py
-Scanned: 2016-10-20 12:54:16.975316
-No vulnerabilities found.
-
-
-Maoao530/flask-todo
-https://github.com/Maoao530/flask-todo
-Entry file: flask-todo/backend/app.py
-Scanned: 2016-10-20 12:54:19.528386
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-remarkablemark/flask-template
-https://github.com/remarkablemark/flask-template
-Entry file: None
-Scanned: 2016-10-20 12:54:20.036979
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/remarkablemark/flask-template.
-
-Nakort/flask_workouts
-https://github.com/Nakort/flask_workouts
-Entry file: flask_workouts/app/__init__.py
-Scanned: 2016-10-20 12:54:22.363844
-No vulnerabilities found.
-
-
-xuqi1987/21.Flask
-https://github.com/xuqi1987/21.Flask
-Entry file: None
-Scanned: 2016-10-20 12:54:22.938107
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DaoQiu/flask_tutorial
-https://github.com/DaoQiu/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 12:54:24.448793
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-askz/flask-sandbox
-https://github.com/askz/flask-sandbox
-Entry file: flask-sandbox/quickstart/helloworld.py
-Scanned: 2016-10-20 12:54:24.951492
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Coolwater7/Flask_sample
-https://github.com/Coolwater7/Flask_sample
-Entry file: Flask_sample/app/__init__.py
-Scanned: 2016-10-20 12:54:26.506198
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-janreyho/flask-demo
-https://github.com/janreyho/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:54:27.023556
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/janreyho/flask-demo.
-
-saeveritt/flask-DHT
-https://github.com/saeveritt/flask-DHT
-Entry file: flask-DHT/DHT-web.py
-Scanned: 2016-10-20 12:54:32.564543
-No vulnerabilities found.
-
-
-rconnol/PromotionsFlask
-https://github.com/rconnol/PromotionsFlask
-Entry file: PromotionsFlask/app/__init__.py
-Scanned: 2016-10-20 12:54:33.868413
-No vulnerabilities found.
-
-
-kwin-wang/flask-learn
-https://github.com/kwin-wang/flask-learn
-Entry file: flask-learn/hello.py
-Scanned: 2016-10-20 12:54:42.507406
-Vulnerability 1:
-File: flask-learn/hello.py
- > User input at line 52, trigger word "get(":
- msg = Message(app.config.get('FLASKY_MAIL_SUBJECT_PREFIX') + subject,sender=app.config.get('FLASKY_MAIL_SENDER'), recipients=[to])
-File: flask-learn/hello.py
- > reaches line 54, trigger word "render_template(":
- msg.body = render_template(template + '.txt',kwargs)
-
-Vulnerability 2:
-File: flask-learn/hello.py
- > User input at line 52, trigger word "get(":
- msg = Message(app.config.get('FLASKY_MAIL_SUBJECT_PREFIX') + subject,sender=app.config.get('FLASKY_MAIL_SENDER'), recipients=[to])
-File: flask-learn/hello.py
- > reaches line 55, trigger word "render_template(":
- msg.html = render_template(template + '.html',kwargs)
-
-
-
-shtakai/flask-first
-https://github.com/shtakai/flask-first
-Entry file: flask-first/flask-first-notes.py
-Scanned: 2016-10-20 12:54:43.044596
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PlasmaSheep/flask-bug
-https://github.com/PlasmaSheep/flask-bug
-Entry file: None
-Scanned: 2016-10-20 12:54:43.568666
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/PlasmaSheep/flask-bug.
-
-Jollyhrothgar/flask_template
-https://github.com/Jollyhrothgar/flask_template
-Entry file: None
-Scanned: 2016-10-20 12:54:44.080168
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jollyhrothgar/flask_template.
-
-apengok/flask_tutor
-https://github.com/apengok/flask_tutor
-Entry file: flask_tutor/tmp/main.py
-Scanned: 2016-10-20 12:54:44.573638
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-minodes/flask_boilerplate
-https://github.com/minodes/flask_boilerplate
-Entry file: flask_boilerplate/application/__init__.py
-Scanned: 2016-10-20 12:54:48.125199
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-guoqiao/flask-examples
-https://github.com/guoqiao/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-20 12:54:51.132280
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ibhan88/Flask-Testing
-https://github.com/ibhan88/Flask-Testing
-Entry file: Flask-Testing/party.py
-Scanned: 2016-10-20 12:54:55.643570
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-titov-andrei/microblog-flask
-https://github.com/titov-andrei/microblog-flask
-Entry file: None
-Scanned: 2016-10-20 12:54:58.176691
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-anthonyheidenreich/flask-vagrant
-https://github.com/anthonyheidenreich/flask-vagrant
-Entry file: flask-vagrant/app.py
-Scanned: 2016-10-20 12:55:01.635870
-No vulnerabilities found.
-
-
-r0oki3/flask-webapp
-https://github.com/r0oki3/flask-webapp
-Entry file: flask-webapp/app.py
-Scanned: 2016-10-20 12:55:02.969956
-No vulnerabilities found.
-
-
-znebby/ubuntu-flask
-https://github.com/znebby/ubuntu-flask
-Entry file: ubuntu-flask/myproject/myproject.py
-Scanned: 2016-10-20 12:55:04.282688
-No vulnerabilities found.
-
-
-Muazzama/flask_app
-https://github.com/Muazzama/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:55:04.837730
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Muazzama/flask_app.
-
-tjctw/flask_intro
-https://github.com/tjctw/flask_intro
-Entry file: flask_intro/first_app.py
-Scanned: 2016-10-20 12:55:08.353732
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py
-
-wouzar/flask-microblog
-https://github.com/wouzar/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:55:08.872860
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DanielQujun/flask-web
-https://github.com/DanielQujun/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 12:55:14.941603
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kzh4ng/flask_server
-https://github.com/kzh4ng/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-20 12:55:15.461467
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-uisky/flask-fish
-https://github.com/uisky/flask-fish
-Entry file: flask-fish/skel/app/app.py
-Scanned: 2016-10-20 12:55:16.970250
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-glenpadua/flask-blog
-https://github.com/glenpadua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:55:20.528801
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-buzibu/flask-blog
-https://github.com/buzibu/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:55:21.079919
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-bgiesa/flask-test
-https://github.com/bgiesa/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:55:21.604284
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-neoden/flask-nmail
-https://github.com/neoden/flask-nmail
-Entry file: flask-nmail/flask-nmail.py
-Scanned: 2016-10-20 12:55:24.033610
-No vulnerabilities found.
-
-
-vThaian/flask_example
-https://github.com/vThaian/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:55:24.548391
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-whitneybelba/Flask-Testing
-https://github.com/whitneybelba/Flask-Testing
-Entry file: Flask-Testing/party.py
-Scanned: 2016-10-20 12:55:25.048793
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MadhuriHB/Testing-flask
-https://github.com/MadhuriHB/Testing-flask
-Entry file: Testing-flask/party.py
-Scanned: 2016-10-20 12:55:26.561981
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-couldtt/flask-foundation
-https://github.com/couldtt/flask-foundation
-Entry file: flask-foundation/app/__init__.py
-Scanned: 2016-10-20 12:55:32.824806
-No vulnerabilities found.
-
-
-TheDeadMays/flask-bootstrap
-https://github.com/TheDeadMays/flask-bootstrap
-Entry file: flask-bootstrap/app/__init__.py
-Scanned: 2016-10-20 12:55:34.142310
-No vulnerabilities found.
-
-
-tuvttran/flask-learning
-https://github.com/tuvttran/flask-learning
-Entry file: flask-learning/hello.py
-Scanned: 2016-10-20 12:55:42.634634
-No vulnerabilities found.
-
-
-schoolofnetcom/flask-python
-https://github.com/schoolofnetcom/flask-python
-Entry file: flask-python/init.py
-Scanned: 2016-10-20 12:55:43.291063
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-python/venv/lib/python2.7/genericpath.py
-
-KeyJia/Flask-Python
-https://github.com/KeyJia/Flask-Python
-Entry file: Flask-Python/Flask.py
-Scanned: 2016-10-20 12:55:43.829286
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rhymiz/flask-template
-https://github.com/rhymiz/flask-template
-Entry file: None
-Scanned: 2016-10-20 12:55:44.356446
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rhymiz/flask-template.
-
-xawei/flask_gw
-https://github.com/xawei/flask_gw
-Entry file: flask_gw/app/__init__.py
-Scanned: 2016-10-20 12:55:46.295727
-Vulnerability 1:
-File: flask_gw/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_gw/app/main/views.py
- > Line 32: posts = pagination.items
- File: flask_gw/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_gw/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask_gw/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 22: show_followed = False
- File: flask_gw/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_gw/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask_gw/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_gw/app/main/views.py
- > Line 44: posts = pagination.items
-File: flask_gw/app/main/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask_gw/app/main/views.py
- > User input at line 104, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask_gw/app/main/views.py
- > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_gw/app/main/views.py
- > Line 111: comments = pagination.items
- File: flask_gw/app/main/views.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask_gw/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask_gw/app/main/views.py
- > User input at line 171, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_gw/app/main/views.py
- > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_gw/app/main/views.py
- > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_gw/app/main/views.py
- > reaches line 177, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask_gw/app/main/views.py
- > User input at line 188, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_gw/app/main/views.py
- > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_gw/app/main/views.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_gw/app/main/views.py
- > reaches line 194, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask_gw/app/main/views.py
- > User input at line 219, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_gw/app/main/views.py
- > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_gw/app/main/views.py
- > Line 223: comments = pagination.items
-File: flask_gw/app/main/views.py
- > reaches line 224, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-stonewm/flask_blog
-https://github.com/stonewm/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:55:48.823227
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ewjoachim/bttn_flask
-https://github.com/ewjoachim/bttn_flask
-Entry file: bttn_flask/bttn_flask.py
-Scanned: 2016-10-20 12:55:51.134506
-No vulnerabilities found.
-
-
-curious725/blog_flask
-https://github.com/curious725/blog_flask
-Entry file: blog_flask/app.py
-Scanned: 2016-10-20 12:55:57.200901
-No vulnerabilities found.
-
-
-ssong319/Flask-Testing
-https://github.com/ssong319/Flask-Testing
-Entry file: Flask-Testing/party.py
-Scanned: 2016-10-20 12:55:58.714049
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yantiz/flask-blog
-https://github.com/yantiz/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:56:01.280968
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-nanakenashi/flask_hello
-https://github.com/nanakenashi/flask_hello
-Entry file: flask_hello/hello_world.py
-Scanned: 2016-10-20 12:56:02.939476
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-voltagemeeder/FirstFlask
-https://github.com/voltagemeeder/FirstFlask
-Entry file: FirstFlask/app.py
-Scanned: 2016-10-20 12:56:04.534460
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py
-
-zembrzuski/openshift-flask
-https://github.com/zembrzuski/openshift-flask
-Entry file: openshift-flask/app.py
-Scanned: 2016-10-20 12:56:05.871466
-No vulnerabilities found.
-
-
-wgerald90/tth-Flask
-https://github.com/wgerald90/tth-Flask
-Entry file: None
-Scanned: 2016-10-20 12:56:08.444825
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-NataKuskova/Classwork_flask
-https://github.com/NataKuskova/Classwork_flask
-Entry file: Classwork_flask/script.py
-Scanned: 2016-10-20 12:56:09.773264
-Vulnerability 1:
-File: Classwork_flask/script.py
- > User input at line 27, trigger word "form[":
- text = request.form['text']
-File: Classwork_flask/script.py
- > reaches line 31, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('result',text=text))
-
-Vulnerability 2:
-File: Classwork_flask/script.py
- > User input at line 27, trigger word "form[":
- text = request.form['text']
-File: Classwork_flask/script.py
- > reaches line 31, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('result',text=text))
-
-
-
-BadSol/flask-vendor
-https://github.com/BadSol/flask-vendor
-Entry file: flask-vendor/vendor/__init__.py
-Scanned: 2016-10-20 12:56:14.788536
-Vulnerability 1:
-File: flask-vendor/vendor/user/views.py
- > User input at line 18, trigger word "form[":
- user_obj = User.query.filter(User.email == request.form['email'].lower()).one_or_none()
-File: flask-vendor/vendor/user/views.py
- > reaches line 18, trigger word "filter(":
- user_obj = User.query.filter(User.email == request.form['email'].lower()).one_or_none()
-
-
-
-haimapi/flask_pro
-https://github.com/haimapi/flask_pro
-Entry file: flask_pro/he.py
-Scanned: 2016-10-20 12:56:15.305754
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kozyrevsergey89/flask_backend
-https://github.com/kozyrevsergey89/flask_backend
-Entry file: flask_backend/hello.py
-Scanned: 2016-10-20 12:56:16.761956
-No vulnerabilities found.
-
-
-katiayx/hblab_0805_Testing-Balloonicorn-After-Party
-https://github.com/katiayx/hblab_0805_Testing-Balloonicorn-After-Party
-Entry file: hblab_0805_Testing-Balloonicorn-After-Party/party.py
-Scanned: 2016-10-20 12:56:17.275383
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-csyouk/faust-register-py
-https://github.com/csyouk/faust-register-py
-Entry file: faust-register-py/register_server.py
-Scanned: 2016-10-20 12:56:23.621386
-Vulnerability 1:
-File: faust-register-py/register_server.py
- > User input at line 56, trigger word "form[":
- session = game.find_session(request.form['session'])
-Reassigned in:
- File: faust-register-py/register_server.py
- > Line 53: session = []
-File: faust-register-py/register_server.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count)
-
-Vulnerability 2:
-File: faust-register-py/register_server.py
- > User input at line 57, trigger word "form[":
- player_list = player.get_all_player(request.form['session'])
-Reassigned in:
- File: faust-register-py/register_server.py
- > Line 52: player_list = []
-File: faust-register-py/register_server.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count)
-
-Vulnerability 3:
-File: faust-register-py/register_server.py
- > User input at line 58, trigger word "form[":
- player_count = player.get_count(request.form['session'])
-Reassigned in:
- File: faust-register-py/register_server.py
- > Line 54: player_count = 0
-File: faust-register-py/register_server.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count)
-
-Vulnerability 4:
-File: faust-register-py/register_server.py
- > User input at line 139, trigger word "get(":
- error_type = request.args.get('error_type')
-File: faust-register-py/register_server.py
- > reaches line 142, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('alert.html',error_type=error_type)
-
-
-
-deonna/flask
-https://github.com/deonna/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:56:25.635926
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-ksbek/flask
-https://github.com/ksbek/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:56:26.217665
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-feirendada/Flask
-https://github.com/feirendada/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:56:26.754432
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-krandmm/flask
-https://github.com/krandmm/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:56:27.344693
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-huhjuang/Flask
-https://github.com/huhjuang/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:56:27.856630
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Vaspy/Flask
-https://github.com/Vaspy/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:56:28.359088
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sebas095/Flask
-https://github.com/sebas095/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 12:56:33.399955
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-codigofacilito/flask_cf
-https://github.com/codigofacilito/flask_cf
-Entry file: flask_cf/Project/main.py
-Scanned: 2016-10-20 12:56:41.962800
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lizTheDeveloper/__g26_flask
-https://github.com/lizTheDeveloper/__g26_flask
-Entry file: __g26_flask/model.py
-Scanned: 2016-10-20 12:56:44.397472
-Vulnerability 1:
-File: __g26_flask/app.py
- > User input at line 27, trigger word "get(":
- user = load_user(session.get('user_id'))
-File: __g26_flask/app.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Pokestraveganzamon', pokemon=pokelist, user=user)
-
-
-
-ZakStrassberg/flask_products_group_project
-https://github.com/ZakStrassberg/flask_products_group_project
-Entry file: flask_products_group_project/server.py
-Scanned: 2016-10-20 12:56:45.917207
-No vulnerabilities found.
-
-
-iamrajhans/FlaskBackend
-https://github.com/iamrajhans/FlaskBackend
-Entry file: FlaskBackend/drone/main.py
-Scanned: 2016-10-20 12:56:48.190107
-No vulnerabilities found.
-
-
-yantiz/flasktaskr
-https://github.com/yantiz/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:56:49.722676
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nocotan/flaski
-https://github.com/nocotan/flaski
-Entry file: flaski/app.py
-Scanned: 2016-10-20 12:56:52.173642
-No vulnerabilities found.
-
-
-asimonia/Flaskbook
-https://github.com/asimonia/Flaskbook
-Entry file: Flaskbook/maps.py
-Scanned: 2016-10-20 12:56:52.703511
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Markmwaura/Flaskblog
-https://github.com/Markmwaura/Flaskblog
-Entry file: Flaskblog/app/__init__.py
-Scanned: 2016-10-20 12:56:57.016718
-No vulnerabilities found.
-
-
-seizans/flasko
-https://github.com/seizans/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-20 12:56:59.650069
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py
-
-vennyk/flasktaskr
-https://github.com/vennyk/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:57:02.185209
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-akjanik/flasktutorial
-https://github.com/akjanik/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 12:57:03.709500
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hyteer/flaskdemo
-https://github.com/hyteer/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 12:57:05.286912
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhang555/flasky
-https://github.com/zhang555/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 12:57:05.963591
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wuqingwuqingwu/flaskk
-https://github.com/wuqingwuqingwu/flaskk
-Entry file: flaskk/hello.py
-Scanned: 2016-10-20 12:57:10.055655
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/genericpath.py
-
-HJeongWon/flaskr
-https://github.com/HJeongWon/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 12:57:12.596755
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-oscarnyl/flaskpost
-https://github.com/oscarnyl/flaskpost
-Entry file: flaskpost/flaskpost/__init__.py
-Scanned: 2016-10-20 12:57:17.142001
-No vulnerabilities found.
-
-
-AdamWawrow/flasktaskr
-https://github.com/AdamWawrow/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:57:17.680444
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-reed-chi/flasktaskr
-https://github.com/reed-chi/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 12:57:18.186216
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-thippo/FlaskFrame
-https://github.com/thippo/FlaskFrame
-Entry file: FlaskFrame/myweb/__init__.py
-Scanned: 2016-10-20 12:57:25.357996
-Vulnerability 1:
-File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > User input at line 12, trigger word ".data":
- data = form.q.data.strip()
-Reassigned in:
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 18: transfer_dict['pkuc'] = data
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 19: transfer_dict['pkc'] = utils.WIF_to_compressed(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 20: p2a = py3private2address.Private2Address(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 21: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 22: transfer_dict['bac'] = p2a.bitcoinaddress_compressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 24: transfer_dict['type'] = 1
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 25: transfer_dict['pkc'] = data
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 26: transfer_dict['pkuc'] = utils.compressed_to_WIF(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 27: p2a = py3private2address.Private2Address(data)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 28: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 29: transfer_dict['bac'] = p2a.bitcoinaddress_compressed
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 34: transfer_dict['type'] = 2
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 36: transfer_dict['type'] = 2
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 38: transfer_dict['type'] = 0
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('bitcoin',transfer_dict=transfer_dict, form=form)
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 14: transfer_dict['type'] = 2
- File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > Line 17: transfer_dict['type'] = 1
-File: FlaskFrame/myweb/bitcoin/bitcoin.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('bitcoinaddress',data=data, form=form)
-
-
-
-sevenZz/FlaskTest
-https://github.com/sevenZz/FlaskTest
-Entry file: None
-Scanned: 2016-10-20 12:57:25.878974
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sevenZz/FlaskTest.
-
-omokehinde/FlaskExam
-https://github.com/omokehinde/FlaskExam
-Entry file: FlaskExam/app.py
-Scanned: 2016-10-20 12:57:26.880830
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-Niel2016/FlaskApp
-https://github.com/Niel2016/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 12:57:27.465301
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Chemoday/FlaskPractice
-https://github.com/Chemoday/FlaskPractice
-Entry file: FlaskPractice/app/__init__.py
-Scanned: 2016-10-20 12:57:28.894510
-No vulnerabilities found.
-
-
-JonathanFrederick/flask-cards
-https://github.com/JonathanFrederick/flask-cards
-Entry file: flask-cards/app.py
-Scanned: 2016-10-20 12:57:30.955645
-Vulnerability 1:
-File: flask-cards/app.py
- > User input at line 20, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: flask-cards/app.py
- > Line 26: user = models.User(username=username, password=password)
-File: flask-cards/app.py
- > reaches line 29, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201)
-
-Vulnerability 2:
-File: flask-cards/app.py
- > User input at line 21, trigger word "get(":
- password = request.json.get('password')
-Reassigned in:
- File: flask-cards/app.py
- > Line 26: user = models.User(username=username, password=password)
-File: flask-cards/app.py
- > reaches line 29, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201)
-
-
-
-petersowa/flask_blog
-https://github.com/petersowa/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:57:32.467443
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-janreyho/flask-demo
-https://github.com/janreyho/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:57:34.051893
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/janreyho/flask-demo.
-
-morpy/flask_app
-https://github.com/morpy/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:57:42.599402
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/morpy/flask_app.
-
-sacktla/JOURNAL_FLASK
-https://github.com/sacktla/JOURNAL_FLASK
-Entry file: JOURNAL_FLASK/journal.py
-Scanned: 2016-10-20 12:57:45.049418
-No vulnerabilities found.
-
-
-MrRedAmber/SlackFlask
-https://github.com/MrRedAmber/SlackFlask
-Entry file: SlackFlask/k.py
-Scanned: 2016-10-20 12:57:45.577886
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-flavio99/Flask-Scaffold
-https://github.com/flavio99/Flask-Scaffold
-Entry file: None
-Scanned: 2016-10-20 12:57:47.159498
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/flavio99/Flask-Scaffold.
-
-Caveat4U/flask.docker
-https://github.com/Caveat4U/flask.docker
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:57:47.734394
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-MustafaAdam/flask_app
-https://github.com/MustafaAdam/flask_app
-Entry file: None
-Scanned: 2016-10-20 12:57:50.254812
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MustafaAdam/flask_app.
-
-huyuguo/flask_small
-https://github.com/huyuguo/flask_small
-Entry file: flask_small/small.py
-Scanned: 2016-10-20 12:57:52.571211
-No vulnerabilities found.
-
-
-michaelbahng999/dnd-flask
-https://github.com/michaelbahng999/dnd-flask
-Entry file: dnd-flask/run.py
-Scanned: 2016-10-20 12:57:53.144834
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sbarratt/flask-prometheus
-https://github.com/sbarratt/flask-prometheus
-Entry file: flask-prometheus/flask_prometheus/__init__.py
-Scanned: 2016-10-20 12:57:57.597811
-No vulnerabilities found.
-
-
-tjctw/flask_intro
-https://github.com/tjctw/flask_intro
-Entry file: flask_intro/first_app.py
-Scanned: 2016-10-20 12:58:00.116811
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py
-
-evanxg852000/flask-starter
-https://github.com/evanxg852000/flask-starter
-Entry file: flask-starter/app/__init__.py
-Scanned: 2016-10-20 12:58:02.624614
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rafaelescrich/pdf-flask
-https://github.com/rafaelescrich/pdf-flask
-Entry file: pdf-flask/app.py
-Scanned: 2016-10-20 12:58:04.360576
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wouzar/flask-microblog
-https://github.com/wouzar/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:58:05.872277
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DanielQujun/flask-web
-https://github.com/DanielQujun/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 12:58:06.377888
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-CiscoPartnerCloudRotation/sparkbot-flask
-https://github.com/CiscoPartnerCloudRotation/sparkbot-flask
-Entry file: sparkbot-flask/spark_integration.py
-Scanned: 2016-10-20 12:58:09.860889
-No vulnerabilities found.
-
-
-vennyk/flask-blog
-https://github.com/vennyk/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 12:58:10.444326
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-we444/flask-myblog
-https://github.com/we444/flask-myblog
-Entry file: flask-myblog/app/__init__.py
-Scanned: 2016-10-20 12:58:14.118909
-No vulnerabilities found.
-
-
-crhowell/plj-flask
-https://github.com/crhowell/plj-flask
-Entry file: plj-flask/app.py
-Scanned: 2016-10-20 12:58:17.686623
-Vulnerability 1:
-File: plj-flask/app.py
- > User input at line 76, trigger word "get(":
- entry = models.Entry.get(id=entry_id)
-Reassigned in:
- File: plj-flask/app.py
- > Line 92: form.title.data = entry.title
- File: plj-flask/app.py
- > Line 93: form.date.data = entry.date
- File: plj-flask/app.py
- > Line 94: form.time_spent.data = entry.time_spent
- File: plj-flask/app.py
- > Line 95: form.learned.data = entry.learned
- File: plj-flask/app.py
- > Line 96: form.resources.data = entry.resources
- File: plj-flask/app.py
- > Line 97: form.tags.data = entry.tags
- File: plj-flask/app.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id)
- File: plj-flask/app.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list'))
-File: plj-flask/app.py
- > reaches line 88, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id))
-
-Vulnerability 2:
-File: plj-flask/app.py
- > User input at line 76, trigger word "get(":
- entry = models.Entry.get(id=entry_id)
-Reassigned in:
- File: plj-flask/app.py
- > Line 92: form.title.data = entry.title
- File: plj-flask/app.py
- > Line 93: form.date.data = entry.date
- File: plj-flask/app.py
- > Line 94: form.time_spent.data = entry.time_spent
- File: plj-flask/app.py
- > Line 95: form.learned.data = entry.learned
- File: plj-flask/app.py
- > Line 96: form.resources.data = entry.resources
- File: plj-flask/app.py
- > Line 97: form.tags.data = entry.tags
- File: plj-flask/app.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id)
- File: plj-flask/app.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list'))
-File: plj-flask/app.py
- > reaches line 88, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id))
-
-Vulnerability 3:
-File: plj-flask/app.py
- > User input at line 76, trigger word "get(":
- entry = models.Entry.get(id=entry_id)
-Reassigned in:
- File: plj-flask/app.py
- > Line 92: form.title.data = entry.title
- File: plj-flask/app.py
- > Line 93: form.date.data = entry.date
- File: plj-flask/app.py
- > Line 94: form.time_spent.data = entry.time_spent
- File: plj-flask/app.py
- > Line 95: form.learned.data = entry.learned
- File: plj-flask/app.py
- > Line 96: form.resources.data = entry.resources
- File: plj-flask/app.py
- > Line 97: form.tags.data = entry.tags
- File: plj-flask/app.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id)
- File: plj-flask/app.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list'))
-File: plj-flask/app.py
- > reaches line 90, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id))
-
-Vulnerability 4:
-File: plj-flask/app.py
- > User input at line 76, trigger word "get(":
- entry = models.Entry.get(id=entry_id)
-Reassigned in:
- File: plj-flask/app.py
- > Line 92: form.title.data = entry.title
- File: plj-flask/app.py
- > Line 93: form.date.data = entry.date
- File: plj-flask/app.py
- > Line 94: form.time_spent.data = entry.time_spent
- File: plj-flask/app.py
- > Line 95: form.learned.data = entry.learned
- File: plj-flask/app.py
- > Line 96: form.resources.data = entry.resources
- File: plj-flask/app.py
- > Line 97: form.tags.data = entry.tags
- File: plj-flask/app.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id)
- File: plj-flask/app.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list'))
-File: plj-flask/app.py
- > reaches line 90, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id))
-
-Vulnerability 5:
-File: plj-flask/app.py
- > User input at line 110, trigger word "get(":
- entry = models.Entry.get(id=entry_id)
-Reassigned in:
- File: plj-flask/app.py
- > Line 114: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list'))
- File: plj-flask/app.py
- > Line 115: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list'))
-File: plj-flask/app.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('detail.html',entry=entry)
-
-
-
-bgiesa/flask-test
-https://github.com/bgiesa/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 12:58:18.714920
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-neoden/flask-nmail
-https://github.com/neoden/flask-nmail
-Entry file: flask-nmail/flask-nmail.py
-Scanned: 2016-10-20 12:58:23.052425
-No vulnerabilities found.
-
-
-vThaian/flask_example
-https://github.com/vThaian/flask_example
-Entry file: None
-Scanned: 2016-10-20 12:58:24.922662
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-helelily/flask-demo
-https://github.com/helelily/flask-demo
-Entry file: None
-Scanned: 2016-10-20 12:58:26.584605
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/helelily/flask-demo.
-
-HCT118/Flask-web
-https://github.com/HCT118/Flask-web
-Entry file: Flask-web/app/__init__.py
-Scanned: 2016-10-20 12:58:28.528027
-Vulnerability 1:
-File: Flask-web/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/main/views.py
- > Line 55: posts = pagination.items
- File: Flask-web/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-web/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Flask-web/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 45: show_followed = False
- File: Flask-web/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-web/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Flask-web/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/main/views.py
- > Line 67: posts = pagination.items
-File: Flask-web/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Flask-web/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Flask-web/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/main/views.py
- > Line 134: comments = pagination.items
- File: Flask-web/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Flask-web/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Flask-web/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flask-web/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Flask-web/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-web/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Flask-web/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flask-web/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Flask-web/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-web/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Flask-web/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/main/views.py
- > Line 246: comments = pagination.items
-File: Flask-web/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: Flask-web/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-web/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-web/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-web/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: Flask-web/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-web/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-web/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-web/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: Flask-web/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-web/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-web/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-web/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: Flask-web/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: Flask-web/app/api_1_0/users.py
- > Line 42: prev = None
- File: Flask-web/app/api_1_0/users.py
- > Line 46: next = None
-File: Flask-web/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: Flask-web/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: Flask-web/app/api_1_0/users.py
- > Line 42: prev = None
- File: Flask-web/app/api_1_0/users.py
- > Line 46: next = None
-File: Flask-web/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: Flask-web/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: Flask-web/app/api_1_0/users.py
- > Line 42: prev = None
- File: Flask-web/app/api_1_0/users.py
- > Line 46: next = None
-File: Flask-web/app/api_1_0/users.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: Flask-web/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: Flask-web/app/api_1_0/posts.py
- > Line 16: prev = None
- File: Flask-web/app/api_1_0/posts.py
- > Line 19: next = None
-File: Flask-web/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: Flask-web/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: Flask-web/app/api_1_0/posts.py
- > Line 16: prev = None
- File: Flask-web/app/api_1_0/posts.py
- > Line 19: next = None
-File: Flask-web/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: Flask-web/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: Flask-web/app/api_1_0/posts.py
- > Line 16: prev = None
- File: Flask-web/app/api_1_0/posts.py
- > Line 19: next = None
-File: Flask-web/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: Flask-web/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-web/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-web/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-web/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: Flask-web/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-web/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-web/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-web/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: Flask-web/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-web/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-web/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-web/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: Flask-web/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: Flask-web/app/api_1_0/comments.py
- > Line 43: prev = None
- File: Flask-web/app/api_1_0/comments.py
- > Line 46: next = None
-File: Flask-web/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: Flask-web/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: Flask-web/app/api_1_0/comments.py
- > Line 43: prev = None
- File: Flask-web/app/api_1_0/comments.py
- > Line 46: next = None
-File: Flask-web/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: Flask-web/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-web/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-web/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: Flask-web/app/api_1_0/comments.py
- > Line 43: prev = None
- File: Flask-web/app/api_1_0/comments.py
- > Line 46: next = None
-File: Flask-web/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-chenglinguang/flask_blog
-https://github.com/chenglinguang/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:58:29.085782
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jraaurellano/first-flask
-https://github.com/jraaurellano/first-flask
-Entry file: None
-Scanned: 2016-10-20 12:58:29.718398
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-olagodavid/Flask-project
-https://github.com/olagodavid/Flask-project
-Entry file: None
-Scanned: 2016-10-20 12:58:30.380338
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tsriram/flask-playground
-https://github.com/tsriram/flask-playground
-Entry file: flask-playground/app/__init__.py
-Scanned: 2016-10-20 12:58:30.908461
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-RatulGhosh/flask_tutorial
-https://github.com/RatulGhosh/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 12:58:33.418712
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-voltagemeeder/flask-intro
-https://github.com/voltagemeeder/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 12:58:35.021024
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rdammkoehler/root_flask
-https://github.com/rdammkoehler/root_flask
-Entry file: root_flask/n/s/f/app_factory.py
-Scanned: 2016-10-20 12:58:44.808906
-No vulnerabilities found.
-
-
-aniruddhabarapatre/flask-microblog
-https://github.com/aniruddhabarapatre/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:58:45.318275
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shutdown57/learning_flask
-https://github.com/shutdown57/learning_flask
-Entry file: learning_flask/src/app.py
-Scanned: 2016-10-20 12:58:48.588649
-Vulnerability 1:
-File: learning_flask/src/users/views.py
- > User input at line 79, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/src/users/views.py
- > Line 83: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/src/users/views.py
- > Line 84: places = p.query(address)
- File: learning_flask/src/users/views.py
- > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/src/users/views.py
- > Line 71: places = []
- File: learning_flask/src/users/views.py
- > Line 72: my_coordinates = (37.4221, -122.0844)
- File: learning_flask/src/users/views.py
- > Line 76: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/src/users/views.py
- > reaches line 87, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-Vulnerability 2:
-File: learning_flask/src/users/views.py
- > User input at line 79, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/src/users/views.py
- > Line 83: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/src/users/views.py
- > Line 84: places = p.query(address)
- File: learning_flask/src/users/views.py
- > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/src/users/views.py
- > Line 71: places = []
- File: learning_flask/src/users/views.py
- > Line 72: my_coordinates = (37.4221, -122.0844)
- File: learning_flask/src/users/views.py
- > Line 76: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/src/users/views.py
- > reaches line 90, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-
-
-KeyJia/Flask-Python
-https://github.com/KeyJia/Flask-Python
-Entry file: Flask-Python/Flask.py
-Scanned: 2016-10-20 12:58:49.123906
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GuanYQ0926/flask-restful
-https://github.com/GuanYQ0926/flask-restful
-Entry file: flask-restful/app.py
-Scanned: 2016-10-20 12:58:50.489618
-Vulnerability 1:
-File: flask-restful/app.py
- > User input at line 72, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flask-restful/app.py
- > reaches line 79, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-kuaiwu/MyFlask
-https://github.com/kuaiwu/MyFlask
-Entry file: MyFlask/app/__init__.py
-Scanned: 2016-10-20 12:58:52.580361
-Vulnerability 1:
-File: MyFlask/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/main/views.py
- > Line 55: posts = pagination.items
- File: MyFlask/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlask/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: MyFlask/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 45: show_followed = False
- File: MyFlask/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlask/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: MyFlask/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/main/views.py
- > Line 67: posts = pagination.items
-File: MyFlask/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: MyFlask/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: MyFlask/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/main/views.py
- > Line 134: comments = pagination.items
- File: MyFlask/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: MyFlask/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: MyFlask/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: MyFlask/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: MyFlask/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlask/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: MyFlask/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: MyFlask/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: MyFlask/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlask/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: MyFlask/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/main/views.py
- > Line 246: comments = pagination.items
-File: MyFlask/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: MyFlask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlask/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlask/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: MyFlask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlask/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlask/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: MyFlask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlask/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlask/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: MyFlask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlask/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlask/app/api_1_0/users.py
- > Line 46: next = None
-File: MyFlask/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: MyFlask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlask/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlask/app/api_1_0/users.py
- > Line 46: next = None
-File: MyFlask/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: MyFlask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlask/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlask/app/api_1_0/users.py
- > Line 46: next = None
-File: MyFlask/app/api_1_0/users.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: MyFlask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlask/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlask/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: MyFlask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlask/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlask/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: MyFlask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlask/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlask/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: MyFlask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlask/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: MyFlask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlask/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: MyFlask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlask/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: MyFlask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlask/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlask/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: MyFlask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlask/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlask/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: MyFlask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlask/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlask/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-Tangugo/flask_learn
-https://github.com/Tangugo/flask_learn
-Entry file: flask_learn/hello.py
-Scanned: 2016-10-20 12:58:53.132786
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-upbit/flask_whiteboard
-https://github.com/upbit/flask_whiteboard
-Entry file: flask_whiteboard/main.py
-Scanned: 2016-10-20 12:58:58.145570
-Vulnerability 1:
-File: flask_whiteboard/main.py
- > User input at line 41, trigger word "get(":
- word = request.method == 'POST'request.form['word']request.args.get('word')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 46: word = word.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 51: segments = jieba.cut_for_search(word)
- File: flask_whiteboard/main.py
- > Line 53: segments = jieba.cut(word,cut_all=True)
- File: flask_whiteboard/main.py
- > Line 55: segments = jieba.cut(word)
- File: flask_whiteboard/main.py
- > Line 57: segments = mmseg.seg_txt(word)
- File: flask_whiteboard/main.py
- > Line 59: segments = mmseg.search.seg_txt_search(word)
- File: flask_whiteboard/main.py
- > Line 62: result = ', '.join(segments)
- File: flask_whiteboard/main.py
- > Line 65: result = result.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 69: content = result
- File: flask_whiteboard/main.py
- > Line 71: content += ' ' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2))
- File: flask_whiteboard/main.py
- > Line 74: word = ''
- File: flask_whiteboard/main.py
- > Line 77: content += '支持的模式: jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式 mmseg: /mm mmseg模式; /mms mmseg.search模式'
-File: flask_whiteboard/main.py
- > reaches line 76, trigger word "url_for(":
- content = '请在地址栏后或输入框中,输入要分词的内容 例如: %s
' % (url_for('cut_words',word=EXAMPLE_WORDS).encode('utf8'), '/cut/' + EXAMPLE_WORDS)
-
-Vulnerability 2:
-File: flask_whiteboard/main.py
- > User input at line 41, trigger word "form[":
- word = request.method == 'POST'request.form['word']request.args.get('word')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 46: word = word.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 51: segments = jieba.cut_for_search(word)
- File: flask_whiteboard/main.py
- > Line 53: segments = jieba.cut(word,cut_all=True)
- File: flask_whiteboard/main.py
- > Line 55: segments = jieba.cut(word)
- File: flask_whiteboard/main.py
- > Line 57: segments = mmseg.seg_txt(word)
- File: flask_whiteboard/main.py
- > Line 59: segments = mmseg.search.seg_txt_search(word)
- File: flask_whiteboard/main.py
- > Line 62: result = ', '.join(segments)
- File: flask_whiteboard/main.py
- > Line 65: result = result.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 69: content = result
- File: flask_whiteboard/main.py
- > Line 71: content += ' ' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2))
- File: flask_whiteboard/main.py
- > Line 74: word = ''
- File: flask_whiteboard/main.py
- > Line 77: content += '支持的模式: jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式 mmseg: /mm mmseg模式; /mms mmseg.search模式'
-File: flask_whiteboard/main.py
- > reaches line 76, trigger word "url_for(":
- content = '请在地址栏后或输入框中,输入要分词的内容 例如: %s
' % (url_for('cut_words',word=EXAMPLE_WORDS).encode('utf8'), '/cut/' + EXAMPLE_WORDS)
-
-Vulnerability 3:
-File: flask_whiteboard/main.py
- > User input at line 41, trigger word "get(":
- word = request.method == 'POST'request.form['word']request.args.get('word')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 46: word = word.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 51: segments = jieba.cut_for_search(word)
- File: flask_whiteboard/main.py
- > Line 53: segments = jieba.cut(word,cut_all=True)
- File: flask_whiteboard/main.py
- > Line 55: segments = jieba.cut(word)
- File: flask_whiteboard/main.py
- > Line 57: segments = mmseg.seg_txt(word)
- File: flask_whiteboard/main.py
- > Line 59: segments = mmseg.search.seg_txt_search(word)
- File: flask_whiteboard/main.py
- > Line 62: result = ', '.join(segments)
- File: flask_whiteboard/main.py
- > Line 65: result = result.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 69: content = result
- File: flask_whiteboard/main.py
- > Line 71: content += ' ' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2))
- File: flask_whiteboard/main.py
- > Line 74: word = ''
- File: flask_whiteboard/main.py
- > Line 77: content += '支持的模式: jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式 mmseg: /mm mmseg模式; /mms mmseg.search模式'
-File: flask_whiteboard/main.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试')
-
-Vulnerability 4:
-File: flask_whiteboard/main.py
- > User input at line 41, trigger word "form[":
- word = request.method == 'POST'request.form['word']request.args.get('word')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 46: word = word.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 51: segments = jieba.cut_for_search(word)
- File: flask_whiteboard/main.py
- > Line 53: segments = jieba.cut(word,cut_all=True)
- File: flask_whiteboard/main.py
- > Line 55: segments = jieba.cut(word)
- File: flask_whiteboard/main.py
- > Line 57: segments = mmseg.seg_txt(word)
- File: flask_whiteboard/main.py
- > Line 59: segments = mmseg.search.seg_txt_search(word)
- File: flask_whiteboard/main.py
- > Line 62: result = ', '.join(segments)
- File: flask_whiteboard/main.py
- > Line 65: result = result.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 69: content = result
- File: flask_whiteboard/main.py
- > Line 71: content += ' ' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2))
- File: flask_whiteboard/main.py
- > Line 74: word = ''
- File: flask_whiteboard/main.py
- > Line 77: content += '支持的模式: jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式 mmseg: /mm mmseg模式; /mms mmseg.search模式'
-File: flask_whiteboard/main.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试')
-
-Vulnerability 5:
-File: flask_whiteboard/main.py
- > User input at line 43, trigger word "get(":
- mode = request.method == 'POST'request.form['mode']request.args.get('mode')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 48: mode = 'mms'
- File: flask_whiteboard/main.py
- > Line 75: mode = ''
-File: flask_whiteboard/main.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试')
-
-Vulnerability 6:
-File: flask_whiteboard/main.py
- > User input at line 43, trigger word "form[":
- mode = request.method == 'POST'request.form['mode']request.args.get('mode')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 48: mode = 'mms'
- File: flask_whiteboard/main.py
- > Line 75: mode = ''
-File: flask_whiteboard/main.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试')
-
-Vulnerability 7:
-File: flask_whiteboard/main.py
- > User input at line 87, trigger word "get(":
- word = request.method == 'POST'request.form['word']request.args.get('word')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 90: word = word.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 91: segments = ['%s/%s' % (w, f) for (w, f) in pseg.cut(word)]
- File: flask_whiteboard/main.py
- > Line 95: word = ''
-File: flask_whiteboard/main.py
- > reaches line 98, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, content=content, title='Jieba词性标注测试')
-
-Vulnerability 8:
-File: flask_whiteboard/main.py
- > User input at line 87, trigger word "form[":
- word = request.method == 'POST'request.form['word']request.args.get('word')
-Reassigned in:
- File: flask_whiteboard/main.py
- > Line 90: word = word.encode('utf-8')
- File: flask_whiteboard/main.py
- > Line 91: segments = ['%s/%s' % (w, f) for (w, f) in pseg.cut(word)]
- File: flask_whiteboard/main.py
- > Line 95: word = ''
-File: flask_whiteboard/main.py
- > reaches line 98, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, content=content, title='Jieba词性标注测试')
-
-
-
-python-ning/flask_blog
-https://github.com/python-ning/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 12:59:00.866911
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kenju254/flask-microblog
-https://github.com/kenju254/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 12:59:03.369548
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chloebecker/flask-tutorial
-https://github.com/chloebecker/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 12:59:04.880092
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-4dsolutions/tiny_flask
-https://github.com/4dsolutions/tiny_flask
-Entry file: tiny_flask/flask_app.py
-Scanned: 2016-10-20 12:59:07.690638
-No vulnerabilities found.
-
-
-EduhG/Flask-App
-https://github.com/EduhG/Flask-App
-Entry file: Flask-App/app/flaskapp/__init__.py
-Scanned: 2016-10-20 12:59:09.150171
-No vulnerabilities found.
-
-
-submorphic/hello-flask
-https://github.com/submorphic/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 12:59:09.767080
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-jmontroy90/first-flask
-https://github.com/jmontroy90/first-flask
-Entry file: None
-Scanned: 2016-10-20 12:59:11.301923
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-szomolanyi/flask-base
-https://github.com/szomolanyi/flask-base
-Entry file: None
-Scanned: 2016-10-20 12:59:13.855546
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/szomolanyi/flask-base.
-
-DGideas/flask_microservice
-https://github.com/DGideas/flask_microservice
-Entry file: flask_microservice/main.py
-Scanned: 2016-10-20 12:59:18.186308
-No vulnerabilities found.
-
-
-johnngugi/flask-assesment
-https://github.com/johnngugi/flask-assesment
-Entry file: flask-assesment/app/__init__.py
-Scanned: 2016-10-20 12:59:20.819821
-No vulnerabilities found.
-
-
-lieuhon/First-Flask
-https://github.com/lieuhon/First-Flask
-Entry file: First-Flask/app/__init__.py
-Scanned: 2016-10-20 12:59:23.774836
-Vulnerability 1:
-File: First-Flask/app/mod_auth/views.py
- > User input at line 33, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: First-Flask/app/mod_auth/views.py
- > Line 37: session['user_id'] = user.id
-File: First-Flask/app/mod_auth/views.py
- > reaches line 39, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-YuliYaSokolova/microservices_flask
-https://github.com/YuliYaSokolova/microservices_flask
-Entry file: microservices_flask/rating_route.py
-Scanned: 2016-10-20 12:59:25.482766
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: microservices_flask/.envi/lib/python3.4/struct.py
-
-nenodias/flask-bigapp
-https://github.com/nenodias/flask-bigapp
-Entry file: flask-bigapp/app/__init__.py
-Scanned: 2016-10-20 12:59:27.820807
-No vulnerabilities found.
-
-
-rezastd/flask_two
-https://github.com/rezastd/flask_two
-Entry file: flask_two/app.py
-Scanned: 2016-10-20 12:59:28.721677
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_two/venv/lib/python2.7/genericpath.py
-
-wuruthie/FirstFlask
-https://github.com/wuruthie/FirstFlask
-Entry file: FirstFlask/app.py
-Scanned: 2016-10-20 12:59:29.304274
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py
-
-ahoff314/geet
-https://github.com/ahoff314/geet
-Entry file: geet/geet/app/main.py
-Scanned: 2016-10-20 12:59:37.019660
-No vulnerabilities found.
-
-
-patoupatou/microblog
-https://github.com/patoupatou/microblog
-Entry file: None
-Scanned: 2016-10-20 12:59:37.549702
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-csyouk/faust-register-py
-https://github.com/csyouk/faust-register-py
-Entry file: faust-register-py/register_server.py
-Scanned: 2016-10-20 12:59:41.348032
-Vulnerability 1:
-File: faust-register-py/register_server.py
- > User input at line 56, trigger word "form[":
- session = game.find_session(request.form['session'])
-Reassigned in:
- File: faust-register-py/register_server.py
- > Line 53: session = []
-File: faust-register-py/register_server.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count)
-
-Vulnerability 2:
-File: faust-register-py/register_server.py
- > User input at line 57, trigger word "form[":
- player_list = player.get_all_player(request.form['session'])
-Reassigned in:
- File: faust-register-py/register_server.py
- > Line 52: player_list = []
-File: faust-register-py/register_server.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count)
-
-Vulnerability 3:
-File: faust-register-py/register_server.py
- > User input at line 58, trigger word "form[":
- player_count = player.get_count(request.form['session'])
-Reassigned in:
- File: faust-register-py/register_server.py
- > Line 54: player_count = 0
-File: faust-register-py/register_server.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count)
-
-Vulnerability 4:
-File: faust-register-py/register_server.py
- > User input at line 139, trigger word "get(":
- error_type = request.args.get('error_type')
-File: faust-register-py/register_server.py
- > reaches line 142, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('alert.html',error_type=error_type)
-
-
-
-krandmm/firstapp
-https://github.com/krandmm/firstapp
-Entry file: None
-Scanned: 2016-10-20 12:59:43.890872
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/krandmm/firstapp.
-
-jasonboykin/headlines
-https://github.com/jasonboykin/headlines
-Entry file: headlines/headlines.py
-Scanned: 2016-10-20 12:59:45.413726
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-theparadoxer02/flask
-https://github.com/theparadoxer02/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:59:49.521307
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-alazar-gm/flask
-https://github.com/alazar-gm/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:59:50.164899
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-krasytod/flask
-https://github.com/krasytod/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:59:51.788486
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-saiprakashreddymarasani/flask
-https://github.com/saiprakashreddymarasani/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:59:53.364824
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-yinqiaoyicjx/flask
-https://github.com/yinqiaoyicjx/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 12:59:53.952794
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-zakzou/flask-weixin-pay
-https://github.com/zakzou/flask-weixin-pay
-Entry file: flask-weixin-pay/example.py
-Scanned: 2016-10-20 13:00:01.926478
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hitakaken/flask-wechat
-https://github.com/hitakaken/flask-wechat
-Entry file: flask-wechat/fenghuang/__init__.py
-Scanned: 2016-10-20 13:00:03.439681
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-benman1/tensorflow_flask
-https://github.com/benman1/tensorflow_flask
-Entry file: tensorflow_flask/api.py
-Scanned: 2016-10-20 13:00:07.355533
-No vulnerabilities found.
-
-
-freakxx/flaskdemo
-https://github.com/freakxx/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:00:08.874885
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Baindaer/flaskr
-https://github.com/Baindaer/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:00:10.385264
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lindentao/flaskr
-https://github.com/lindentao/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:00:11.893175
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-demory191/flasktaskr
-https://github.com/demory191/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:00:14.454855
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Daylightmazekun/flaskfollow
-https://github.com/Daylightmazekun/flaskfollow
-Entry file: flaskfollow/app/__init__.py
-Scanned: 2016-10-20 13:00:19.572787
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-0x24a537r9/flasktest
-https://github.com/0x24a537r9/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:00:20.084994
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tw7613781/flasky
-https://github.com/tw7613781/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:00:21.599952
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mcquam/flasktaskr
-https://github.com/mcquam/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:00:23.143134
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lxw15337674/flasklearn
-https://github.com/lxw15337674/flasklearn
-Entry file: flasklearn/flasklearn.py
-Scanned: 2016-10-20 13:00:34.061410
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Sventenhaaf/flasktries
-https://github.com/Sventenhaaf/flasktries
-Entry file: flasktries/app.py
-Scanned: 2016-10-20 13:00:40.931831
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasktries/env/lib/python2.7/genericpath.py
-
-liangfei2016x/flaskweb
-https://github.com/liangfei2016x/flaskweb
-Entry file: None
-Scanned: 2016-10-20 13:00:41.445197
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-manuellah/flaskapp
-https://github.com/manuellah/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:00:41.989544
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/manuellah/flaskapp.
-
-musarahm/flaskbook
-https://github.com/musarahm/flaskbook
-Entry file: flaskbook/premier.py
-Scanned: 2016-10-20 13:00:42.556599
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py
-
-qhdong/flasky
-https://github.com/qhdong/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:00:43.065680
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wuqingwuqingwu/flaskk
-https://github.com/wuqingwuqingwu/flaskk
-Entry file: flaskk/hello.py
-Scanned: 2016-10-20 13:00:43.659873
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/genericpath.py
-
-Katebasoft/Flaskr
-https://github.com/Katebasoft/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 13:00:44.684778
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zangree/flaskytest
-https://github.com/zangree/flaskytest
-Entry file: flaskytest/app.py
-Scanned: 2016-10-20 13:00:46.025531
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-he1chenglong/flasktest
-https://github.com/he1chenglong/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:00:46.550043
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-omegayang/flasklearn
-https://github.com/omegayang/flasklearn
-Entry file: flasklearn/flasklearn.py
-Scanned: 2016-10-20 13:00:47.085131
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ranchow/flaskapp
-https://github.com/ranchow/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:00:49.619971
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ranchow/flaskapp.
-
-fbreversg/flaskify
-https://github.com/fbreversg/flaskify
-Entry file: flaskify/flaskify.py
-Scanned: 2016-10-20 13:00:50.157195
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-1dot75cm/flasky
-https://github.com/1dot75cm/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:00:52.660774
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ethan-funny/flask-todo-app
-https://github.com/ethan-funny/flask-todo-app
-Entry file: flask-todo-app/application/app.py
-Scanned: 2016-10-20 13:00:55.660268
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-karchevz/FlaskTasker
-https://github.com/karchevz/FlaskTasker
-Entry file: FlaskTasker/extras/views.py
-Scanned: 2016-10-20 13:00:57.182960
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jghess/flaskTrain
-https://github.com/jghess/flaskTrain
-Entry file: flaskTrain/app.py
-Scanned: 2016-10-20 13:00:58.472092
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wwxFromTju/python-flask
-https://github.com/wwxFromTju/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 13:01:03.470148
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Elsis-Sitati/flask-login
-https://github.com/Elsis-Sitati/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-20 13:01:05.089981
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-allbegray/flask_mvc
-https://github.com/allbegray/flask_mvc
-Entry file: flask_mvc/app.py
-Scanned: 2016-10-20 13:01:07.513157
-Vulnerability 1:
-File: flask_mvc/app.py
- > User input at line 41, trigger word "get(":
- board = Board.query.get(id)
-Reassigned in:
- File: flask_mvc/app.py
- > Line 42: form = BoardInsertForm(csrf_enabled=False, obj=board)
-File: flask_mvc/app.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form)
-
-Vulnerability 2:
-File: flask_mvc/app.py
- > User input at line 50, trigger word ".data":
- id = form.id.data
-Reassigned in:
- File: flask_mvc/app.py
- > Line 55: id = b.id
- File: flask_mvc/app.py
- > Line 58: board = Board.query.get(id)
- File: flask_mvc/app.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form)
-File: flask_mvc/app.py
- > reaches line 64, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id))
-
-Vulnerability 3:
-File: flask_mvc/app.py
- > User input at line 52, trigger word ".data":
- b = Board(title=form.title.data, content=form.content.data)
-Reassigned in:
- File: flask_mvc/app.py
- > Line 55: id = b.id
- File: flask_mvc/app.py
- > Line 58: board = Board.query.get(id)
- File: flask_mvc/app.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form)
- File: flask_mvc/app.py
- > Line 50: id = form.id.data
-File: flask_mvc/app.py
- > reaches line 64, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id))
-
-Vulnerability 4:
-File: flask_mvc/app.py
- > User input at line 50, trigger word ".data":
- id = form.id.data
-Reassigned in:
- File: flask_mvc/app.py
- > Line 55: id = b.id
- File: flask_mvc/app.py
- > Line 58: board = Board.query.get(id)
- File: flask_mvc/app.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form)
-File: flask_mvc/app.py
- > reaches line 64, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id))
-
-Vulnerability 5:
-File: flask_mvc/app.py
- > User input at line 52, trigger word ".data":
- b = Board(title=form.title.data, content=form.content.data)
-Reassigned in:
- File: flask_mvc/app.py
- > Line 55: id = b.id
- File: flask_mvc/app.py
- > Line 58: board = Board.query.get(id)
- File: flask_mvc/app.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form)
- File: flask_mvc/app.py
- > Line 50: id = form.id.data
-File: flask_mvc/app.py
- > reaches line 64, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id))
-
-Vulnerability 6:
-File: flask_mvc/app.py
- > User input at line 71, trigger word "get(":
- board = Board.query.get(id)
-File: flask_mvc/app.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('board/board_view.html',board=board)
-
-
-
-MustafaAdam/flask_app
-https://github.com/MustafaAdam/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:01:09.044055
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MustafaAdam/flask_app.
-
-osnagovskyi/flask_tutorial
-https://github.com/osnagovskyi/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 13:01:10.571841
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-greenoneo0/arduFlask
-https://github.com/greenoneo0/arduFlask
-Entry file: arduFlask/run.py
-Scanned: 2016-10-20 13:01:13.007710
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-huyuguo/flask_small
-https://github.com/huyuguo/flask_small
-Entry file: flask_small/small.py
-Scanned: 2016-10-20 13:01:15.316457
-No vulnerabilities found.
-
-
-no140/flask-demo
-https://github.com/no140/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:01:20.334462
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/no140/flask-demo.
-
-EduhG/Discovering-Flask
-https://github.com/EduhG/Discovering-Flask
-Entry file: Discovering-Flask/app.py
-Scanned: 2016-10-20 13:01:28.610774
-No vulnerabilities found.
-
-
-Kentovski/Flask_Battlefield
-https://github.com/Kentovski/Flask_Battlefield
-Entry file: Flask_Battlefield/server.py
-Scanned: 2016-10-20 13:01:30.075783
-Vulnerability 1:
-File: Flask_Battlefield/server.py
- > User input at line 16, trigger word "form[":
- armies_num = int(request.form['armies_num'])
-Reassigned in:
- File: Flask_Battlefield/server.py
- > Line 18: battlefield = factory.create_battlefield(armies_num)
-File: Flask_Battlefield/server.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',result=battlefield.start())
-
-
-
-per19/crud-flask
-https://github.com/per19/crud-flask
-Entry file: crud-flask/main.py
-Scanned: 2016-10-20 13:01:31.534343
-No vulnerabilities found.
-
-
-calsaviour/flask-blog
-https://github.com/calsaviour/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:01:35.106588
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-zhangshaofu/BestFlask
-https://github.com/zhangshaofu/BestFlask
-Entry file: BestFlask/BestFlask.py
-Scanned: 2016-10-20 13:01:42.419521
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tjgrist/Flask-psql
-https://github.com/tjgrist/Flask-psql
-Entry file: Flask-psql/app.py
-Scanned: 2016-10-20 13:01:43.842749
-Vulnerability 1:
-File: Flask-psql/todo.py
- > User input at line 39, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: Flask-psql/todo.py
- > reaches line 46, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-hsyyf/flask_blog
-https://github.com/hsyyf/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:01:44.376133
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-eswizardry/flask-blog
-https://github.com/eswizardry/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:01:44.973505
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-yeongseon/Python_Flask
-https://github.com/yeongseon/Python_Flask
-Entry file: Python_Flask/SQLAlchemy/run.py
-Scanned: 2016-10-20 13:01:46.919908
-No vulnerabilities found.
-
-
-wonwooddo/flask_proj
-https://github.com/wonwooddo/flask_proj
-Entry file: flask_proj/flask_chart/routes.py
-Scanned: 2016-10-20 13:01:54.543661
-No vulnerabilities found.
-
-
-tsilevych/flask_test
-https://github.com/tsilevych/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 13:01:55.170263
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chloebecker/flask-tutorial
-https://github.com/chloebecker/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 13:01:55.670460
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ilyaLibin/flask-videostreaming
-https://github.com/ilyaLibin/flask-videostreaming
-Entry file: flask-videostreaming/main.py
-Scanned: 2016-10-20 13:02:04.480915
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-remcohaszing/flask-openapi
-https://github.com/remcohaszing/flask-openapi
-Entry file: flask-openapi/example/app.py
-Scanned: 2016-10-20 13:02:06.037732
-No vulnerabilities found.
-
-
-epiedad/flask-blog
-https://github.com/epiedad/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:02:06.576382
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-travisoneill/algo-flask
-https://github.com/travisoneill/algo-flask
-Entry file: algo-flask/flask_server.py
-Scanned: 2016-10-20 13:02:08.002709
-No vulnerabilities found.
-
-
-doublenns/flask_playground
-https://github.com/doublenns/flask_playground
-Entry file: flask_playground/hello_world.py
-Scanned: 2016-10-20 13:02:08.534614
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-j99d99/Flask_Web
-https://github.com/j99d99/Flask_Web
-Entry file: Flask_Web/app_models/app/__init__.py
-Scanned: 2016-10-20 13:02:10.350372
-No vulnerabilities found.
-
-
-karchevz/flask-blog
-https://github.com/karchevz/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:02:10.911382
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-rohrmic1/flask-intro
-https://github.com/rohrmic1/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 13:02:11.415412
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yubo1911/flask-upload
-https://github.com/yubo1911/flask-upload
-Entry file: flask-upload/index.py
-Scanned: 2016-10-20 13:02:11.923865
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arquenum13/Flask-Demo
-https://github.com/arquenum13/Flask-Demo
-Entry file: None
-Scanned: 2016-10-20 13:02:12.440204
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/arquenum13/Flask-Demo.
-
-MedericFourmy/flask_introduction
-https://github.com/MedericFourmy/flask_introduction
-Entry file: flask_introduction/quickstart/quickstart.py
-Scanned: 2016-10-20 13:02:13.949273
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-palapython/Flask-Web
-https://github.com/palapython/Flask-Web
-Entry file: Flask-Web/hello.py
-Scanned: 2016-10-20 13:02:15.798489
-No vulnerabilities found.
-
-
-Remmyjay/flask_app
-https://github.com/Remmyjay/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:02:16.339779
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Remmyjay/flask_app.
-
-musarahm/flask_blog
-https://github.com/musarahm/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:02:18.876252
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AnHeBridge/pyweb_flask
-https://github.com/AnHeBridge/pyweb_flask
-Entry file: pyweb_flask/app/__init__.py
-Scanned: 2016-10-20 13:02:21.301867
-No vulnerabilities found.
-
-
-Yu-Shuhua/flask-micblog
-https://github.com/Yu-Shuhua/flask-micblog
-Entry file: None
-Scanned: 2016-10-20 13:02:38.499824
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-KillianDavitt/Flask-Boilerplate
-https://github.com/KillianDavitt/Flask-Boilerplate
-Entry file: Flask-Boilerplate/flaskapp.py
-Scanned: 2016-10-20 13:02:39.045956
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-RunKen/learnFlask
-https://github.com/RunKen/learnFlask
-Entry file: None
-Scanned: 2016-10-20 13:02:42.556636
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/RunKen/learnFlask.
-
-aleccunningham/flask-registration
-https://github.com/aleccunningham/flask-registration
-Entry file: flask-registration/views.py
-Scanned: 2016-10-20 13:02:44.904355
-No vulnerabilities found.
-
-
-wuruthie/FirstFlask
-https://github.com/wuruthie/FirstFlask
-Entry file: FirstFlask/app.py
-Scanned: 2016-10-20 13:02:45.476250
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py
-
-joe62/flask_helloworld
-https://github.com/joe62/flask_helloworld
-Entry file: flask_helloworld/flask_helloworld.py
-Scanned: 2016-10-20 13:02:45.985714
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bukhonenko/flask-blog
-https://github.com/bukhonenko/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:02:47.032754
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-njoyce/flask-letsencrypt
-https://github.com/njoyce/flask-letsencrypt
-Entry file: flask-letsencrypt/flask_letsencrypt/__init__.py
-Scanned: 2016-10-20 13:02:48.471294
-No vulnerabilities found.
-
-
-theglassbean/flask-blog
-https://github.com/theglassbean/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:02:56.025401
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-nitin42/Flask-REST
-https://github.com/nitin42/Flask-REST
-Entry file: Flask-REST/main.py
-Scanned: 2016-10-20 13:02:57.356720
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AngelMunoz/FlaskWebProjects
-https://github.com/AngelMunoz/FlaskWebProjects
-Entry file: FlaskWebProjects/FlaskBlueprintAPI/FlaskBlueprintAPI/__init__.py
-Scanned: 2016-10-20 13:03:04.770833
-No vulnerabilities found.
-
-
-brizow/FlaskBookmarkSite
-https://github.com/brizow/FlaskBookmarkSite
-Entry file: FlaskBookmarkSite/FlaskAdvancedTutorial/FlaskAdvancedTutorial/__init__.py
-Scanned: 2016-10-20 13:03:12.358595
-Vulnerability 1:
-File: FlaskBookmarkSite/FlaskAdvancedTutorial/FlaskAdvancedTutorial/views.py
- > User input at line 52, trigger word ".data":
- description = form.description.data
-File: FlaskBookmarkSite/FlaskAdvancedTutorial/FlaskAdvancedTutorial/views.py
- > reaches line 54, trigger word "flash(":
- flash('Stored '{}''.format(description))
-
-
-
-Kryvonis/SimpleLargeAppFlask
-https://github.com/Kryvonis/SimpleLargeAppFlask
-Entry file: SimpleLargeAppFlask/app/__init__.py
-Scanned: 2016-10-20 13:03:13.752607
-No vulnerabilities found.
-
-
-vlfedotov/server_client_flask
-https://github.com/vlfedotov/server_client_flask
-Entry file: server_client_flask/server.py
-Scanned: 2016-10-20 13:03:15.067365
-No vulnerabilities found.
-
-
-justinpezzack/flask-app-js
-https://github.com/justinpezzack/flask-app-js
-Entry file: flask-app-js/app/__init__.py
-Scanned: 2016-10-20 13:03:16.733193
-No vulnerabilities found.
-
-
-bekkam/flask-script-practice
-https://github.com/bekkam/flask-script-practice
-Entry file: flask-script-practice/myapp.py
-Scanned: 2016-10-20 13:03:18.038622
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coding-happily/Dive-into-Flask
-https://github.com/coding-happily/Dive-into-Flask
-Entry file: Dive-into-Flask/main.py
-Scanned: 2016-10-20 13:03:20.877106
-No vulnerabilities found.
-
-
-iruwl/sample-python-flask-rest
-https://github.com/iruwl/sample-python-flask-rest
-Entry file: sample-python-flask-rest/todo-api/app.py
-Scanned: 2016-10-20 13:03:28.397402
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: sample-python-flask-rest/todo-api/flask/lib/python2.7/genericpath.py
-
-yoophi/flask-thumbnail-test
-https://github.com/yoophi/flask-thumbnail-test
-Entry file: flask-thumbnail-test/app/__init__.py
-Scanned: 2016-10-20 13:03:31.010782
-No vulnerabilities found.
-
-
-roselmamendes/security-on-flask
-https://github.com/roselmamendes/security-on-flask
-Entry file: security-on-flask/black_girls/black_girls_app.py
-Scanned: 2016-10-20 13:03:32.491354
-Vulnerability 1:
-File: security-on-flask/black_girls/black_girls_app.py
- > User input at line 33, trigger word "get(":
- token = request.headers.get('Authorization')
-Reassigned in:
- File: security-on-flask/black_girls/black_girls_app.py
- > Line 35: id = decode_token(token)
- File: security-on-flask/black_girls/black_girls_app.py
- > Line 36: ret_MAYBE_FUNCTION_NAME = girl_by_id(id)
-File: security-on-flask/black_girls/black_girls_app.py
- > reaches line 34, trigger word "replace(":
- token = tokentoken.replace('Basic', '', 1)''
-
-
-
-fabian-rump/flask_modular_auth
-https://github.com/fabian-rump/flask_modular_auth
-Entry file: flask_modular_auth/tests/modular_auth_test_case.py
-Scanned: 2016-10-20 13:03:34.056435
-No vulnerabilities found.
-
-
-timmyreilly/introduction-to-flask
-https://github.com/timmyreilly/introduction-to-flask
-Entry file: introduction-to-flask/hello.py
-Scanned: 2016-10-20 13:03:38.213644
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jacksonyoudi/flask
-https://github.com/jacksonyoudi/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:03:39.357295
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-jamesd3ao/Flask
-https://github.com/jamesd3ao/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:03:39.867458
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-berstearns/flask
-https://github.com/berstearns/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:03:40.500294
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-kkltcjk/flask
-https://github.com/kkltcjk/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:03:41.078612
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-hit9/flask-docjson
-https://github.com/hit9/flask-docjson
-Entry file: flask-docjson/example.py
-Scanned: 2016-10-20 13:03:42.893978
-No vulnerabilities found.
-
-
-on3iro/cookiecutter-flask
-https://github.com/on3iro/cookiecutter-flask
-Entry file: None
-Scanned: 2016-10-20 13:03:43.450794
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/on3iro/cookiecutter-flask.
-
-DanielTimLee/flask_tutorial
-https://github.com/DanielTimLee/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 13:03:43.947319
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lbx6z-2/flaskr
-https://github.com/lbx6z-2/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:03:44.454270
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Daylightmazekun/flaskfollow
-https://github.com/Daylightmazekun/flaskfollow
-Entry file: flaskfollow/app/__init__.py
-Scanned: 2016-10-20 13:03:45.003223
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-trevorwitter/flaskr
-https://github.com/trevorwitter/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:03:45.515795
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-26huitailang/flaskr
-https://github.com/26huitailang/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:03:46.021213
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-caser789/flaskrr
-https://github.com/caser789/flaskrr
-Entry file: flaskrr/flaskr/flaskr.py
-Scanned: 2016-10-20 13:03:47.875740
-No vulnerabilities found.
-
-
-xuxiaoxing/flasky
-https://github.com/xuxiaoxing/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:03:48.393342
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EenTang/flaskdev
-https://github.com/EenTang/flaskdev
-Entry file: flaskdev/app/__init__.py
-Scanned: 2016-10-20 13:04:03.683335
-Vulnerability 1:
-File: flaskdev/app/main/views.py
- > User input at line 17, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 15: show_followed = False
-File: flaskdev/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskdev/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 23: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 26: posts = pagination.items
-File: flaskdev/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskdev/app/main/views.py
- > User input at line 61, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 63: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskdev/app/main/views.py
- > Line 65: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 68: comments = pagination.items
- File: flaskdev/app/main/views.py
- > Line 60: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskdev/app/main/views.py
- > reaches line 70, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',comments=comments, posts=[post], form=form, pagination=pagination)
-
-Vulnerability 4:
-File: flaskdev/app/main/views.py
- > User input at line 78, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 79: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 82: comments = pagination.items
-File: flaskdev/app/main/views.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 5:
-File: flaskdev/app/main/views.py
- > User input at line 133, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 134: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 137: posts = pagination.items
-File: flaskdev/app/main/views.py
- > reaches line 138, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 6:
-File: flaskdev/app/main/views.py
- > User input at line 224, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 225: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 228: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskdev/app/main/views.py
- > Line 223: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskdev/app/main/views.py
- > reaches line 230, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='的关注者', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskdev/app/main/views.py
- > User input at line 241, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 242: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 245: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskdev/app/main/views.py
- > Line 240: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskdev/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注的人', endpoint='.followed', pagination=pagination, follows=follows)
-
-Vulnerability 8:
-File: flaskdev/app/main/forms.py
- > User input at line 28, trigger word "files[":
- fileobj = request.files['upload']
-Reassigned in:
- File: flaskdev/app/main/forms.py
- > Line 29: fname = os.path.splitext(fileobj.filename)
- File: flaskdev/app/main/forms.py
- > Line 29: fext = os.path.splitext(fileobj.filename)
- File: flaskdev/app/main/forms.py
- > Line 30: rnd_name = '%s%s' % (self.gen_rnd_filename(), fext)
- File: flaskdev/app/main/forms.py
- > Line 32: filepath = os.path.join(endpoint.static_folder, 'upload', rnd_name)
- File: flaskdev/app/main/forms.py
- > Line 34: dirname = os.path.dirname(filepath)
- File: flaskdev/app/main/forms.py
- > Line 48: res = '
-
- ' % (callback, url, error)
- File: flaskdev/app/main/forms.py
- > Line 54: response = make_response(res)
- File: flaskdev/app/main/forms.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = response
- File: flaskdev/app/main/forms.py
- > Line 23: url = ''
-File: flaskdev/app/main/forms.py
- > reaches line 44, trigger word "url_for(":
- url = url_for('main.static',filename='%s/%s' % ('upload', rnd_name))
-
-
-
-sjeeva/flaskapp
-https://github.com/sjeeva/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:04:04.697054
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sjeeva/flaskapp.
-
-Cesaaar/flaskr
-https://github.com/Cesaaar/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:04:06.231797
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jiangnenghua/flasky
-https://github.com/jiangnenghua/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:04:13.749337
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-micahculpepper/flaskplayground
-https://github.com/micahculpepper/flaskplayground
-Entry file: flaskplayground/api.py
-Scanned: 2016-10-20 13:04:15.389857
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tomtom92/FlaskTaskr
-https://github.com/tomtom92/FlaskTaskr
-Entry file: FlaskTaskr/views.py
-Scanned: 2016-10-20 13:04:17.501991
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py
-
-karchevz/FlaskTasker
-https://github.com/karchevz/FlaskTasker
-Entry file: FlaskTasker/extras/views.py
-Scanned: 2016-10-20 13:04:19.015256
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lypro09539/FlaskWeb
-https://github.com/lypro09539/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 13:04:21.612576
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-classTC/FlaskDemo
-https://github.com/classTC/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 13:04:29.171033
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Taimoorarshad/flasktasker6
-https://github.com/Taimoorarshad/flasktasker6
-Entry file: flasktasker6/project/__init__.py
-Scanned: 2016-10-20 13:04:32.689268
-No vulnerabilities found.
-
-
-swetankvarun18/FlaskApp
-https://github.com/swetankvarun18/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 13:04:33.299291
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-didier-schmitt/demystify-flask
-https://github.com/didier-schmitt/demystify-flask
-Entry file: demystify-flask/main.py
-Scanned: 2016-10-20 13:04:37.161200
-No vulnerabilities found.
-
-
-per19/app-flask
-https://github.com/per19/app-flask
-Entry file: app-flask/app.py
-Scanned: 2016-10-20 13:04:40.517527
-No vulnerabilities found.
-
-
-harish-rajendran/Flask-Project
-https://github.com/harish-rajendran/Flask-Project
-Entry file: Flask-Project/routes.py
-Scanned: 2016-10-20 13:04:41.851768
-Vulnerability 1:
-File: Flask-Project/routes.py
- > User input at line 33, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: Flask-Project/routes.py
- > Line 54: c = 'hey , ' + name + '..Have a good day!!!'
- File: Flask-Project/routes.py
- > Line 55: ret_MAYBE_FUNCTION_NAME = c
- File: Flask-Project/routes.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('register.html',form=form)
- File: Flask-Project/routes.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = 'ALL FIELDS ARE REQUIRED'
- File: Flask-Project/routes.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('redirect.html')
-File: Flask-Project/routes.py
- > reaches line 52, trigger word "execute(":
- cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date))
-
-Vulnerability 2:
-File: Flask-Project/routes.py
- > User input at line 34, trigger word ".data":
- email = form.email.data
-File: Flask-Project/routes.py
- > reaches line 52, trigger word "execute(":
- cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date))
-
-Vulnerability 3:
-File: Flask-Project/routes.py
- > User input at line 35, trigger word ".data":
- password = form.password.data
-File: Flask-Project/routes.py
- > reaches line 52, trigger word "execute(":
- cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date))
-
-Vulnerability 4:
-File: Flask-Project/routes.py
- > User input at line 66, trigger word ".data":
- email = form.email.data
-File: Flask-Project/routes.py
- > reaches line 84, trigger word "execute(":
- cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date))
-
-Vulnerability 5:
-File: Flask-Project/routes.py
- > User input at line 67, trigger word ".data":
- password = form.password.data
-File: Flask-Project/routes.py
- > reaches line 84, trigger word "execute(":
- cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date))
-
-
-
-wtakase/hello_flask
-https://github.com/wtakase/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-20 13:04:42.856989
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xiezg247/flask_demo
-https://github.com/xiezg247/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 13:04:43.374002
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-abhitron/flask-examples
-https://github.com/abhitron/flask-examples
-Entry file: flask-examples/Guestbook/app.py
-Scanned: 2016-10-20 13:04:43.886782
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-gunavara/guniFlask
-https://github.com/gunavara/guniFlask
-Entry file: guniFlask/app.py
-Scanned: 2016-10-20 13:04:46.830828
-Vulnerability 1:
-File: guniFlask/app.py
- > User input at line 50, trigger word "form[":
- username = request.form['username']
-Reassigned in:
- File: guniFlask/app.py
- > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email)
-File: guniFlask/app.py
- > reaches line 53, trigger word "execute(":
- x = cur.execute('SELECT * FROM users WHERE username = '%s'' % thwart(username))
-
-Vulnerability 2:
-File: guniFlask/app.py
- > User input at line 50, trigger word "form[":
- username = request.form['username']
-Reassigned in:
- File: guniFlask/app.py
- > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email)
-File: guniFlask/app.py
- > reaches line 59, trigger word "execute(":
- cur.execute(reguser)
-
-Vulnerability 3:
-File: guniFlask/app.py
- > User input at line 51, trigger word "form[":
- password = sha256_crypt.encrypt(request.form['password'])
-Reassigned in:
- File: guniFlask/app.py
- > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email)
-File: guniFlask/app.py
- > reaches line 59, trigger word "execute(":
- cur.execute(reguser)
-
-Vulnerability 4:
-File: guniFlask/app.py
- > User input at line 52, trigger word "form[":
- email = request.form['email']
-Reassigned in:
- File: guniFlask/app.py
- > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email)
-File: guniFlask/app.py
- > reaches line 59, trigger word "execute(":
- cur.execute(reguser)
-
-Vulnerability 5:
-File: guniFlask/app.py
- > User input at line 73, trigger word "form[":
- data = cur.execute('SELECT * FROM (users) WHERE (username) = '%s'' % thwart(request.form['username']))
-Reassigned in:
- File: guniFlask/app.py
- > Line 74: data = cur.fetchone()[2]
-File: guniFlask/app.py
- > reaches line 73, trigger word "execute(":
- data = cur.execute('SELECT * FROM (users) WHERE (username) = '%s'' % thwart(request.form['username']))
-
-Vulnerability 6:
-File: guniFlask/app.py
- > User input at line 117, trigger word "form[":
- vidrazhod = request.form['razhod']
-Reassigned in:
- File: guniFlask/app.py
- > Line 123: addrazhodqry = 'INSERT INTO razhodi (razhod) VALUES ('%s')' % vidrazhod
-File: guniFlask/app.py
- > reaches line 118, trigger word "execute(":
- x = cur.execute('SELECT razhod FROM (razhodi) WHERE (razhod) = '%s'' % vidrazhod)
-
-Vulnerability 7:
-File: guniFlask/app.py
- > User input at line 117, trigger word "form[":
- vidrazhod = request.form['razhod']
-Reassigned in:
- File: guniFlask/app.py
- > Line 123: addrazhodqry = 'INSERT INTO razhodi (razhod) VALUES ('%s')' % vidrazhod
-File: guniFlask/app.py
- > reaches line 124, trigger word "execute(":
- cur.execute(addrazhodqry)
-
-Vulnerability 8:
-File: guniFlask/app.py
- > User input at line 159, trigger word "form[":
- tiprazhod = request.form['tiprazhod']
-Reassigned in:
- File: guniFlask/app.py
- > Line 160: razhod_id = 'SELECT id FROM razhodi WHERE razhod = '%s'' % tiprazhod
- File: guniFlask/app.py
- > Line 163: razhod_id = datarazhod[0]
- File: guniFlask/app.py
- > Line 165: razhod_name = 'SELECT razhod FROM razhodi WHERE id = '%s'' % razhod_id
- File: guniFlask/app.py
- > Line 167: razhod_name = cur.fetchone()[0]
- File: guniFlask/app.py
- > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma)
-File: guniFlask/app.py
- > reaches line 161, trigger word "execute(":
- cur.execute(razhod_id)
-
-Vulnerability 9:
-File: guniFlask/app.py
- > User input at line 159, trigger word "form[":
- tiprazhod = request.form['tiprazhod']
-Reassigned in:
- File: guniFlask/app.py
- > Line 160: razhod_id = 'SELECT id FROM razhodi WHERE razhod = '%s'' % tiprazhod
- File: guniFlask/app.py
- > Line 163: razhod_id = datarazhod[0]
- File: guniFlask/app.py
- > Line 165: razhod_name = 'SELECT razhod FROM razhodi WHERE id = '%s'' % razhod_id
- File: guniFlask/app.py
- > Line 167: razhod_name = cur.fetchone()[0]
- File: guniFlask/app.py
- > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma)
-File: guniFlask/app.py
- > reaches line 166, trigger word "execute(":
- cur.execute(razhod_name)
-
-Vulnerability 10:
-File: guniFlask/app.py
- > User input at line 159, trigger word "form[":
- tiprazhod = request.form['tiprazhod']
-Reassigned in:
- File: guniFlask/app.py
- > Line 160: razhod_id = 'SELECT id FROM razhodi WHERE razhod = '%s'' % tiprazhod
- File: guniFlask/app.py
- > Line 163: razhod_id = datarazhod[0]
- File: guniFlask/app.py
- > Line 165: razhod_name = 'SELECT razhod FROM razhodi WHERE id = '%s'' % razhod_id
- File: guniFlask/app.py
- > Line 167: razhod_name = cur.fetchone()[0]
- File: guniFlask/app.py
- > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma)
-File: guniFlask/app.py
- > reaches line 172, trigger word "execute(":
- cur.execute(addplashtane)
-
-Vulnerability 11:
-File: guniFlask/app.py
- > User input at line 168, trigger word "form[":
- suma = request.form['suma']
-Reassigned in:
- File: guniFlask/app.py
- > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma)
-File: guniFlask/app.py
- > reaches line 172, trigger word "execute(":
- cur.execute(addplashtane)
-
-
-
-alekspankov/docker-flask
-https://github.com/alekspankov/docker-flask
-Entry file: None
-Scanned: 2016-10-20 13:04:47.379777
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/alekspankov/docker-flask.
-
-Kryvonis/Flask-RQ
-https://github.com/Kryvonis/Flask-RQ
-Entry file: Flask-RQ/app.py
-Scanned: 2016-10-20 13:04:48.679245
-No vulnerabilities found.
-
-
-httpslixc/flask-web
-https://github.com/httpslixc/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 13:04:49.197964
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-calsaviour/flask-blog
-https://github.com/calsaviour/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:04:49.752715
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-naboson/messenger-flask
-https://github.com/naboson/messenger-flask
-Entry file: messenger-flask/entry.py
-Scanned: 2016-10-20 13:04:51.061816
-No vulnerabilities found.
-
-
-Kryvonis/Flask_colorize
-https://github.com/Kryvonis/Flask_colorize
-Entry file: Flask_colorize/app/__init__.py
-Scanned: 2016-10-20 13:04:52.693260
-No vulnerabilities found.
-
-
-rd93/flask-app
-https://github.com/rd93/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 13:04:53.219107
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cpavanelli/testeFlask
-https://github.com/cpavanelli/testeFlask
-Entry file: None
-Scanned: 2016-10-20 13:05:09.019675
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kelvinleong57/teammaker_flask
-https://github.com/kelvinleong57/teammaker_flask
-Entry file: teammaker_flask/teammaker_flask/__init__.py
-Scanned: 2016-10-20 13:05:10.818034
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-him229/flask-demo
-https://github.com/him229/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:05:11.327527
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/him229/flask-demo.
-
-spurll/flask-template
-https://github.com/spurll/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:05:11.838082
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/spurll/flask-template.
-
-yuriymironov96/flask-webservice
-https://github.com/yuriymironov96/flask-webservice
-Entry file: flask-webservice/app/__init__.py
-Scanned: 2016-10-20 13:05:16.200565
-Vulnerability 1:
-File: flask-webservice/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-webservice/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flask-webservice/app/main/views.py
- > Line 32: posts = pagination.items
- File: flask-webservice/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-webservice/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flask-webservice/app/main/views.py
- > User input at line 109, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-webservice/app/main/views.py
- > Line 111: page = post.comments.count() - 1 / current_app.config['COMMENTS_PER_PAGE'] + 1
- File: flask-webservice/app/main/views.py
- > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flask-webservice/app/main/views.py
- > Line 116: comments = pagination.items
- File: flask-webservice/app/main/views.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask-webservice/app/main/views.py
- > reaches line 117, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 3:
-File: flask-webservice/app/main/views.py
- > User input at line 140, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-webservice/app/main/views.py
- > Line 141: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flask-webservice/app/main/views.py
- > Line 144: comments = pagination.items
-File: flask-webservice/app/main/views.py
- > reaches line 145, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 4:
-File: flask-webservice/app/main/views.py
- > User input at line 204, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-webservice/app/main/views.py
- > Line 205: pagination = user.followers.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-webservice/app/main/views.py
- > Line 208: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-webservice/app/main/views.py
- > Line 203: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-webservice/app/main/views.py
- > reaches line 210, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: flask-webservice/app/main/views.py
- > User input at line 220, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-webservice/app/main/views.py
- > Line 221: pagination = user.followed.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-webservice/app/main/views.py
- > Line 224: followed = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-webservice/app/main/views.py
- > Line 219: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-webservice/app/main/views.py
- > reaches line 226, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followed.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, followed=followed)
-
-
-
-tomaszguzialek/flask-api
-https://github.com/tomaszguzialek/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 13:05:16.740109
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ianunruh/hello-flask
-https://github.com/ianunruh/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 13:05:17.326493
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-sternmatt/FLASK_DEMO
-https://github.com/sternmatt/FLASK_DEMO
-Entry file: FLASK_DEMO/app.py
-Scanned: 2016-10-20 13:05:18.658354
-Vulnerability 1:
-File: FLASK_DEMO/app.py
- > User input at line 29, trigger word "form[":
- stock = request.form['stockticker']
-Reassigned in:
- File: FLASK_DEMO/app.py
- > Line 30: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % stock
- File: FLASK_DEMO/app.py
- > Line 33: raw_data = session.get(api_url)
- File: FLASK_DEMO/app.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('userinfo.html')
-File: FLASK_DEMO/app.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('graph.html',stockticker=stock, script=script, div=div)
-
-
-
-fishen/python_flask
-https://github.com/fishen/python_flask
-Entry file: None
-Scanned: 2016-10-20 13:05:19.195480
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/fishen/python_flask.
-
-VladyslavVelychko/Flask-microblog
-https://github.com/VladyslavVelychko/Flask-microblog
-Entry file: None
-Scanned: 2016-10-20 13:05:21.734465
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-holygeek01/Learn-Flask
-https://github.com/holygeek01/Learn-Flask
-Entry file: Learn-Flask/main.py
-Scanned: 2016-10-20 13:05:35.373623
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-xiyinmoon/flask_blog
-https://github.com/xiyinmoon/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:05:35.886841
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-QMickael/easy_flask
-https://github.com/QMickael/easy_flask
-Entry file: None
-Scanned: 2016-10-20 13:05:37.492356
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/QMickael/easy_flask.
-
-gordoning/todolist_flask
-https://github.com/gordoning/todolist_flask
-Entry file: todolist_flask/doc/sample.py
-Scanned: 2016-10-20 13:05:38.964911
-No vulnerabilities found.
-
-
-artakak/TestFlask
-https://github.com/artakak/TestFlask
-Entry file: TestFlask/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:05:48.524983
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhangzju/flask_api
-https://github.com/zhangzju/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-20 13:05:49.054666
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-travisoneill/algo-flask
-https://github.com/travisoneill/algo-flask
-Entry file: algo-flask/flask_server.py
-Scanned: 2016-10-20 13:05:50.490385
-No vulnerabilities found.
-
-
-shawnpdoherty/MegaFlask
-https://github.com/shawnpdoherty/MegaFlask
-Entry file: MegaFlask/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:06:06.151435
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-denewman/flask-api
-https://github.com/denewman/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 13:06:07.208751
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-printxy/flask_app
-https://github.com/printxy/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:06:07.719156
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/printxy/flask_app.
-
-Kryvonis/Thread-Flask
-https://github.com/Kryvonis/Thread-Flask
-Entry file: Thread-Flask/main.py
-Scanned: 2016-10-20 13:06:09.050085
-No vulnerabilities found.
-
-
-SergiySavarin/flask_ex
-https://github.com/SergiySavarin/flask_ex
-Entry file: flask_ex/wsgi.py
-Scanned: 2016-10-20 13:06:09.571664
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-supermenxxx/flask_tutorial
-https://github.com/supermenxxx/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 13:06:10.089360
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vvijayak/flask_boilerplate
-https://github.com/vvijayak/flask_boilerplate
-Entry file: flask_boilerplate/application/__init__.py
-Scanned: 2016-10-20 13:06:10.605593
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SicunStudio/signup-flask
-https://github.com/SicunStudio/signup-flask
-Entry file: signup-flask/app/__init__.py
-Scanned: 2016-10-20 13:06:12.049437
-No vulnerabilities found.
-
-
-theglassbean/flask-blog
-https://github.com/theglassbean/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:06:12.607564
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-pgeez/flask-demo
-https://github.com/pgeez/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:06:13.123050
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pgeez/flask-demo.
-
-tahanasir/flask-microblog
-https://github.com/tahanasir/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 13:06:13.626533
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-curious725/blog-flask
-https://github.com/curious725/blog-flask
-Entry file: blog-flask/project/views.py
-Scanned: 2016-10-20 13:06:14.344596
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-andbraga/ProbotFlask
-https://github.com/andbraga/ProbotFlask
-Entry file: ProbotFlask/flask_starter/flaskstarter/__init__.py
-Scanned: 2016-10-20 13:06:26.476451
-Vulnerability 1:
-File: ProbotFlask/flask_starter/flaskstarter/views/main.py
- > User input at line 43, trigger word ".data":
- chosen_probot_id = form.probot.data
-Reassigned in:
- File: ProbotFlask/flask_starter/flaskstarter/views/main.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('probots.html',form=form, available_probot=available_probot)
-File: ProbotFlask/flask_starter/flaskstarter/views/main.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('botcontrolphone.html',chosen_probot_id=chosen_probot_id)
-
-Vulnerability 2:
-File: ProbotFlask/flask_starter/flaskstarter/views/main.py
- > User input at line 43, trigger word ".data":
- chosen_probot_id = form.probot.data
-Reassigned in:
- File: ProbotFlask/flask_starter/flaskstarter/views/main.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('probots.html',form=form, available_probot=available_probot)
-File: ProbotFlask/flask_starter/flaskstarter/views/main.py
- > reaches line 61, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('botcontrol.html',chosen_probot_id=chosen_probot_id)
-
-Vulnerability 3:
-File: ProbotFlask/flask_starter/flaskstarter/views/auth.py
- > User input at line 50, trigger word "get(":
- root_url = app.config.get('ROOT_URL')
-File: ProbotFlask/flask_starter/flaskstarter/views/auth.py
- > reaches line 52, trigger word "render_template(":
- html = render_template('user/activate.html',confirm_url=confirm_url, username=username, root_url=root_url)
-
-Vulnerability 4:
-File: ProbotFlask/flask_starter/flaskstarter/views/auth.py
- > User input at line 82, trigger word ".data":
- user = User(username=form.username.data, email=form.email.data)
-Reassigned in:
- File: ProbotFlask/flask_starter/flaskstarter/views/auth.py
- > Line 91: token = generate_confirmation_token(user.email)
-File: ProbotFlask/flask_starter/flaskstarter/views/auth.py
- > reaches line 92, trigger word "url_for(":
- confirm_url = url_for('auth.confirm_email',token=token, _external=True)
-
-
-
-xxxxsars/Flask_SQLite
-https://github.com/xxxxsars/Flask_SQLite
-Entry file: Flask_SQLite/draw_member.py
-Scanned: 2016-10-20 13:06:28.094809
-Vulnerability 1:
-File: Flask_SQLite/draw_member.py
- > User input at line 21, trigger word "get(":
- group_name = request.form.get('group_name', 'ALL')
-Reassigned in:
- File: Flask_SQLite/draw_member.py
- > Line 32: valid_member_ids = [row[0] for row in cursor]
- File: Flask_SQLite/draw_member.py
- > Line 37: error_msg = '
No memebers in group '%s'
' % group_name
- File: Flask_SQLite/draw_member.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404)
- File: Flask_SQLite/draw_member.py
- > Line 40: lucky_memeber_id = random.choice(valid_member_ids)
-File: Flask_SQLite/draw_member.py
- > reaches line 26, trigger word "execute(":
- cursor = db.execute(valid_members_sql)
-
-Vulnerability 2:
-File: Flask_SQLite/draw_member.py
- > User input at line 21, trigger word "get(":
- group_name = request.form.get('group_name', 'ALL')
-Reassigned in:
- File: Flask_SQLite/draw_member.py
- > Line 32: valid_member_ids = [row[0] for row in cursor]
- File: Flask_SQLite/draw_member.py
- > Line 37: error_msg = '
No memebers in group '%s'
' % group_name
- File: Flask_SQLite/draw_member.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404)
- File: Flask_SQLite/draw_member.py
- > Line 40: lucky_memeber_id = random.choice(valid_member_ids)
-File: Flask_SQLite/draw_member.py
- > reaches line 31, trigger word "execute(":
- cursor = db.execute(valid_members_sql, (group_name))
-
-Vulnerability 3:
-File: Flask_SQLite/draw_member.py
- > User input at line 21, trigger word "get(":
- group_name = request.form.get('group_name', 'ALL')
-Reassigned in:
- File: Flask_SQLite/draw_member.py
- > Line 32: valid_member_ids = [row[0] for row in cursor]
- File: Flask_SQLite/draw_member.py
- > Line 37: error_msg = '
No memebers in group '%s'
' % group_name
- File: Flask_SQLite/draw_member.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404)
- File: Flask_SQLite/draw_member.py
- > Line 40: lucky_memeber_id = random.choice(valid_member_ids)
-File: Flask_SQLite/draw_member.py
- > reaches line 42, trigger word "execute(":
- member_group_name = db.execute('SELECT name, group_name FROM members WHERE id = ?', (lucky_memeber_id)).fetchone()
-
-Vulnerability 4:
-File: Flask_SQLite/draw_member.py
- > User input at line 21, trigger word "get(":
- group_name = request.form.get('group_name', 'ALL')
-Reassigned in:
- File: Flask_SQLite/draw_member.py
- > Line 32: valid_member_ids = [row[0] for row in cursor]
- File: Flask_SQLite/draw_member.py
- > Line 37: error_msg = '
No memebers in group '%s'
' % group_name
- File: Flask_SQLite/draw_member.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404)
- File: Flask_SQLite/draw_member.py
- > Line 40: lucky_memeber_id = random.choice(valid_member_ids)
-File: Flask_SQLite/draw_member.py
- > reaches line 48, trigger word "execute(":
- db.execute('insert into draw_histories (memberid) values(?)', (lucky_memeber_id))
-
-Vulnerability 5:
-File: Flask_SQLite/draw_member.py
- > User input at line 21, trigger word "get(":
- group_name = request.form.get('group_name', 'ALL')
-Reassigned in:
- File: Flask_SQLite/draw_member.py
- > Line 32: valid_member_ids = [row[0] for row in cursor]
- File: Flask_SQLite/draw_member.py
- > Line 37: error_msg = '
No memebers in group '%s'
' % group_name
- File: Flask_SQLite/draw_member.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404)
- File: Flask_SQLite/draw_member.py
- > Line 40: lucky_memeber_id = random.choice(valid_member_ids)
-File: Flask_SQLite/draw_member.py
- > reaches line 49, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('draw.html',name=member_name, group=group_name)
-
-
-
-Itaah/flask_itah
-https://github.com/Itaah/flask_itah
-Entry file: flask_itah/flask_itah.py
-Scanned: 2016-10-20 13:06:29.369381
-No vulnerabilities found.
-
-
-atomist-project-templates/flask-service
-https://github.com/atomist-project-templates/flask-service
-Entry file: flask-service/service.py
-Scanned: 2016-10-20 13:06:29.899879
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-qqxx6661/micblog
-https://github.com/qqxx6661/micblog
-Entry file: micblog/app/__init__.py
-Scanned: 2016-10-20 13:06:31.582331
-Vulnerability 1:
-File: micblog/app/views.py
- > User input at line 81, trigger word "get(":
- user_name = request.form.get('user_name')
-Reassigned in:
- File: micblog/app/views.py
- > Line 89: user.nickname = user_name
-File: micblog/app/views.py
- > reaches line 83, trigger word "filter(":
- register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first()
-
-Vulnerability 2:
-File: micblog/app/views.py
- > User input at line 82, trigger word "get(":
- user_email = request.form.get('user_email')
-Reassigned in:
- File: micblog/app/views.py
- > Line 90: user.email = user_email
-File: micblog/app/views.py
- > reaches line 83, trigger word "filter(":
- register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first()
-
-
-
-optrv/Flog
-https://github.com/optrv/Flog
-Entry file: None
-Scanned: 2016-10-20 13:06:42.638952
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/optrv/Flog.
-
-qing-stanley/web-flask-tutorial
-https://github.com/qing-stanley/web-flask-tutorial
-Entry file: web-flask-tutorial/app/__init__.py
-Scanned: 2016-10-20 13:06:52.425838
-No vulnerabilities found.
-
-
-AngelMunoz/FlaskWebProjects
-https://github.com/AngelMunoz/FlaskWebProjects
-Entry file: FlaskWebProjects/FlaskBlueprintAPI/FlaskBlueprintAPI/__init__.py
-Scanned: 2016-10-20 13:07:00.015928
-No vulnerabilities found.
-
-
-TommyBlanchard/FlaskHerokuStockTicker
-https://github.com/TommyBlanchard/FlaskHerokuStockTicker
-Entry file: FlaskHerokuStockTicker/app.py
-Scanned: 2016-10-20 13:07:01.456835
-No vulnerabilities found.
-
-
-adilmoujahid/flask-twitter-clone
-https://github.com/adilmoujahid/flask-twitter-clone
-Entry file: flask-twitter-clone/project/__init__.py
-Scanned: 2016-10-20 13:07:03.199329
-No vulnerabilities found.
-
-
-bekkam/flask-script-practice
-https://github.com/bekkam/flask-script-practice
-Entry file: flask-script-practice/myapp.py
-Scanned: 2016-10-20 13:07:03.711940
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Wintermute1/Flask-Restful-Api
-https://github.com/Wintermute1/Flask-Restful-Api
-Entry file: Flask-Restful-Api/FlaskRestfulApi.py
-Scanned: 2016-10-20 13:07:05.683755
-No vulnerabilities found.
-
-
-bekkam/flask-migration-practice
-https://github.com/bekkam/flask-migration-practice
-Entry file: flask-migration-practice/app.py
-Scanned: 2016-10-20 13:07:07.147065
-No vulnerabilities found.
-
-
-kkweon/price_alert_flask
-https://github.com/kkweon/price_alert_flask
-Entry file: price_alert_flask/src/app.py
-Scanned: 2016-10-20 13:07:08.803164
-Vulnerability 1:
-File: price_alert_flask/src/models/stores/views.py
- > User input at line 30, trigger word "form[":
- query = json.loads(request.form['query'].replace(''', '"'))
-Reassigned in:
- File: price_alert_flask/src/models/stores/views.py
- > Line 35: store.query = query
-File: price_alert_flask/src/models/stores/views.py
- > reaches line 30, trigger word "replace(":
- query = json.loads(request.form['query'].replace(''', '"'))
-
-Vulnerability 2:
-File: price_alert_flask/src/models/stores/views.py
- > User input at line 56, trigger word "form[":
- query = json.loads(request.form['query'].replace(''', '"'))
-File: price_alert_flask/src/models/stores/views.py
- > reaches line 56, trigger word "replace(":
- query = json.loads(request.form['query'].replace(''', '"'))
-
-
-
-absinthetized/uwsgi-flask-multiprocess-test
-https://github.com/absinthetized/uwsgi-flask-multiprocess-test
-Entry file: uwsgi-flask-multiprocess-test/app.py
-Scanned: 2016-10-20 13:07:10.104424
-No vulnerabilities found.
-
-
-wallacejd12/FSND-Udacity-Flask-App
-https://github.com/wallacejd12/FSND-Udacity-Flask-App
-Entry file: FSND-Udacity-Flask-App/catalog.py
-Scanned: 2016-10-20 13:07:17.217242
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-artempronevskiy/Small-test-Flask-app
-https://github.com/artempronevskiy/Small-test-Flask-app
-Entry file: Small-test-Flask-app/main.py
-Scanned: 2016-10-20 13:07:18.570206
-Vulnerability 1:
-File: Small-test-Flask-app/main.py
- > User input at line 34, trigger word "form[":
- username = request.form['username']
-File: Small-test-Flask-app/main.py
- > reaches line 41, trigger word "execute(":
- cursor.execute(sql_query, (str(username), str(sha256(password.encode('utf-8')).hexdigest())))
-
-Vulnerability 2:
-File: Small-test-Flask-app/main.py
- > User input at line 35, trigger word "form[":
- password = request.form['password']
-File: Small-test-Flask-app/main.py
- > reaches line 41, trigger word "execute(":
- cursor.execute(sql_query, (str(username), str(sha256(password.encode('utf-8')).hexdigest())))
-
-Vulnerability 3:
-File: Small-test-Flask-app/main.py
- > User input at line 58, trigger word "form[":
- username = request.form['username']
-Reassigned in:
- File: Small-test-Flask-app/main.py
- > Line 71: session['username'] = username
-File: Small-test-Flask-app/main.py
- > reaches line 64, trigger word "execute(":
- cursor.execute(sql, (username))
-
-
-
-MrXcitement/python-flask-hello
-https://github.com/MrXcitement/python-flask-hello
-Entry file: python-flask-hello/app/app.py
-Scanned: 2016-10-20 13:07:19.874905
-No vulnerabilities found.
-
-
-samabhi/MegaFlaskTut
-https://github.com/samabhi/MegaFlaskTut
-Entry file: MegaFlaskTut/app/__init__.py
-Scanned: 2016-10-20 13:07:21.164589
-No vulnerabilities found.
-
-
-LarsBergqvist/python_flask_authentication
-https://github.com/LarsBergqvist/python_flask_authentication
-Entry file: python_flask_authentication/basic_auth/__init__.py
-Scanned: 2016-10-20 13:07:22.597249
-No vulnerabilities found.
-
-
-ianunruh/flask-api-skeleton
-https://github.com/ianunruh/flask-api-skeleton
-Entry file: flask-api-skeleton/backend/app.py
-Scanned: 2016-10-20 13:07:24.052520
-No vulnerabilities found.
-
-
-ajeyamk/flask-python-epoch
-https://github.com/ajeyamk/flask-python-epoch
-Entry file: flask-python-epoch/controller.py
-Scanned: 2016-10-20 13:07:25.549308
-Vulnerability 1:
-File: flask-python-epoch/logservice.py
- > User input at line 197, trigger word "get(":
- update_log_query = LogTable.select().where(LogTable.logged_date == data['log_date'] & LogTable.user == return_data['User_id'] & LogTable.project == data['proj_id'] & LogTable.job_type == data['jobtype_id']).get()
-Reassigned in:
- File: flask-python-epoch/logservice.py
- > Line 199: update_log_object = LogTable.update(update_log).where(LogTable.id == update_log_query.id)
- File: flask-python-epoch/logservice.py
- > Line 201: last_update = LogTable.get(LogTable.id == update_log_query.id)
-File: flask-python-epoch/logservice.py
- > reaches line 200, trigger word "execute(":
- update_log_object.execute()
-
-
-
-s0rata/flask-by-example
-https://github.com/s0rata/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-20 13:07:26.323378
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lassegit/flask-reactjs
-https://github.com/lassegit/flask-reactjs
-Entry file: None
-Scanned: 2016-10-20 13:07:29.452757
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lassegit/flask-reactjs.
-
-YellowGB/Flask
-https://github.com/YellowGB/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:07:29.963216
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-zhaokefei/flask
-https://github.com/zhaokefei/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:07:30.556599
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-k9imJ/flask
-https://github.com/k9imJ/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:07:31.136810
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-berstearns/flask
-https://github.com/berstearns/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:07:31.728364
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-minglan01/flask
-https://github.com/minglan01/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:07:32.337625
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-bellcodo/fisrt-flask-app
-https://github.com/bellcodo/fisrt-flask-app
-Entry file: fisrt-flask-app/hello_app.py
-Scanned: 2016-10-20 13:07:33.657879
-No vulnerabilities found.
-
-
-EverestYAO/flask-blog
-https://github.com/EverestYAO/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:07:34.213332
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Sthacks/sthacksWebsite
-https://github.com/Sthacks/sthacksWebsite
-Entry file: sthacksWebsite/app.py
-Scanned: 2016-10-20 13:07:38.114349
-No vulnerabilities found.
-
-
-gregwebb/flaskproject
-https://github.com/gregwebb/flaskproject
-Entry file: None
-Scanned: 2016-10-20 13:07:38.632220
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MakrMelon/flasky
-https://github.com/MakrMelon/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:07:39.144873
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lbx6z-2/flaskr
-https://github.com/lbx6z-2/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:07:43.640495
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shalev67/flasky
-https://github.com/shalev67/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:07:53.189932
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ramramu3433/flaskapp
-https://github.com/ramramu3433/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:08:00.690994
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ramramu3433/flaskapp.
-
-sanjayankur31/flaskr
-https://github.com/sanjayankur31/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:08:02.200483
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kaish5536/Flaskr
-https://github.com/kaish5536/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 13:08:04.717500
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hackeris/flasktest
-https://github.com/hackeris/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:08:05.239863
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mariavarley/flaskr
-https://github.com/mariavarley/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:08:05.760373
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hmc-cs-gdiehl/flaskr
-https://github.com/hmc-cs-gdiehl/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:08:06.267131
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wwwxmu/flaskweb
-https://github.com/wwwxmu/flaskweb
-Entry file: None
-Scanned: 2016-10-20 13:08:07.802464
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-beautilut/FlaskTemplate
-https://github.com/beautilut/FlaskTemplate
-Entry file: FlaskTemplate/root.py
-Scanned: 2016-10-20 13:08:11.144103
-No vulnerabilities found.
-
-
-alleyb/flaskPractice
-https://github.com/alleyb/flaskPractice
-Entry file: flaskPractice/flaskr.py
-Scanned: 2016-10-20 13:08:12.469983
-No vulnerabilities found.
-
-
-YuiJL/myweblog
-https://github.com/YuiJL/myweblog
-Entry file: myweblog/www/app/__init__.py
-Scanned: 2016-10-20 13:08:20.105977
-Vulnerability 1:
-File: myweblog/www/app/utilities.py
- > User input at line 126, trigger word "get(":
- cookie = request.cookies.get(current_app.config['COOKIE_NAME']).split('+').pop()
-File: myweblog/www/app/utilities.py
- > reaches line 127, trigger word "set_cookie(":
- response.set_cookie(current_app.config['COOKIE_NAME'], '+' + cookie,httponly=True)
-
-Vulnerability 2:
-File: myweblog/www/app/views/route.py
- > User input at line 103, trigger word "get(":
- name = request.form.get('name')
-Reassigned in:
- File: myweblog/www/app/views/route.py
- > Line 113: user = User(name=name, email=email, password=password)
- File: myweblog/www/app/views/route.py
- > Line 114: user_resp = user.__dict__
- File: myweblog/www/app/views/route.py
- > Line 116: cookie = user_to_cookie(user_resp)
- File: myweblog/www/app/views/route.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('route.index'))
- File: myweblog/www/app/views/route.py
- > Line 100: ret_MAYBE_FUNCTION_NAME = render_template('register.html',site_key=current_app.config['RECAPTCHA_SITE_KEY'])
- File: myweblog/www/app/views/route.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = make_response('Username is taken, please try another.', 403)
- File: myweblog/www/app/views/route.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = make_response('E-mail is taken, please try another.', 403)
- File: myweblog/www/app/views/route.py
- > Line 111: ret_MAYBE_FUNCTION_NAME = make_response('You're a bot.', 403)
-File: myweblog/www/app/views/route.py
- > reaches line 118, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie)
-
-Vulnerability 3:
-File: myweblog/www/app/views/route.py
- > User input at line 106, trigger word "get(":
- email = request.form.get('email')
-Reassigned in:
- File: myweblog/www/app/views/route.py
- > Line 113: user = User(name=name, email=email, password=password)
- File: myweblog/www/app/views/route.py
- > Line 114: user_resp = user.__dict__
- File: myweblog/www/app/views/route.py
- > Line 116: cookie = user_to_cookie(user_resp)
- File: myweblog/www/app/views/route.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('route.index'))
- File: myweblog/www/app/views/route.py
- > Line 100: ret_MAYBE_FUNCTION_NAME = render_template('register.html',site_key=current_app.config['RECAPTCHA_SITE_KEY'])
- File: myweblog/www/app/views/route.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = make_response('Username is taken, please try another.', 403)
- File: myweblog/www/app/views/route.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = make_response('E-mail is taken, please try another.', 403)
- File: myweblog/www/app/views/route.py
- > Line 111: ret_MAYBE_FUNCTION_NAME = make_response('You're a bot.', 403)
-File: myweblog/www/app/views/route.py
- > reaches line 118, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie)
-
-Vulnerability 4:
-File: myweblog/www/app/views/route.py
- > User input at line 112, trigger word "get(":
- password = request.form.get('sha1_password')
-Reassigned in:
- File: myweblog/www/app/views/route.py
- > Line 113: user = User(name=name, email=email, password=password)
- File: myweblog/www/app/views/route.py
- > Line 114: user_resp = user.__dict__
- File: myweblog/www/app/views/route.py
- > Line 116: cookie = user_to_cookie(user_resp)
- File: myweblog/www/app/views/route.py
- > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('route.index'))
- File: myweblog/www/app/views/route.py
- > Line 100: ret_MAYBE_FUNCTION_NAME = render_template('register.html',site_key=current_app.config['RECAPTCHA_SITE_KEY'])
- File: myweblog/www/app/views/route.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = make_response('Username is taken, please try another.', 403)
- File: myweblog/www/app/views/route.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = make_response('E-mail is taken, please try another.', 403)
- File: myweblog/www/app/views/route.py
- > Line 111: ret_MAYBE_FUNCTION_NAME = make_response('You're a bot.', 403)
-File: myweblog/www/app/views/route.py
- > reaches line 118, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie)
-
-Vulnerability 5:
-File: myweblog/www/app/views/route.py
- > User input at line 128, trigger word "get(":
- email = request.form.get('email')
-Reassigned in:
- File: myweblog/www/app/views/route.py
- > Line 130: user_resp = db.users.find_one('email'email)
- File: myweblog/www/app/views/route.py
- > Line 138: cookie = userToCookie(user_resp)
- File: myweblog/www/app/views/route.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = make_response('Invalid email', 403)
- File: myweblog/www/app/views/route.py
- > Line 136: ret_MAYBE_FUNCTION_NAME = make_response('Wrong password', 403)
-File: myweblog/www/app/views/route.py
- > reaches line 140, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie)
-
-Vulnerability 6:
-File: myweblog/www/app/views/route.py
- > User input at line 156, trigger word "get(":
- view_mode = request.args.get('view')
-Reassigned in:
- File: myweblog/www/app/views/route.py
- > Line 157: cookie = view_to_cookie(view_mode)
- File: myweblog/www/app/views/route.py
- > Line 160: ret_MAYBE_FUNCTION_NAME = response
-File: myweblog/www/app/views/route.py
- > reaches line 158, trigger word "jsonify(":
- response = jsonify(view=view_mode)
-
-Vulnerability 7:
-File: myweblog/www/app/views/route.py
- > User input at line 156, trigger word "get(":
- view_mode = request.args.get('view')
-Reassigned in:
- File: myweblog/www/app/views/route.py
- > Line 157: cookie = view_to_cookie(view_mode)
- File: myweblog/www/app/views/route.py
- > Line 160: ret_MAYBE_FUNCTION_NAME = response
-File: myweblog/www/app/views/route.py
- > reaches line 159, trigger word "set_cookie(":
- response.set_cookie(current_app.config['COOKIE_NAME'], cookie,max_age=86400, httponly=True)
-
-Vulnerability 8:
-File: myweblog/www/app/views/api.py
- > User input at line 89, trigger word "get(":
- tag = request.form.get('tag').lstrip('/\;,. ').rstrip('/\;,. ')
-Reassigned in:
- File: myweblog/www/app/views/api.py
- > Line 92: blog = Blog(user_id=g.__user__.get('_id'), user_name=g.__user__.get('name'), user_image=g.__user__.get('image'), title=title.strip(), tag=re.split('[\s\;\,\.\\\/]+', tag), content=content.lstrip('
-').rstrip())
- File: myweblog/www/app/views/api.py
- > Line 100: blog_resp = blog.__dict__
- File: myweblog/www/app/views/api.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403)
-File: myweblog/www/app/views/api.py
- > reaches line 101, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(blog_id=str(blog_resp['_id']))
-
-Vulnerability 9:
-File: myweblog/www/app/views/api.py
- > User input at line 92, trigger word "get(":
- blog = Blog(user_id=g.__user__.get('_id'), user_name=g.__user__.get('name'), user_image=g.__user__.get('image'), title=title.strip(), tag=re.split('[\s\;\,\.\\\/]+', tag), content=content.lstrip('
-').rstrip())
-Reassigned in:
- File: myweblog/www/app/views/api.py
- > Line 100: blog_resp = blog.__dict__
- File: myweblog/www/app/views/api.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403)
-File: myweblog/www/app/views/api.py
- > reaches line 101, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(blog_id=str(blog_resp['_id']))
-
-Vulnerability 10:
-File: myweblog/www/app/views/api.py
- > User input at line 216, trigger word "get(":
- blog_id = db.comments.find_one('_id'ObjectId(item_id)).get('blog_id')
-Reassigned in:
- File: myweblog/www/app/views/api.py
- > Line 224: ret_MAYBE_FUNCTION_NAME = jsonify(item_id=item_id)
- File: myweblog/www/app/views/api.py
- > Line 213: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403)
-File: myweblog/www/app/views/api.py
- > reaches line 223, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id))
-
-Vulnerability 11:
-File: myweblog/www/app/views/api.py
- > User input at line 216, trigger word "get(":
- blog_id = db.comments.find_one('_id'ObjectId(item_id)).get('blog_id')
-Reassigned in:
- File: myweblog/www/app/views/api.py
- > Line 224: ret_MAYBE_FUNCTION_NAME = jsonify(item_id=item_id)
- File: myweblog/www/app/views/api.py
- > Line 213: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403)
-File: myweblog/www/app/views/api.py
- > reaches line 223, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id))
-
-Vulnerability 12:
-File: myweblog/www/app/views/api.py
- > User input at line 247, trigger word "get(":
- blog_id = db.comments.find_one('_id'ObjectId(comment_id)).get('blog_id')
-Reassigned in:
- File: myweblog/www/app/views/api.py
- > Line 235: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403)
-File: myweblog/www/app/views/api.py
- > reaches line 248, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id))
-
-Vulnerability 13:
-File: myweblog/www/app/views/api.py
- > User input at line 247, trigger word "get(":
- blog_id = db.comments.find_one('_id'ObjectId(comment_id)).get('blog_id')
-Reassigned in:
- File: myweblog/www/app/views/api.py
- > Line 235: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403)
-File: myweblog/www/app/views/api.py
- > reaches line 248, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id))
-
-
-
-SIG-IR/flask_demo
-https://github.com/SIG-IR/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 13:08:20.625377
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-per19/app-flask
-https://github.com/per19/app-flask
-Entry file: app-flask/app.py
-Scanned: 2016-10-20 13:08:22.041302
-No vulnerabilities found.
-
-
-harish-rajendran/Flask-Project
-https://github.com/harish-rajendran/Flask-Project
-Entry file: Flask-Project/routes.py
-Scanned: 2016-10-20 13:08:23.349451
-Vulnerability 1:
-File: Flask-Project/routes.py
- > User input at line 33, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: Flask-Project/routes.py
- > Line 54: c = 'hey , ' + name + '..Have a good day!!!'
- File: Flask-Project/routes.py
- > Line 55: ret_MAYBE_FUNCTION_NAME = c
- File: Flask-Project/routes.py
- > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('register.html',form=form)
- File: Flask-Project/routes.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = 'ALL FIELDS ARE REQUIRED'
- File: Flask-Project/routes.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('redirect.html')
-File: Flask-Project/routes.py
- > reaches line 52, trigger word "execute(":
- cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date))
-
-Vulnerability 2:
-File: Flask-Project/routes.py
- > User input at line 34, trigger word ".data":
- email = form.email.data
-File: Flask-Project/routes.py
- > reaches line 52, trigger word "execute(":
- cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date))
-
-Vulnerability 3:
-File: Flask-Project/routes.py
- > User input at line 35, trigger word ".data":
- password = form.password.data
-File: Flask-Project/routes.py
- > reaches line 52, trigger word "execute(":
- cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date))
-
-Vulnerability 4:
-File: Flask-Project/routes.py
- > User input at line 66, trigger word ".data":
- email = form.email.data
-File: Flask-Project/routes.py
- > reaches line 84, trigger word "execute(":
- cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date))
-
-Vulnerability 5:
-File: Flask-Project/routes.py
- > User input at line 67, trigger word ".data":
- password = form.password.data
-File: Flask-Project/routes.py
- > reaches line 84, trigger word "execute(":
- cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date))
-
-
-
-ovidiu1/python-flask
-https://github.com/ovidiu1/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 13:08:23.847659
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-leighmforrest/flask_app
-https://github.com/leighmforrest/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:08:25.348366
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/leighmforrest/flask_app.
-
-sourcreme/pythonFlask
-https://github.com/sourcreme/pythonFlask
-Entry file: pythonFlask/server.py
-Scanned: 2016-10-20 13:08:26.954603
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dmlevering/learning-flask
-https://github.com/dmlevering/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 13:08:27.528541
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wsygkfz/flask_frame
-https://github.com/wsygkfz/flask_frame
-Entry file: None
-Scanned: 2016-10-20 13:08:31.957488
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wsygkfz/flask_frame.
-
-volmaster/flask-app
-https://github.com/volmaster/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 13:08:32.986583
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-calsaviour/flask-intro
-https://github.com/calsaviour/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 13:08:33.501423
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alviandk/flask-judul
-https://github.com/alviandk/flask-judul
-Entry file: flask-judul/app/__init__.py
-Scanned: 2016-10-20 13:08:34.999655
-No vulnerabilities found.
-
-
-val-sytch/blog_flask
-https://github.com/val-sytch/blog_flask
-Entry file: None
-Scanned: 2016-10-20 13:08:43.983999
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/val-sytch/blog_flask.
-
-EgorKurito/flask_project
-https://github.com/EgorKurito/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 13:08:45.796305
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-juwaini/flask-tutorial
-https://github.com/juwaini/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 13:08:46.291783
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cloudyuga/flask-app
-https://github.com/cloudyuga/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 13:08:46.787675
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hazybluedot/indie_flask
-https://github.com/hazybluedot/indie_flask
-Entry file: indie_flask/indie_flask/__init__.py
-Scanned: 2016-10-20 13:08:54.279546
-Vulnerability 1:
-File: indie_flask/indie_flask/__init__.py
- > User input at line 59, trigger word "form[":
- source = request.form['source']
-Reassigned in:
- File: indie_flask/indie_flask/__init__.py
- > Line 72: uparts = urlparse(source)
- File: indie_flask/indie_flask/__init__.py
- > Line 80: task = validate_and_publish.delay(source, target)
- File: indie_flask/indie_flask/__init__.py
- > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url
- File: indie_flask/indie_flask/__init__.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 68: uparts = urlparse(target)
- File: indie_flask/indie_flask/__init__.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400)
-File: indie_flask/indie_flask/__init__.py
- > reaches line 82, trigger word "url_for(":
- status_url = url_for('taskstatus',task_id=task.id)
-
-Vulnerability 2:
-File: indie_flask/indie_flask/__init__.py
- > User input at line 64, trigger word "form[":
- target = request.form['target']
-Reassigned in:
- File: indie_flask/indie_flask/__init__.py
- > Line 68: uparts = urlparse(target)
- File: indie_flask/indie_flask/__init__.py
- > Line 72: uparts = urlparse(source)
- File: indie_flask/indie_flask/__init__.py
- > Line 80: task = validate_and_publish.delay(source, target)
- File: indie_flask/indie_flask/__init__.py
- > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url
- File: indie_flask/indie_flask/__init__.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400)
-File: indie_flask/indie_flask/__init__.py
- > reaches line 82, trigger word "url_for(":
- status_url = url_for('taskstatus',task_id=task.id)
-
-Vulnerability 3:
-File: indie_flask/indie_flask/__init__.py
- > User input at line 59, trigger word "form[":
- source = request.form['source']
-Reassigned in:
- File: indie_flask/indie_flask/__init__.py
- > Line 72: uparts = urlparse(source)
- File: indie_flask/indie_flask/__init__.py
- > Line 80: task = validate_and_publish.delay(source, target)
- File: indie_flask/indie_flask/__init__.py
- > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url
- File: indie_flask/indie_flask/__init__.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 68: uparts = urlparse(target)
- File: indie_flask/indie_flask/__init__.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400)
-File: indie_flask/indie_flask/__init__.py
- > reaches line 88, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(response), 201, 'Location'status_url)
-
-Vulnerability 4:
-File: indie_flask/indie_flask/__init__.py
- > User input at line 64, trigger word "form[":
- target = request.form['target']
-Reassigned in:
- File: indie_flask/indie_flask/__init__.py
- > Line 68: uparts = urlparse(target)
- File: indie_flask/indie_flask/__init__.py
- > Line 72: uparts = urlparse(source)
- File: indie_flask/indie_flask/__init__.py
- > Line 80: task = validate_and_publish.delay(source, target)
- File: indie_flask/indie_flask/__init__.py
- > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url
- File: indie_flask/indie_flask/__init__.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400)
- File: indie_flask/indie_flask/__init__.py
- > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400)
-File: indie_flask/indie_flask/__init__.py
- > reaches line 88, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(response), 201, 'Location'status_url)
-
-
-
-httpslixc/flask-web
-https://github.com/httpslixc/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 13:09:00.812792
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-neefrankie/flask-demo
-https://github.com/neefrankie/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:09:02.314841
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/neefrankie/flask-demo.
-
-arnobroekhof/flask-boilerplate
-https://github.com/arnobroekhof/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 13:09:04.822278
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/arnobroekhof/flask-boilerplate.
-
-jasontatem/flask_demo
-https://github.com/jasontatem/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-20 13:09:05.370903
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vasilaky/formtest_flask
-https://github.com/vasilaky/formtest_flask
-Entry file: formtest_flask/Form/__init__.py
-Scanned: 2016-10-20 13:09:07.186398
-No vulnerabilities found.
-
-
-sirko1990/flask_app
-https://github.com/sirko1990/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:09:08.703538
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sirko1990/flask_app.
-
-edwinyoung/personal-flask
-https://github.com/edwinyoung/personal-flask
-Entry file: personal-flask/Personal-Flask.py
-Scanned: 2016-10-20 13:09:12.040519
-No vulnerabilities found.
-
-
-dineshk8666/Flask_Examples
-https://github.com/dineshk8666/Flask_Examples
-Entry file: Flask_Examples/hello.py
-Scanned: 2016-10-20 13:09:13.352071
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adarshmammen/flask_stocks
-https://github.com/adarshmammen/flask_stocks
-Entry file: flask_stocks/app.py
-Scanned: 2016-10-20 13:09:19.669969
-No vulnerabilities found.
-
-
-sternmatt/FLASK_DEMO
-https://github.com/sternmatt/FLASK_DEMO
-Entry file: FLASK_DEMO/app.py
-Scanned: 2016-10-20 13:09:22.092060
-Vulnerability 1:
-File: FLASK_DEMO/app.py
- > User input at line 29, trigger word "form[":
- stock = request.form['stockticker']
-Reassigned in:
- File: FLASK_DEMO/app.py
- > Line 30: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % stock
- File: FLASK_DEMO/app.py
- > Line 33: raw_data = session.get(api_url)
- File: FLASK_DEMO/app.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('userinfo.html')
-File: FLASK_DEMO/app.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('graph.html',stockticker=stock, script=script, div=div)
-
-
-
-harshmathur1990/flask_boilerplate
-https://github.com/harshmathur1990/flask_boilerplate
-Entry file: flask_boilerplate/application/__init__.py
-Scanned: 2016-10-20 13:09:22.620328
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dtrodger/first_flask
-https://github.com/dtrodger/first_flask
-Entry file: first_flask/app/__init__.py
-Scanned: 2016-10-20 13:09:30.720000
-No vulnerabilities found.
-
-
-gamte19/Flask_dojo
-https://github.com/gamte19/Flask_dojo
-Entry file: Flask_dojo/main.py
-Scanned: 2016-10-20 13:09:32.129000
-No vulnerabilities found.
-
-
-lepkebocs/flask_dojo
-https://github.com/lepkebocs/flask_dojo
-Entry file: flask_dojo/dojo.py
-Scanned: 2016-10-20 13:09:33.431673
-No vulnerabilities found.
-
-
-bjnooms/flask_wiki
-https://github.com/bjnooms/flask_wiki
-Entry file: flask_wiki/__init__.py
-Scanned: 2016-10-20 13:09:36.251168
-No vulnerabilities found.
-
-
-sp41mer/Flask_logger
-https://github.com/sp41mer/Flask_logger
-Entry file: Flask_logger/Logger.py
-Scanned: 2016-10-20 13:09:37.590138
-No vulnerabilities found.
-
-
-sanjayankur31/flask-grinberg
-https://github.com/sanjayankur31/flask-grinberg
-Entry file: flask-grinberg/app/__init__.py
-Scanned: 2016-10-20 13:09:39.088866
-No vulnerabilities found.
-
-
-xiyinmoon/flask_blog
-https://github.com/xiyinmoon/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:09:39.598983
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-QMickael/easy_flask
-https://github.com/QMickael/easy_flask
-Entry file: None
-Scanned: 2016-10-20 13:09:40.107864
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/QMickael/easy_flask.
-
-gordoning/todolist_flask
-https://github.com/gordoning/todolist_flask
-Entry file: todolist_flask/doc/sample.py
-Scanned: 2016-10-20 13:09:41.511064
-No vulnerabilities found.
-
-
-artakak/TestFlask
-https://github.com/artakak/TestFlask
-Entry file: TestFlask/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:09:44.816522
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sunghyunzz/flask-ultrajson
-https://github.com/sunghyunzz/flask-ultrajson
-Entry file: flask-ultrajson/tests/app.py
-Scanned: 2016-10-20 13:09:46.252429
-No vulnerabilities found.
-
-
-qmehdi/flask_app
-https://github.com/qmehdi/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:09:46.773546
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/qmehdi/flask_app.
-
-navcat/flask_baidu
-https://github.com/navcat/flask_baidu
-Entry file: flask_baidu/baidu.py
-Scanned: 2016-10-20 13:09:48.090386
-No vulnerabilities found.
-
-
-Ezi4Zy/mastering_flask
-https://github.com/Ezi4Zy/mastering_flask
-Entry file: mastering_flask/mastering_flask.py
-Scanned: 2016-10-20 13:09:49.409907
-No vulnerabilities found.
-
-
-BasalGanglia/flask-aws
-https://github.com/BasalGanglia/flask-aws
-Entry file: flask-aws/hello.py
-Scanned: 2016-10-20 13:09:50.947468
-No vulnerabilities found.
-
-
-SergiySavarin/flask_ex
-https://github.com/SergiySavarin/flask_ex
-Entry file: flask_ex/wsgi.py
-Scanned: 2016-10-20 13:09:51.461733
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lorszil/flask-dojo
-https://github.com/lorszil/flask-dojo
-Entry file: flask-dojo/request-counter.py
-Scanned: 2016-10-20 13:09:52.752595
-No vulnerabilities found.
-
-
-krs89/flask_dojo
-https://github.com/krs89/flask_dojo
-Entry file: flask_dojo/app.py
-Scanned: 2016-10-20 13:09:55.115169
-No vulnerabilities found.
-
-
-breezeofjune/flask-todolist
-https://github.com/breezeofjune/flask-todolist
-Entry file: flask-todolist/todolist/app/__init__.py
-Scanned: 2016-10-20 13:10:06.174669
-Vulnerability 1:
-File: flask-todolist/todolist/app/main/views.py
- > User input at line 28, trigger word "get(":
- page_index = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-todolist/todolist/app/main/views.py
- > Line 31: pagination = cur_user_todos.paginate(page_index,per_page=5, error_out=False)
- File: flask-todolist/todolist/app/main/views.py
- > Line 33: todo_result = pagination.items
-File: flask-todolist/todolist/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('main.html',title='My_todo_list', todos=todo_result, pagination=pagination)
-
-
-
-nn243823163/flask_qichacha
-https://github.com/nn243823163/flask_qichacha
-Entry file: flask_qichacha/app/__init__.py
-Scanned: 2016-10-20 13:10:07.838875
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-synnick/flask-quickstart
-https://github.com/synnick/flask-quickstart
-Entry file: flask-quickstart/flask-quickstart/cli.py
-Scanned: 2016-10-20 13:10:08.362290
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mrcosta/flask-boilerplate
-https://github.com/mrcosta/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 13:10:08.883228
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrcosta/flask-boilerplate.
-
-bullkyker/flask_app
-https://github.com/bullkyker/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:10:09.382515
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bullkyker/flask_app.
-
-acraig94/curly-flask
-https://github.com/acraig94/curly-flask
-Entry file: curly-flask/app.py
-Scanned: 2016-10-20 13:10:10.714234
-No vulnerabilities found.
-
-
-levi-james/flask_blog
-https://github.com/levi-james/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:10:11.226991
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-antoniocsz/LivroFlask
-https://github.com/antoniocsz/LivroFlask
-Entry file: LivroFlask/app/__init__.py
-Scanned: 2016-10-20 13:10:12.902508
-Vulnerability 1:
-File: LivroFlask/app/main/views.py
- > User input at line 18, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: LivroFlask/app/main/views.py
- > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: LivroFlask/app/main/views.py
- > Line 29: posts = pagination.items
- File: LivroFlask/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: LivroFlask/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: LivroFlask/app/main/views.py
- > User input at line 21, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: LivroFlask/app/main/views.py
- > Line 19: show_followed = False
- File: LivroFlask/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: LivroFlask/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: LivroFlask/app/main/views.py
- > User input at line 36, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: LivroFlask/app/main/views.py
- > Line 37: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: LivroFlask/app/main/views.py
- > Line 40: posts = pagination.items
-File: LivroFlask/app/main/views.py
- > reaches line 41, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: LivroFlask/app/main/views.py
- > User input at line 146, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: LivroFlask/app/main/views.py
- > Line 147: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: LivroFlask/app/main/views.py
- > Line 148: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: LivroFlask/app/main/views.py
- > Line 145: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: LivroFlask/app/main/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: LivroFlask/app/main/views.py
- > User input at line 158, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: LivroFlask/app/main/views.py
- > Line 159: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: LivroFlask/app/main/views.py
- > Line 160: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: LivroFlask/app/main/views.py
- > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: LivroFlask/app/main/views.py
- > reaches line 161, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followers', pagination=pagination, follows=follows)
-
-
-
-ivanpch/microblog
-https://github.com/ivanpch/microblog
-Entry file: None
-Scanned: 2016-10-20 13:10:13.417036
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lihuii/Log
-https://github.com/lihuii/Log
-Entry file: Log/app/__init__.py
-Scanned: 2016-10-20 13:10:19.817173
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-DevinCalado/FlaskWebApp
-https://github.com/DevinCalado/FlaskWebApp
-Entry file: FlaskWebApp/FanGuardFlask/__init__.py
-Scanned: 2016-10-20 13:10:21.341406
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-BeiShanKin/FlaskPersonalBlog
-https://github.com/BeiShanKin/FlaskPersonalBlog
-Entry file: FlaskPersonalBlog/app/__init__.py
-Scanned: 2016-10-20 13:10:30.761479
-No vulnerabilities found.
-
-
-imapex-training/spark-webhook-tutorial
-https://github.com/imapex-training/spark-webhook-tutorial
-Entry file: spark-webhook-tutorial/app.py
-Scanned: 2016-10-20 13:10:35.986025
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-josleahy/flask_hello_world
-https://github.com/josleahy/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 13:10:36.988716
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/josleahy/flask_hello_world.
-
-SangTran01/python-crud-with-Flask
-https://github.com/SangTran01/python-crud-with-Flask
-Entry file: python-crud-with-Flask/vagrant/webserver/project.py
-Scanned: 2016-10-20 13:10:38.421776
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kamieb03/first-flask-app
-https://github.com/kamieb03/first-flask-app
-Entry file: None
-Scanned: 2016-10-20 13:10:38.940953
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-marb61a/Simple_Flask_Blog
-https://github.com/marb61a/Simple_Flask_Blog
-Entry file: Simple_Flask_Blog/__init__.py
-Scanned: 2016-10-20 13:10:47.376469
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Simple_Flask_Blog/venv/lib/python3.4/struct.py
-
-ezequielo/flask_celery_exp
-https://github.com/ezequielo/flask_celery_exp
-Entry file: flask_celery_exp/app/__init__.py
-Scanned: 2016-10-20 13:10:48.692188
-No vulnerabilities found.
-
-
-sadu99/Flask-MongoDB-Setup
-https://github.com/sadu99/Flask-MongoDB-Setup
-Entry file: Flask-MongoDB-Setup/crud.py
-Scanned: 2016-10-20 13:10:50.017722
-No vulnerabilities found.
-
-
-dduong26/flask_api_practice
-https://github.com/dduong26/flask_api_practice
-Entry file: flask_api_practice/mongo_connect.py
-Scanned: 2016-10-20 13:10:51.457395
-No vulnerabilities found.
-
-
-Faffola/MyFlaskDemo
-https://github.com/Faffola/MyFlaskDemo
-Entry file: MyFlaskDemo/app.py
-Scanned: 2016-10-20 13:10:59.084859
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: MyFlaskDemo/venv/lib/python2.7/genericpath.py
-
-dsreliete/HelloWorld_Flask
-https://github.com/dsreliete/HelloWorld_Flask
-Entry file: HelloWorld_Flask/hello.py
-Scanned: 2016-10-20 13:11:00.403548
-No vulnerabilities found.
-
-
-epiedad/flask-social-app
-https://github.com/epiedad/flask-social-app
-Entry file: None
-Scanned: 2016-10-20 13:11:01.829823
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/epiedad/flask-social-app.
-
-Ben0mega/SimpleFlaskWiki
-https://github.com/Ben0mega/SimpleFlaskWiki
-Entry file: SimpleFlaskWiki/main.py
-Scanned: 2016-10-20 13:11:03.246539
-Vulnerability 1:
-File: SimpleFlaskWiki/main.py
- > User input at line 33, trigger word "Markup(":
- content = Markup(markdown.markdown(content))
-Reassigned in:
- File: SimpleFlaskWiki/main.py
- > Line 32: content = f.read()
-File: SimpleFlaskWiki/main.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('wiki_page.html',content=content, title=title)
-
-Vulnerability 2:
-File: SimpleFlaskWiki/main.py
- > User input at line 138, trigger word "form[":
- name = request.form['title']
-Reassigned in:
- File: SimpleFlaskWiki/main.py
- > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg'])
- File: SimpleFlaskWiki/main.py
- > Line 148: fn = nameToFileName(name)
- File: SimpleFlaskWiki/main.py
- > Line 151: fn = nameToFileName(name, 'text/plain')
- File: SimpleFlaskWiki/main.py
- > Line 159: fn = nameToFileName(name, file_.mimetype)
-File: SimpleFlaskWiki/main.py
- > reaches line 156, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name))
-
-Vulnerability 3:
-File: SimpleFlaskWiki/main.py
- > User input at line 138, trigger word "form[":
- name = request.form['title']
-Reassigned in:
- File: SimpleFlaskWiki/main.py
- > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg'])
- File: SimpleFlaskWiki/main.py
- > Line 148: fn = nameToFileName(name)
- File: SimpleFlaskWiki/main.py
- > Line 151: fn = nameToFileName(name, 'text/plain')
- File: SimpleFlaskWiki/main.py
- > Line 159: fn = nameToFileName(name, file_.mimetype)
-File: SimpleFlaskWiki/main.py
- > reaches line 156, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name))
-
-Vulnerability 4:
-File: SimpleFlaskWiki/main.py
- > User input at line 138, trigger word "form[":
- name = request.form['title']
-Reassigned in:
- File: SimpleFlaskWiki/main.py
- > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg'])
- File: SimpleFlaskWiki/main.py
- > Line 148: fn = nameToFileName(name)
- File: SimpleFlaskWiki/main.py
- > Line 151: fn = nameToFileName(name, 'text/plain')
- File: SimpleFlaskWiki/main.py
- > Line 159: fn = nameToFileName(name, file_.mimetype)
-File: SimpleFlaskWiki/main.py
- > reaches line 161, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name))
-
-Vulnerability 5:
-File: SimpleFlaskWiki/main.py
- > User input at line 138, trigger word "form[":
- name = request.form['title']
-Reassigned in:
- File: SimpleFlaskWiki/main.py
- > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg'])
- File: SimpleFlaskWiki/main.py
- > Line 148: fn = nameToFileName(name)
- File: SimpleFlaskWiki/main.py
- > Line 151: fn = nameToFileName(name, 'text/plain')
- File: SimpleFlaskWiki/main.py
- > Line 159: fn = nameToFileName(name, file_.mimetype)
-File: SimpleFlaskWiki/main.py
- > reaches line 161, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name))
-
-
-
-QLGQ/awesome-flask-todo
-https://github.com/QLGQ/awesome-flask-todo
-Entry file: None
-Scanned: 2016-10-20 13:11:03.761388
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/QLGQ/awesome-flask-todo.
-
-vimalloc/flask-jwt-extended
-https://github.com/vimalloc/flask-jwt-extended
-Entry file: flask-jwt-extended/examples/simple.py
-Scanned: 2016-10-20 13:11:07.685677
-Vulnerability 1:
-File: flask-jwt-extended/examples/simple.py
- > User input at line 16, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/simple.py
- > Line 22: ret = 'access_token'create_access_token(identity=username)
- File: flask-jwt-extended/examples/simple.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/simple.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-Vulnerability 2:
-File: flask-jwt-extended/examples/blacklist.py
- > User input at line 35, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/blacklist.py
- > Line 40: ret = 'access_token''refresh_token'create_access_token(identity=username)create_refresh_token(identity=username)
- File: flask-jwt-extended/examples/blacklist.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/blacklist.py
- > reaches line 44, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-Vulnerability 3:
-File: flask-jwt-extended/examples/refresh_tokens.py
- > User input at line 13, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/refresh_tokens.py
- > Line 20: ret = 'access_token''refresh_token'create_access_token(identity=username)create_refresh_token(identity=username)
- File: flask-jwt-extended/examples/refresh_tokens.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/refresh_tokens.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-Vulnerability 4:
-File: flask-jwt-extended/examples/token_freshness.py
- > User input at line 15, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/token_freshness.py
- > Line 24: ret = 'access_token''refresh_token'create_access_token(identity=username, fresh=True)create_refresh_token(identity=username)
- File: flask-jwt-extended/examples/token_freshness.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/token_freshness.py
- > reaches line 28, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-Vulnerability 5:
-File: flask-jwt-extended/examples/token_freshness.py
- > User input at line 38, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/token_freshness.py
- > Line 43: new_token = create_access_token(identity=username, fresh=True)
- File: flask-jwt-extended/examples/token_freshness.py
- > Line 44: ret = 'access_token'new_token
- File: flask-jwt-extended/examples/token_freshness.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/token_freshness.py
- > reaches line 45, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-Vulnerability 6:
-File: flask-jwt-extended/examples/additional_data_in_access_token.py
- > User input at line 24, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/additional_data_in_access_token.py
- > Line 29: ret = 'access_token'create_access_token(username)
- File: flask-jwt-extended/examples/additional_data_in_access_token.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/additional_data_in_access_token.py
- > reaches line 30, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-Vulnerability 7:
-File: flask-jwt-extended/examples/loaders.py
- > User input at line 24, trigger word "get(":
- username = request.json.get('username', None)
-Reassigned in:
- File: flask-jwt-extended/examples/loaders.py
- > Line 29: ret = 'access_token'create_access_token(username)
- File: flask-jwt-extended/examples/loaders.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401)
-File: flask-jwt-extended/examples/loaders.py
- > reaches line 30, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200)
-
-
-
-mayurvaidya09/Flask
-https://github.com/mayurvaidya09/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:11:08.214938
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-harryjia/flask
-https://github.com/harryjia/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:11:08.808239
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-randm-/flask
-https://github.com/randm-/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:11:09.393016
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-zhaokefei/flask
-https://github.com/zhaokefei/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:11:09.968838
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-xjr7670/flask
-https://github.com/xjr7670/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:11:10.554398
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Morfyo/Flask
-https://github.com/Morfyo/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:11:11.065611
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hamdimuzakkiy/Flask
-https://github.com/hamdimuzakkiy/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:11:11.582967
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bellcodo/fisrt-flask-app
-https://github.com/bellcodo/fisrt-flask-app
-Entry file: fisrt-flask-app/hello_app.py
-Scanned: 2016-10-20 13:11:12.887180
-No vulnerabilities found.
-
-
-georgigeorgiev/flaskbe
-https://github.com/georgigeorgiev/flaskbe
-Entry file: flaskbe/flaskbe/__init__.py
-Scanned: 2016-10-20 13:11:14.314267
-No vulnerabilities found.
-
-
-ryanruthart/flasktaskr
-https://github.com/ryanruthart/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:11:14.840268
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Sventenhaaf/flasktwo
-https://github.com/Sventenhaaf/flasktwo
-Entry file: flasktwo/app.py
-Scanned: 2016-10-20 13:11:25.815750
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-martyni/flaskstrap
-https://github.com/martyni/flaskstrap
-Entry file: flaskstrap/flaskstrap/app.py
-Scanned: 2016-10-20 13:11:27.615639
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-irritant/flasktory
-https://github.com/irritant/flasktory
-Entry file: flasktory/template/app/__init__.py
-Scanned: 2016-10-20 13:11:33.062235
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-isyippee/flasky
-https://github.com/isyippee/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:11:33.570465
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-iteong/flaskbot
-https://github.com/iteong/flaskbot
-Entry file: flaskbot/app.py
-Scanned: 2016-10-20 13:11:42.565076
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-juwaini/flaskr
-https://github.com/juwaini/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:11:43.078253
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-reasonoughtrule/flaskr
-https://github.com/reasonoughtrule/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:11:43.589537
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ipeacocks/flasktaskr
-https://github.com/ipeacocks/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:11:44.096310
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-klouskingsley/flaskdemo
-https://github.com/klouskingsley/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:11:44.609799
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-reshama/flaskapps
-https://github.com/reshama/flaskapps
-Entry file: flaskapps/testgoogleauth/app/__init__.py
-Scanned: 2016-10-20 13:11:48.130954
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kpotash/flasknotes
-https://github.com/kpotash/flasknotes
-Entry file: flasknotes/notes.py
-Scanned: 2016-10-20 13:11:50.565291
-No vulnerabilities found.
-
-
-jehuston/text_classifier
-https://github.com/jehuston/text_classifier
-Entry file: text_classifier/app.py
-Scanned: 2016-10-20 13:12:00.807853
-Vulnerability 1:
-File: text_classifier/app.py
- > User input at line 19, trigger word "form[":
- text = str(request.form['input_text'])
-Reassigned in:
- File: text_classifier/app.py
- > Line 20: X = vectorizer.transform([text])
- File: text_classifier/app.py
- > Line 21: prediction = model.predict(X)[0]
-File: text_classifier/app.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('predict.html',prediction=prediction, title='Results')
-
-Vulnerability 2:
-File: text_classifier/app.py
- > User input at line 20, trigger word "form(":
- X = vectorizer.transform([text])
-Reassigned in:
- File: text_classifier/app.py
- > Line 21: prediction = model.predict(X)[0]
-File: text_classifier/app.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('predict.html',prediction=prediction, title='Results')
-
-
-
-Miserlou/zappa-bittorrent-tracker
-https://github.com/Miserlou/zappa-bittorrent-tracker
-Entry file: zappa-bittorrent-tracker/track.py
-Scanned: 2016-10-20 13:12:02.302822
-No vulnerabilities found.
-
-
-mcquam/flasky2
-https://github.com/mcquam/flasky2
-Entry file: flasky2/app/__init__.py
-Scanned: 2016-10-20 13:12:04.019182
-Vulnerability 1:
-File: flasky2/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/main/views.py
- > Line 55: posts = pagination.items
- File: flasky2/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flasky2/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 45: show_followed = False
- File: flasky2/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flasky2/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/main/views.py
- > Line 67: posts = pagination.items
-File: flasky2/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flasky2/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flasky2/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/main/views.py
- > Line 134: comments = pagination.items
- File: flasky2/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flasky2/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flasky2/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky2/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flasky2/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flasky2/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky2/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flasky2/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flasky2/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/main/views.py
- > Line 246: comments = pagination.items
-File: flasky2/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 8:
-File: flasky2/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: flasky2/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: flasky2/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 11:
-File: flasky2/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2/app/api_1_0/users.py
- > Line 46: next = None
-File: flasky2/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: flasky2/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2/app/api_1_0/users.py
- > Line 46: next = None
-File: flasky2/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: flasky2/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2/app/api_1_0/users.py
- > Line 46: next = None
-File: flasky2/app/api_1_0/users.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 14:
-File: flasky2/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flasky2/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flasky2/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 17:
-File: flasky2/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flasky2/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flasky2/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 20:
-File: flasky2/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 21:
-File: flasky2/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 22:
-File: flasky2/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-
-
-jiwpark00/FlaskTutorial
-https://github.com/jiwpark00/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 13:12:04.535233
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-WYoYao/flaskCode
-https://github.com/WYoYao/flaskCode
-Entry file: flaskCode/setup.py
-Scanned: 2016-10-20 13:12:11.433927
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-MittalShruti/FlaskApp
-https://github.com/MittalShruti/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 13:12:12.007661
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-egolus/flaskApp
-https://github.com/egolus/flaskApp
-Entry file: flaskApp/apiApp_new.py
-Scanned: 2016-10-20 13:12:12.529226
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mayurvaidya09/FlaskDemo
-https://github.com/mayurvaidya09/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 13:12:13.046458
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ethanchewy/FlaskAjax
-https://github.com/ethanchewy/FlaskAjax
-Entry file: FlaskAjax/main/app.py
-Scanned: 2016-10-20 13:12:20.687951
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AnthonyShalagin/FlaskTutorial
-https://github.com/AnthonyShalagin/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 13:12:21.700654
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pigaov10/FlaskApi
-https://github.com/pigaov10/FlaskApi
-Entry file: FlaskApi/app/provider.py
-Scanned: 2016-10-20 13:12:23.041295
-No vulnerabilities found.
-
-
-sarvex/FlaskBasics
-https://github.com/sarvex/FlaskBasics
-Entry file: FlaskBasics/FlaskBasics.py
-Scanned: 2016-10-20 13:12:24.449857
-No vulnerabilities found.
-
-
-SubhrajyotiSen/FlaskBlog
-https://github.com/SubhrajyotiSen/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 13:12:25.114189
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dyrkabes/FlaskApp
-https://github.com/dyrkabes/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 13:12:25.693779
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-adiol/flask-project
-https://github.com/adiol/flask-project
-Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:12:33.479771
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-ovidiu1/python-flask
-https://github.com/ovidiu1/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 13:12:34.028084
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chiphwang/flask_app
-https://github.com/chiphwang/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:12:34.541726
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/chiphwang/flask_app.
-
-xxxxsars/Flask_upload
-https://github.com/xxxxsars/Flask_upload
-Entry file: Flask_upload/flask_upload.py
-Scanned: 2016-10-20 13:12:35.896799
-No vulnerabilities found.
-
-
-DenGodunov/flask_microblog
-https://github.com/DenGodunov/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 13:12:36.461127
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-liangkai6419/learn_flask
-https://github.com/liangkai6419/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 13:12:36.973308
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-huiyaoren/Learn_Flask
-https://github.com/huiyaoren/Learn_Flask
-Entry file: Learn_Flask/app/__init__.py
-Scanned: 2016-10-20 13:12:39.164968
-No vulnerabilities found.
-
-
-socialwifi/flask-oauthres
-https://github.com/socialwifi/flask-oauthres
-Entry file: flask-oauthres/tests/_app.py
-Scanned: 2016-10-20 13:12:40.610310
-No vulnerabilities found.
-
-
-pwh0903/flask-todo
-https://github.com/pwh0903/flask-todo
-Entry file: flask-todo/backend/app.py
-Scanned: 2016-10-20 13:12:43.148198
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-GuessWhoSamFoo/Flask-Website
-https://github.com/GuessWhoSamFoo/Flask-Website
-Entry file: Flask-Website/app.py
-Scanned: 2016-10-20 13:12:59.223799
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-agafonovdev/flask_template
-https://github.com/agafonovdev/flask_template
-Entry file: None
-Scanned: 2016-10-20 13:12:59.727355
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/agafonovdev/flask_template.
-
-Lijin111/Flask-Web
-https://github.com/Lijin111/Flask-Web
-Entry file: Flask-Web/Flask.py
-Scanned: 2016-10-20 13:13:01.952629
-Vulnerability 1:
-File: Flask-Web/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Web/app/main/views.py
- > Line 32: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Web/app/main/views.py
- > Line 35: posts = pagination.items
- File: Flask-Web/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Web/app/main/views.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Flask-Web/app/main/views.py
- > User input at line 26, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Flask-Web/app/main/views.py
- > Line 24: show_followed = False
- File: Flask-Web/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Web/app/main/views.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Flask-Web/app/main/views.py
- > User input at line 123, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Web/app/main/views.py
- > Line 125: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Flask-Web/app/main/views.py
- > Line 127: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-Web/app/main/views.py
- > Line 130: comments = pagination.items
- File: Flask-Web/app/main/views.py
- > Line 122: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Flask-Web/app/main/views.py
- > reaches line 131, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: Flask-Web/app/main/views.py
- > User input at line 190, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Web/app/main/views.py
- > Line 191: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flask-Web/app/main/views.py
- > Line 194: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Flask-Web/app/main/views.py
- > Line 189: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Web/app/main/views.py
- > reaches line 196, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: Flask-Web/app/main/views.py
- > User input at line 207, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Web/app/main/views.py
- > Line 208: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flask-Web/app/main/views.py
- > Line 211: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Flask-Web/app/main/views.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Web/app/main/views.py
- > reaches line 213, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Flask-Web/app/main/views.py
- > User input at line 236, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Web/app/main/views.py
- > Line 237: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-Web/app/main/views.py
- > Line 240: comments = pagination.items
-File: Flask-Web/app/main/views.py
- > reaches line 241, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-chaitjo/flask-mongodb
-https://github.com/chaitjo/flask-mongodb
-Entry file: flask-mongodb/api.py
-Scanned: 2016-10-20 13:13:03.754929
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-action-hong/study_flask
-https://github.com/action-hong/study_flask
-Entry file: None
-Scanned: 2016-10-20 13:13:04.311582
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-carrbs/flask-tutorial
-https://github.com/carrbs/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 13:13:04.816449
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-javierdva/flask-example
-https://github.com/javierdva/flask-example
-Entry file: flask-example/main.py
-Scanned: 2016-10-20 13:13:05.338661
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EgorKurito/flask_bot
-https://github.com/EgorKurito/flask_bot
-Entry file: flask_bot/bot.py
-Scanned: 2016-10-20 13:13:06.656464
-No vulnerabilities found.
-
-
-jurrehart/flask_tut
-https://github.com/jurrehart/flask_tut
-Entry file: flask_tut/microblog/app/__init__.py
-Scanned: 2016-10-20 13:13:07.168660
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-saiprakashreddymarasani/MyFlask
-https://github.com/saiprakashreddymarasani/MyFlask
-Entry file: MyFlask/FlaskSample/app.py
-Scanned: 2016-10-20 13:13:14.140442
-No vulnerabilities found.
-
-
-Atheloses/Flask-Bones
-https://github.com/Atheloses/Flask-Bones
-Entry file: Flask-Bones/app/__init__.py
-Scanned: 2016-10-20 13:13:20.188505
-Vulnerability 1:
-File: Flask-Bones/app/auth/views.py
- > User input at line 46, trigger word ".data":
- group = Group.create(nazev=form.data['nazev'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 48, trigger word "flash(":
- flash(gettext('Group {name} created').format(name=group.nazev), 'success')
-
-Vulnerability 2:
-File: Flask-Bones/app/auth/views.py
- > User input at line 58, trigger word ".data":
- firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 65, trigger word "flash(":
- flash(gettext('Organization {name} created').format(name=firma.nazev), 'success')
-
-Vulnerability 3:
-File: Flask-Bones/app/public/views.py
- > User input at line 37, trigger word ".data":
- user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni'])
-Reassigned in:
- File: Flask-Bones/app/public/views.py
- > Line 47: token = s.dumps(user.id)
-File: Flask-Bones/app/public/views.py
- > reaches line 51, trigger word "flash(":
- flash(gettext('Sent verification email to {email}').format(email=user.email), 'success')
-
-
-
-joelcolucci/flask-dropin
-https://github.com/joelcolucci/flask-dropin
-Entry file: flask-dropin/tests/test_dropin.py
-Scanned: 2016-10-20 13:13:21.550724
-No vulnerabilities found.
-
-
-KingOkay/flask-book
-https://github.com/KingOkay/flask-book
-Entry file: flask-book/app/__init__.py
-Scanned: 2016-10-20 13:13:27.469377
-Vulnerability 1:
-File: flask-book/app/auth/verify.py
- > User input at line 64, trigger word "form(":
- img = img.transform(size, Image.PERSPECTIVE, params)
-Reassigned in:
- File: flask-book/app/auth/verify.py
- > Line 20: img = Image.new(mode, size, bg_color)
- File: flask-book/app/auth/verify.py
- > Line 21: draw = ImageDraw.Draw(img)
- File: flask-book/app/auth/verify.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = (img, strs)
-File: flask-book/app/auth/verify.py
- > reaches line 66, trigger word "filter(":
- img = img.filter(ImageFilter.EDGE_ENHANCE_MORE)
-
-Vulnerability 2:
-File: flask-book/app/main/views.py
- > User input at line 18, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1)
-File: flask-book/app/main/views.py
- > reaches line 19, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 3:
-File: flask-book/app/main/views.py
- > User input at line 18, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1)
-File: flask-book/app/main/views.py
- > reaches line 19, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 4:
-File: flask-book/app/main/views.py
- > User input at line 46, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id)
-File: flask-book/app/main/views.py
- > reaches line 47, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 5:
-File: flask-book/app/main/views.py
- > User input at line 46, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id)
-File: flask-book/app/main/views.py
- > reaches line 47, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 6:
-File: flask-book/app/main/views.py
- > User input at line 49, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 50: pagination = Book.query.filter_by(booktype_id=id).order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 53: books = pagination.items
- File: flask-book/app/main/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-File: flask-book/app/main/views.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id)
-
-Vulnerability 7:
-File: flask-book/app/main/views.py
- > User input at line 62, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999)
-File: flask-book/app/main/views.py
- > reaches line 63, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 8:
-File: flask-book/app/main/views.py
- > User input at line 62, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999)
-File: flask-book/app/main/views.py
- > reaches line 63, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 9:
-File: flask-book/app/main/views.py
- > User input at line 65, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 66: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 69: books = pagination.items
- File: flask-book/app/main/views.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-File: flask-book/app/main/views.py
- > reaches line 70, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999)
-
-Vulnerability 10:
-File: flask-book/app/main/views.py
- > User input at line 76, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 77: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 80: posts = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('all-post.html',title='好书推荐', posts=posts, pagination=pagination)
-
-Vulnerability 11:
-File: flask-book/app/main/views.py
- > User input at line 97, trigger word ".data":
- my_address = Address.query.filter_by(id=form.order_address.data).first()
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number)
- File: flask-book/app/main/views.py
- > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 12:
-File: flask-book/app/main/views.py
- > User input at line 101, trigger word ".data":
- order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 13:
-File: flask-book/app/main/views.py
- > User input at line 97, trigger word ".data":
- my_address = Address.query.filter_by(id=form.order_address.data).first()
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number)
- File: flask-book/app/main/views.py
- > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 14:
-File: flask-book/app/main/views.py
- > User input at line 101, trigger word ".data":
- order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 15:
-File: flask-book/app/main/views.py
- > User input at line 168, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 170: page = book.bookcos.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-book/app/main/views.py
- > Line 172: pagination = book.bookcos.order_by(BookCo.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 175: comments = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 176, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book.html',book=book, title=book.name, comments=comments, pagination=pagination)
-
-Vulnerability 16:
-File: flask-book/app/main/views.py
- > User input at line 275, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 276: pagination = Order.query.filter_by(author_id=current_user.id).order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_ORDERS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 279: orders = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 280, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('my-order.html',orders=orders, title='我的订单', pagination=pagination)
-
-Vulnerability 17:
-File: flask-book/app/main/views.py
- > User input at line 297, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form)
-File: flask-book/app/main/views.py
- > reaches line 298, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 18:
-File: flask-book/app/main/views.py
- > User input at line 297, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form)
-File: flask-book/app/main/views.py
- > reaches line 298, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 19:
-File: flask-book/app/main/views.py
- > User input at line 297, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form)
-File: flask-book/app/main/views.py
- > reaches line 299, trigger word "filter(":
- books = Book.query.filter(Book.name.like('%' + str + '%'))
-
-Vulnerability 20:
-File: flask-book/app/main/views.py
- > User input at line 309, trigger word ".data":
- post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object())
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章')
-File: flask-book/app/main/views.py
- > reaches line 314, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-
-Vulnerability 21:
-File: flask-book/app/main/views.py
- > User input at line 309, trigger word ".data":
- post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object())
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章')
-File: flask-book/app/main/views.py
- > reaches line 314, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-
-Vulnerability 22:
-File: flask-book/app/main/views.py
- > User input at line 340, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 342: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-book/app/main/views.py
- > Line 344: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 347: comments = pagination.items
- File: flask-book/app/main/views.py
- > Line 339: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=1))
-File: flask-book/app/main/views.py
- > reaches line 348, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], title='文章内容', form=form, comments=comments, pagination=pagination)
-
-Vulnerability 23:
-File: flask-book/app/main/views.py
- > User input at line 358, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 359: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 362: posts = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 363, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination, title='我的资料')
-
-Vulnerability 24:
-File: flask-book/app/admin/views.py
- > User input at line 29, trigger word ".data":
- book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书')
-File: flask-book/app/admin/views.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id))
-
-Vulnerability 25:
-File: flask-book/app/admin/views.py
- > User input at line 29, trigger word ".data":
- book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书')
-File: flask-book/app/admin/views.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id))
-
-Vulnerability 26:
-File: flask-book/app/admin/views.py
- > User input at line 98, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 99: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 102: book_lists = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 103, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/book-list.html',title='图书列表', pagination=pagination, book_lists=book_lists)
-
-Vulnerability 27:
-File: flask-book/app/admin/views.py
- > User input at line 111, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 112: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 115: user_lists = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 116, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/user-list.html',title='用户列表', user_lists=user_lists, pagination=pagination)
-
-Vulnerability 28:
-File: flask-book/app/admin/views.py
- > User input at line 164, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 165: pagination = Order.query.order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 168: orders = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 169, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/order-list.html',orders=orders, pagination=pagination, page=page, title='订单处理')
-
-Vulnerability 29:
-File: flask-book/app/admin/views.py
- > User input at line 188, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 189: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 192: comments = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 193, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/moderate.html',comments=comments, pagination=pagination, page=page, title='评论管理')
-
-
-
-tvenis/flask_app
-https://github.com/tvenis/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:13:27.970931
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tvenis/flask_app.
-
-kangnahua/flask-blog
-https://github.com/kangnahua/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:13:28.545883
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-mmeehan07/flask_app
-https://github.com/mmeehan07/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:13:29.052153
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mmeehan07/flask_app.
-
-maiku08/starwars-flask
-https://github.com/maiku08/starwars-flask
-Entry file: starwars-flask/starwars-flask/app.py
-Scanned: 2016-10-20 13:13:31.100349
-No vulnerabilities found.
-
-
-Balta-zar/flask-migrations
-https://github.com/Balta-zar/flask-migrations
-Entry file: flask-migrations/migration.py
-Scanned: 2016-10-20 13:13:32.477165
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vitaliylevitskiand/wordsplay_flask
-https://github.com/vitaliylevitskiand/wordsplay_flask
-Entry file: wordsplay_flask/wordsplay_flask.py
-Scanned: 2016-10-20 13:13:36.112035
-No vulnerabilities found.
-
-
-zeroSwift/startFlask
-https://github.com/zeroSwift/startFlask
-Entry file: startFlask/simpleGET.py
-Scanned: 2016-10-20 13:13:37.594291
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ferrufino/Flask-Learning
-https://github.com/ferrufino/Flask-Learning
-Entry file: Flask-Learning/restAPI/api.py
-Scanned: 2016-10-20 13:13:39.111357
-No vulnerabilities found.
-
-
-zackchew42/flask-web
-https://github.com/zackchew42/flask-web
-Entry file: flask-web/local_debug.py
-Scanned: 2016-10-20 13:13:39.624454
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-arutishauser/flask_app
-https://github.com/arutishauser/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:13:40.137125
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/arutishauser/flask_app.
-
-mdecourse/ByFlask
-https://github.com/mdecourse/ByFlask
-Entry file: ByFlask/flaskapp.py
-Scanned: 2016-10-20 13:13:48.699825
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-buttercms/buttercms-flask
-https://github.com/buttercms/buttercms-flask
-Entry file: buttercms-flask/app.py
-Scanned: 2016-10-20 13:13:50.026977
-Vulnerability 1:
-File: buttercms-flask/buttercms/blog_blueprint.py
- > User input at line 25, trigger word "get(":
- response = client.posts.get(slug)
-Reassigned in:
- File: buttercms-flask/buttercms/blog_blueprint.py
- > Line 27: post = response['data']
-File: buttercms-flask/buttercms/blog_blueprint.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',post=post)
-
-Vulnerability 2:
-File: buttercms-flask/buttercms/blog_blueprint.py
- > User input at line 36, trigger word "get(":
- response = client.authors.get(author_slug, 'include''recent_posts')
-Reassigned in:
- File: buttercms-flask/buttercms/blog_blueprint.py
- > Line 39: author = response['data']
-File: buttercms-flask/buttercms/blog_blueprint.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('author.html',author=author)
-
-Vulnerability 3:
-File: buttercms-flask/buttercms/blog_blueprint.py
- > User input at line 48, trigger word "get(":
- response = client.categories.get(category_slug, 'include''recent_posts')
-Reassigned in:
- File: buttercms-flask/buttercms/blog_blueprint.py
- > Line 50: category = response['data']
-File: buttercms-flask/buttercms/blog_blueprint.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=category)
-
-
-
-AlexN34/flask-tdd
-https://github.com/AlexN34/flask-tdd
-Entry file: flask-tdd/app.py
-Scanned: 2016-10-20 13:13:55.644668
-No vulnerabilities found.
-
-
-jillbourque/flask_app
-https://github.com/jillbourque/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:13:56.164590
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jillbourque/flask_app.
-
-ghkdgustn29/flask-practice
-https://github.com/ghkdgustn29/flask-practice
-Entry file: None
-Scanned: 2016-10-20 13:13:56.684489
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ghkdgustn29/flask-practice.
-
-lbarberiscanoni/Flask-Ex
-https://github.com/lbarberiscanoni/Flask-Ex
-Entry file: Flask-Ex/app.py
-Scanned: 2016-10-20 13:13:57.989801
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joegotflow83/todo_flask
-https://github.com/joegotflow83/todo_flask
-Entry file: todo_flask/app.py
-Scanned: 2016-10-20 13:13:59.300192
-No vulnerabilities found.
-
-
-tianyuwu/docker-flask
-https://github.com/tianyuwu/docker-flask
-Entry file: None
-Scanned: 2016-10-20 13:13:59.810590
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tianyuwu/docker-flask.
-
-rbrecheisen/flask-storage
-https://github.com/rbrecheisen/flask-storage
-Entry file: flask-storage/tests/__init__.py
-Scanned: 2016-10-20 13:14:00.323925
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-songyawei/flask-demo
-https://github.com/songyawei/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:14:02.839983
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/songyawei/flask-demo.
-
-matthewshim88/flask_mysql
-https://github.com/matthewshim88/flask_mysql
-Entry file: flask_mysql/friends/server.py
-Scanned: 2016-10-20 13:14:04.691140
-No vulnerabilities found.
-
-
-Yunobububu/Hello_Flask
-https://github.com/Yunobububu/Hello_Flask
-Entry file: None
-Scanned: 2016-10-20 13:14:06.062853
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Yunobububu/Hello_Flask.
-
-brpowell/flask-example
-https://github.com/brpowell/flask-example
-Entry file: flask-example/main.py
-Scanned: 2016-10-20 13:14:06.569886
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-waldo7/flask-hello-world
-https://github.com/waldo7/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 13:14:07.137501
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-mmomo/Rpi_auto
-https://github.com/mmomo/Rpi_auto
-Entry file: Rpi_auto/app/__init__.py
-Scanned: 2016-10-20 13:14:08.487765
-No vulnerabilities found.
-
-
-alm958/FlaskNumberGame
-https://github.com/alm958/FlaskNumberGame
-Entry file: FlaskNumberGame/numgameserver.py
-Scanned: 2016-10-20 13:14:09.785883
-No vulnerabilities found.
-
-
-chiangyiyang/FlaskSocketIO_Test
-https://github.com/chiangyiyang/FlaskSocketIO_Test
-Entry file: FlaskSocketIO_Test/app.py
-Scanned: 2016-10-20 13:14:14.133879
-No vulnerabilities found.
-
-
-YiCorleone/FlaskHelloWorld
-https://github.com/YiCorleone/FlaskHelloWorld
-Entry file: FlaskHelloWorld/hello.py
-Scanned: 2016-10-20 13:14:16.439797
-No vulnerabilities found.
-
-
-tloszabno/vuejs-flask-test
-https://github.com/tloszabno/vuejs-flask-test
-Entry file: None
-Scanned: 2016-10-20 13:14:21.751204
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tloszabno/vuejs-flask-test.
-
-Spider0io/flask-hello-world
-https://github.com/Spider0io/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-20 13:14:22.291766
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py
-
-prabaprakash/Flask_Rest_APP
-https://github.com/prabaprakash/Flask_Rest_APP
-Entry file: Flask_Rest_APP/App/__init__.py
-Scanned: 2016-10-20 13:14:29.682757
-No vulnerabilities found.
-
-
-josleahy/flask_hello_world
-https://github.com/josleahy/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 13:14:30.187130
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/josleahy/flask_hello_world.
-
-VamsikrishnaNallabothu/PyFlask_DataTables
-https://github.com/VamsikrishnaNallabothu/PyFlask_DataTables
-Entry file: PyFlask_DataTables/Flask1.py
-Scanned: 2016-10-20 13:14:32.472525
-No vulnerabilities found.
-
-
-jglee1/pi-flask-test
-https://github.com/jglee1/pi-flask-test
-Entry file: pi-flask-test/app.py
-Scanned: 2016-10-20 13:14:33.795616
-No vulnerabilities found.
-
-
-kamieb03/first-flask-app
-https://github.com/kamieb03/first-flask-app
-Entry file: None
-Scanned: 2016-10-20 13:14:37.307737
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-BYUFootball/first-flask-app
-https://github.com/BYUFootball/first-flask-app
-Entry file: None
-Scanned: 2016-10-20 13:14:38.817233
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fortune599/flask
-https://github.com/fortune599/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:14:41.681029
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-iamdavidmt/flask
-https://github.com/iamdavidmt/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:14:42.251822
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-DIYer22/flask
-https://github.com/DIYer22/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:14:49.840248
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-woowooh/flask
-https://github.com/woowooh/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:14:51.408230
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-jasondebolt/flask
-https://github.com/jasondebolt/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:14:57.001835
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-nsuJolie/flask
-https://github.com/nsuJolie/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:14:57.568256
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-pandapan0021/myblog
-https://github.com/pandapan0021/myblog
-Entry file: None
-Scanned: 2016-10-20 13:15:00.139342
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-qwertypomy/flask-example-app
-https://github.com/qwertypomy/flask-example-app
-Entry file: flask-example-app/app.py
-Scanned: 2016-10-20 13:15:07.909004
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-AminHP/flask-mvc
-https://github.com/AminHP/flask-mvc
-Entry file: flask-mvc/project/application.py
-Scanned: 2016-10-20 13:15:09.359599
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shitx/flaskapp
-https://github.com/shitx/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:15:10.342699
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shitx/flaskapp.
-
-eswizardry/flasktaskr
-https://github.com/eswizardry/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:15:10.839873
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-waldo7/flasktaskr
-https://github.com/waldo7/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:15:11.340656
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arsalanam/flasky
-https://github.com/arsalanam/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:15:11.841550
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Spider0io/flasktaskr
-https://github.com/Spider0io/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:15:12.360644
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-martyni/flaskstrap
-https://github.com/martyni/flaskstrap
-Entry file: flaskstrap/flaskstrap/app.py
-Scanned: 2016-10-20 13:15:13.879582
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-naviplay/flasktutorial
-https://github.com/naviplay/flasktutorial
-Entry file: None
-Scanned: 2016-10-20 13:15:16.410312
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MagicRoc/flaskoc
-https://github.com/MagicRoc/flaskoc
-Entry file: flaskoc/hello.py
-Scanned: 2016-10-20 13:15:23.246918
-Vulnerability 1:
-File: flaskoc/app/main/views.py
- > User input at line 56, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskoc/app/main/views.py
- > Line 57: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskoc/app/main/views.py
- > Line 60: posts = pagination.items
- File: flaskoc/app/main/views.py
- > Line 55: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskoc/app/main/views.py
- > reaches line 61, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flaskoc/app/main/views.py
- > User input at line 72, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskoc/app/main/views.py
- > Line 73: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskoc/app/main/views.py
- > Line 76: posts = pagination.items
-File: flaskoc/app/main/views.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-yorolifarg/flasksample
-https://github.com/yorolifarg/flasksample
-Entry file: flasksample/chapter2/app.py
-Scanned: 2016-10-20 13:15:30.827722
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Arlus/flasktest
-https://github.com/Arlus/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:15:31.338508
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rschmidtz/flaskr
-https://github.com/rschmidtz/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:15:31.846907
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ThisIsMyNick/flasky
-https://github.com/ThisIsMyNick/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:15:32.387464
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-topleft/flasktasker
-https://github.com/topleft/flasktasker
-Entry file: flasktasker/views.py
-Scanned: 2016-10-20 13:15:32.929295
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-TangXinCN/flaskdev
-https://github.com/TangXinCN/flaskdev
-Entry file: flaskdev/app/__init__.py
-Scanned: 2016-10-20 13:15:34.839988
-Vulnerability 1:
-File: flaskdev/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 22: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 26: posts = pagination.items
- File: flaskdev/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskdev/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flaskdev/app/main/views.py
- > User input at line 35, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 36: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 40: posts = pagination.items
-File: flaskdev/app/main/views.py
- > reaches line 41, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 3:
-File: flaskdev/app/main/views.py
- > User input at line 89, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 91: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskdev/app/main/views.py
- > Line 93: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 97: comments = pagination.items
- File: flaskdev/app/main/views.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskdev/app/main/views.py
- > reaches line 98, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: flaskdev/app/main/views.py
- > User input at line 122, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdev/app/main/views.py
- > Line 123: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskdev/app/main/views.py
- > Line 127: comments = pagination.items
-File: flaskdev/app/main/views.py
- > reaches line 128, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-jyang8/flasktemp
-https://github.com/jyang8/flasktemp
-Entry file: flasktemp/work01.py
-Scanned: 2016-10-20 13:15:36.175979
-No vulnerabilities found.
-
-
-hhzrabbit/flaskwebpage
-https://github.com/hhzrabbit/flaskwebpage
-Entry file: flaskwebpage/app2.py
-Scanned: 2016-10-20 13:15:38.475073
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jyang1737/flask1
-https://github.com/jyang1737/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 13:15:39.162074
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-zhengnan/FlaskDemo
-https://github.com/zhengnan/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 13:15:40.683337
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ethanchewy/FlaskAjax
-https://github.com/ethanchewy/FlaskAjax
-Entry file: FlaskAjax/main/app.py
-Scanned: 2016-10-20 13:15:42.352751
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elinah/flaskTemplate
-https://github.com/elinah/flaskTemplate
-Entry file: flaskTemplate/flask-app/app/__init__.py
-Scanned: 2016-10-20 13:15:42.859481
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-urbanhacker/flask101
-https://github.com/urbanhacker/flask101
-Entry file: flask101/hello.py
-Scanned: 2016-10-20 13:15:51.160981
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-evookelj/flaskTemplate
-https://github.com/evookelj/flaskTemplate
-Entry file: flaskTemplate/flask-app/app/__init__.py
-Scanned: 2016-10-20 13:15:51.679832
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-nfichter/FlaskTemplate
-https://github.com/nfichter/FlaskTemplate
-Entry file: FlaskTemplate/app2.py
-Scanned: 2016-10-20 13:15:58.493354
-No vulnerabilities found.
-
-
-Vanna-M/flaskIntro
-https://github.com/Vanna-M/flaskIntro
-Entry file: flaskIntro/hello.py
-Scanned: 2016-10-20 13:15:59.794399
-No vulnerabilities found.
-
-
-klochenok/FlaskTask
-https://github.com/klochenok/FlaskTask
-Entry file: FlaskTask/project/views.py
-Scanned: 2016-10-20 13:16:01.230489
-No vulnerabilities found.
-
-
-Caynosadler/user-Authentication-using-flask
-https://github.com/Caynosadler/user-Authentication-using-flask
-Entry file: user-Authentication-using-flask/register.py
-Scanned: 2016-10-20 13:16:03.045638
-Vulnerability 1:
-File: user-Authentication-using-flask/register.py
- > User input at line 49, trigger word "get(":
- email_address = request.form.get('email_address')
-Reassigned in:
- File: user-Authentication-using-flask/register.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('username_buster.html')
- File: user-Authentication-using-flask/register.py
- > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('password_buster.html')
- File: user-Authentication-using-flask/register.py
- > Line 77: ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=username)
-File: user-Authentication-using-flask/register.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address)
-
-Vulnerability 2:
-File: user-Authentication-using-flask/register.py
- > User input at line 49, trigger word "get(":
- email_address = request.form.get('email_address')
-Reassigned in:
- File: user-Authentication-using-flask/register.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('username_buster.html')
- File: user-Authentication-using-flask/register.py
- > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('password_buster.html')
- File: user-Authentication-using-flask/register.py
- > Line 77: ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=username)
-File: user-Authentication-using-flask/register.py
- > reaches line 61, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address)
-
-Vulnerability 3:
-File: user-Authentication-using-flask/register.py
- > User input at line 50, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: user-Authentication-using-flask/register.py
- > Line 59: ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address)
- File: user-Authentication-using-flask/register.py
- > Line 61: ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address)
- File: user-Authentication-using-flask/register.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('username_buster.html')
- File: user-Authentication-using-flask/register.py
- > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('password_buster.html')
-File: user-Authentication-using-flask/register.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=username)
-
-Vulnerability 4:
-File: user-Authentication-using-flask/login.py
- > User input at line 12, trigger word "get(":
- user = request.form.get('login_name')
-File: user-Authentication-using-flask/login.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=user)
-
-Vulnerability 5:
-File: user-Authentication-using-flask/login.py
- > User input at line 12, trigger word "get(":
- user = request.form.get('login_name')
-File: user-Authentication-using-flask/login.py
- > reaches line 21, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('buster',name=user))
-
-Vulnerability 6:
-File: user-Authentication-using-flask/login.py
- > User input at line 12, trigger word "get(":
- user = request.form.get('login_name')
-File: user-Authentication-using-flask/login.py
- > reaches line 21, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('buster',name=user))
-
-
-
-lu-z/auxioneer-flask
-https://github.com/lu-z/auxioneer-flask
-Entry file: auxioneer-flask/app.py
-Scanned: 2016-10-20 13:16:10.901362
-No vulnerabilities found.
-
-
-chelBot/flask-microblog
-https://github.com/chelBot/flask-microblog
-Entry file: None
-Scanned: 2016-10-20 13:16:11.404118
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-waldo7/flask-blog
-https://github.com/waldo7/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:16:11.952476
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-maxbert/flask_template
-https://github.com/maxbert/flask_template
-Entry file: None
-Scanned: 2016-10-20 13:16:12.463921
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/maxbert/flask_template.
-
-zhangruochi/LearnFlask
-https://github.com/zhangruochi/LearnFlask
-Entry file: LearnFlask/ex1_URL解析.py
-Scanned: 2016-10-20 13:16:13.000568
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-st234pa/flask-template
-https://github.com/st234pa/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:16:13.506980
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/st234pa/flask-template.
-
-nanobox-quickstarts/nanobox-flask
-https://github.com/nanobox-quickstarts/nanobox-flask
-Entry file: nanobox-flask/hello.py
-Scanned: 2016-10-20 13:16:17.442052
-No vulnerabilities found.
-
-
-luolidong/SaltFlask
-https://github.com/luolidong/SaltFlask
-Entry file: SaltFlask/app/__init__.py
-Scanned: 2016-10-20 13:16:22.889494
-Vulnerability 1:
-File: SaltFlask/app/views.py
- > User input at line 37, trigger word ".data":
- saltclient = SaltClient(form.serverId.data)
-File: SaltFlask/app/views.py
- > reaches line 38, trigger word "flash(":
- flash(saltclient.GetServerInfo())
-
-Vulnerability 2:
-File: SaltFlask/app/views.py
- > User input at line 43, trigger word ".data":
- logStr = 'server id:' + form.serverId.data + ' start'
-Reassigned in:
- File: SaltFlask/app/views.py
- > Line 40: logStr = ''
- File: SaltFlask/app/views.py
- > Line 46: logStr = 'server id:' + form.serverId.data + ' close'
- File: SaltFlask/app/views.py
- > Line 50: logStr = 'server id:' + form.serverId.data + ' time:' + timeStr
- File: SaltFlask/app/views.py
- > Line 52: logStr = saltclient.ServerInfo()
- File: SaltFlask/app/views.py
- > Line 54: logStr = saltclient.ServerLog()
- File: SaltFlask/app/views.py
- > Line 56: logStr = saltclient.ServerCheck()
-File: SaltFlask/app/views.py
- > reaches line 58, trigger word "flash(":
- flash(logStr)
-
-Vulnerability 3:
-File: SaltFlask/app/views.py
- > User input at line 46, trigger word ".data":
- logStr = 'server id:' + form.serverId.data + ' close'
-Reassigned in:
- File: SaltFlask/app/views.py
- > Line 40: logStr = ''
- File: SaltFlask/app/views.py
- > Line 43: logStr = 'server id:' + form.serverId.data + ' start'
- File: SaltFlask/app/views.py
- > Line 50: logStr = 'server id:' + form.serverId.data + ' time:' + timeStr
- File: SaltFlask/app/views.py
- > Line 52: logStr = saltclient.ServerInfo()
- File: SaltFlask/app/views.py
- > Line 54: logStr = saltclient.ServerLog()
- File: SaltFlask/app/views.py
- > Line 56: logStr = saltclient.ServerCheck()
-File: SaltFlask/app/views.py
- > reaches line 58, trigger word "flash(":
- flash(logStr)
-
-Vulnerability 4:
-File: SaltFlask/app/views.py
- > User input at line 48, trigger word ".data":
- timeStr = str(form.serverTime.data.year) + '-' + str(form.serverTime.data.month) + '-' + str(form.serverTime.data.day)
-Reassigned in:
- File: SaltFlask/app/views.py
- > Line 50: logStr = 'server id:' + form.serverId.data + ' time:' + timeStr
- File: SaltFlask/app/views.py
- > Line 52: logStr = saltclient.ServerInfo()
- File: SaltFlask/app/views.py
- > Line 54: logStr = saltclient.ServerLog()
- File: SaltFlask/app/views.py
- > Line 56: logStr = saltclient.ServerCheck()
- File: SaltFlask/app/views.py
- > Line 40: logStr = ''
- File: SaltFlask/app/views.py
- > Line 43: logStr = 'server id:' + form.serverId.data + ' start'
- File: SaltFlask/app/views.py
- > Line 46: logStr = 'server id:' + form.serverId.data + ' close'
-File: SaltFlask/app/views.py
- > reaches line 58, trigger word "flash(":
- flash(logStr)
-
-Vulnerability 5:
-File: SaltFlask/app/views.py
- > User input at line 50, trigger word ".data":
- logStr = 'server id:' + form.serverId.data + ' time:' + timeStr
-Reassigned in:
- File: SaltFlask/app/views.py
- > Line 40: logStr = ''
- File: SaltFlask/app/views.py
- > Line 43: logStr = 'server id:' + form.serverId.data + ' start'
- File: SaltFlask/app/views.py
- > Line 46: logStr = 'server id:' + form.serverId.data + ' close'
- File: SaltFlask/app/views.py
- > Line 52: logStr = saltclient.ServerInfo()
- File: SaltFlask/app/views.py
- > Line 54: logStr = saltclient.ServerLog()
- File: SaltFlask/app/views.py
- > Line 56: logStr = saltclient.ServerCheck()
-File: SaltFlask/app/views.py
- > reaches line 58, trigger word "flash(":
- flash(logStr)
-
-
-
-achencoms/flask-template
-https://github.com/achencoms/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:16:24.403512
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/achencoms/flask-template.
-
-lindseyma/flask-template
-https://github.com/lindseyma/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:16:31.917182
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lindseyma/flask-template.
-
-babydeya/flask_web
-https://github.com/babydeya/flask_web
-Entry file: flask_web/helloflask.py
-Scanned: 2016-10-20 13:16:32.505797
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py
-
-fengyunlsm/Flask-Blog
-https://github.com/fengyunlsm/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 13:16:33.047515
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stephen679/learning_flask
-https://github.com/stephen679/learning_flask
-Entry file: learning_flask/flaskcard/flaskcard.py
-Scanned: 2016-10-20 13:16:34.479388
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kblumke/flask-tracking
-https://github.com/kblumke/flask-tracking
-Entry file: flask-tracking/app/__init__.py
-Scanned: 2016-10-20 13:16:35.008462
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sm-azure/flask-api
-https://github.com/sm-azure/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 13:16:35.524866
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-creamchoco3080/flask_practice
-https://github.com/creamchoco3080/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 13:16:38.069421
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-agafonovdev/flask_template
-https://github.com/agafonovdev/flask_template
-Entry file: None
-Scanned: 2016-10-20 13:16:39.568095
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/agafonovdev/flask_template.
-
-Chemoday/Flask-microblog
-https://github.com/Chemoday/Flask-microblog
-Entry file: None
-Scanned: 2016-10-20 13:16:41.074106
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-markstory/flask-boomerang
-https://github.com/markstory/flask-boomerang
-Entry file: flask-boomerang/app.py
-Scanned: 2016-10-20 13:16:43.445588
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rburgos240/flask-blog
-https://github.com/rburgos240/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:16:43.990211
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-Karol-Regula/flask-template
-https://github.com/Karol-Regula/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:16:50.496600
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Karol-Regula/flask-template.
-
-carrbs/flask-tutorial
-https://github.com/carrbs/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 13:16:57.486634
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sd16fall/Toolbox-Flask
-https://github.com/sd16fall/Toolbox-Flask
-Entry file: Toolbox-Flask/hello.py
-Scanned: 2016-10-20 13:16:58.844464
-No vulnerabilities found.
-
-
-noobbyte/flask-template
-https://github.com/noobbyte/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:16:59.358328
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/noobbyte/flask-template.
-
-Niklane/flask_tutorial
-https://github.com/Niklane/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 13:17:00.864067
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-billywongstuy/Flask-Start
-https://github.com/billywongstuy/Flask-Start
-Entry file: Flask-Start/app.py
-Scanned: 2016-10-20 13:17:09.291943
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Start/virtual/lib/python2.7/genericpath.py
-
-deveshaggrawal19/flask_project
-https://github.com/deveshaggrawal19/flask_project
-Entry file: flask_project/myflaskapp.py
-Scanned: 2016-10-20 13:17:10.105443
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Zzcnick/hello_flask
-https://github.com/Zzcnick/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-20 13:17:11.133251
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Einsteinish/akadrone-flask
-https://github.com/Einsteinish/akadrone-flask
-Entry file: akadrone-flask/aka.py
-Scanned: 2016-10-20 13:17:24.245766
-No vulnerabilities found.
-
-
-alex1x/flask-app
-https://github.com/alex1x/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 13:17:24.770656
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jorujlu/flask_task
-https://github.com/jorujlu/flask_task
-Entry file: flask_task/gistapi/gistapi.py
-Scanned: 2016-10-20 13:17:33.679478
-No vulnerabilities found.
-
-
-jeffsui/flask_app
-https://github.com/jeffsui/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:17:34.298966
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeffsui/flask_app.
-
-topleft/flask-blog
-https://github.com/topleft/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:17:34.869500
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-SushisMakis/Flask-Firewall
-https://github.com/SushisMakis/Flask-Firewall
-Entry file: Flask-Firewall/flask-example.py
-Scanned: 2016-10-20 13:17:36.197878
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Atheloses/Flask-Bones
-https://github.com/Atheloses/Flask-Bones
-Entry file: Flask-Bones/app/__init__.py
-Scanned: 2016-10-20 13:17:42.260844
-Vulnerability 1:
-File: Flask-Bones/app/auth/views.py
- > User input at line 46, trigger word ".data":
- group = Group.create(nazev=form.data['nazev'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 48, trigger word "flash(":
- flash(gettext('Group {name} created').format(name=group.nazev), 'success')
-
-Vulnerability 2:
-File: Flask-Bones/app/auth/views.py
- > User input at line 58, trigger word ".data":
- firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 65, trigger word "flash(":
- flash(gettext('Organization {name} created').format(name=firma.nazev), 'success')
-
-Vulnerability 3:
-File: Flask-Bones/app/public/views.py
- > User input at line 37, trigger word ".data":
- user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni'])
-Reassigned in:
- File: Flask-Bones/app/public/views.py
- > Line 47: token = s.dumps(user.id)
-File: Flask-Bones/app/public/views.py
- > reaches line 51, trigger word "flash(":
- flash(gettext('Sent verification email to {email}').format(email=user.email), 'success')
-
-
-
-Brian-Lu/flask-template
-https://github.com/Brian-Lu/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:17:42.785983
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Brian-Lu/flask-template.
-
-billywongstuy/Flask-Twoo
-https://github.com/billywongstuy/Flask-Twoo
-Entry file: Flask-Twoo/app.py
-Scanned: 2016-10-20 13:17:44.197401
-No vulnerabilities found.
-
-
-sebastianCain/flask-template
-https://github.com/sebastianCain/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:17:45.218935
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sebastianCain/flask-template.
-
-KingOkay/flask-book
-https://github.com/KingOkay/flask-book
-Entry file: flask-book/app/__init__.py
-Scanned: 2016-10-20 13:17:51.037913
-Vulnerability 1:
-File: flask-book/app/auth/verify.py
- > User input at line 64, trigger word "form(":
- img = img.transform(size, Image.PERSPECTIVE, params)
-Reassigned in:
- File: flask-book/app/auth/verify.py
- > Line 20: img = Image.new(mode, size, bg_color)
- File: flask-book/app/auth/verify.py
- > Line 21: draw = ImageDraw.Draw(img)
- File: flask-book/app/auth/verify.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = (img, strs)
-File: flask-book/app/auth/verify.py
- > reaches line 66, trigger word "filter(":
- img = img.filter(ImageFilter.EDGE_ENHANCE_MORE)
-
-Vulnerability 2:
-File: flask-book/app/main/views.py
- > User input at line 18, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1)
-File: flask-book/app/main/views.py
- > reaches line 19, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 3:
-File: flask-book/app/main/views.py
- > User input at line 18, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1)
-File: flask-book/app/main/views.py
- > reaches line 19, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 4:
-File: flask-book/app/main/views.py
- > User input at line 46, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id)
-File: flask-book/app/main/views.py
- > reaches line 47, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 5:
-File: flask-book/app/main/views.py
- > User input at line 46, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id)
-File: flask-book/app/main/views.py
- > reaches line 47, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 6:
-File: flask-book/app/main/views.py
- > User input at line 49, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 50: pagination = Book.query.filter_by(booktype_id=id).order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 53: books = pagination.items
- File: flask-book/app/main/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-File: flask-book/app/main/views.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id)
-
-Vulnerability 7:
-File: flask-book/app/main/views.py
- > User input at line 62, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999)
-File: flask-book/app/main/views.py
- > reaches line 63, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 8:
-File: flask-book/app/main/views.py
- > User input at line 62, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999)
-File: flask-book/app/main/views.py
- > reaches line 63, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 9:
-File: flask-book/app/main/views.py
- > User input at line 65, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 66: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 69: books = pagination.items
- File: flask-book/app/main/views.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-File: flask-book/app/main/views.py
- > reaches line 70, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999)
-
-Vulnerability 10:
-File: flask-book/app/main/views.py
- > User input at line 76, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 77: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 80: posts = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('all-post.html',title='好书推荐', posts=posts, pagination=pagination)
-
-Vulnerability 11:
-File: flask-book/app/main/views.py
- > User input at line 97, trigger word ".data":
- my_address = Address.query.filter_by(id=form.order_address.data).first()
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number)
- File: flask-book/app/main/views.py
- > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 12:
-File: flask-book/app/main/views.py
- > User input at line 101, trigger word ".data":
- order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 13:
-File: flask-book/app/main/views.py
- > User input at line 97, trigger word ".data":
- my_address = Address.query.filter_by(id=form.order_address.data).first()
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number)
- File: flask-book/app/main/views.py
- > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 14:
-File: flask-book/app/main/views.py
- > User input at line 101, trigger word ".data":
- order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 107: a = float(order.amount)
- File: flask-book/app/main/views.py
- > Line 109: order.price = a * b
- File: flask-book/app/main/views.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address)
-File: flask-book/app/main/views.py
- > reaches line 112, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id))
-
-Vulnerability 15:
-File: flask-book/app/main/views.py
- > User input at line 168, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 170: page = book.bookcos.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-book/app/main/views.py
- > Line 172: pagination = book.bookcos.order_by(BookCo.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 175: comments = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 176, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book.html',book=book, title=book.name, comments=comments, pagination=pagination)
-
-Vulnerability 16:
-File: flask-book/app/main/views.py
- > User input at line 275, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 276: pagination = Order.query.filter_by(author_id=current_user.id).order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_ORDERS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 279: orders = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 280, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('my-order.html',orders=orders, title='我的订单', pagination=pagination)
-
-Vulnerability 17:
-File: flask-book/app/main/views.py
- > User input at line 297, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form)
-File: flask-book/app/main/views.py
- > reaches line 298, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 18:
-File: flask-book/app/main/views.py
- > User input at line 297, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form)
-File: flask-book/app/main/views.py
- > reaches line 298, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str))
-
-Vulnerability 19:
-File: flask-book/app/main/views.py
- > User input at line 297, trigger word ".data":
- str = form.str.data
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form)
-File: flask-book/app/main/views.py
- > reaches line 299, trigger word "filter(":
- books = Book.query.filter(Book.name.like('%' + str + '%'))
-
-Vulnerability 20:
-File: flask-book/app/main/views.py
- > User input at line 309, trigger word ".data":
- post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object())
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章')
-File: flask-book/app/main/views.py
- > reaches line 314, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-
-Vulnerability 21:
-File: flask-book/app/main/views.py
- > User input at line 309, trigger word ".data":
- post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object())
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章')
-File: flask-book/app/main/views.py
- > reaches line 314, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-
-Vulnerability 22:
-File: flask-book/app/main/views.py
- > User input at line 340, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 342: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-book/app/main/views.py
- > Line 344: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 347: comments = pagination.items
- File: flask-book/app/main/views.py
- > Line 339: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=1))
-File: flask-book/app/main/views.py
- > reaches line 348, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], title='文章内容', form=form, comments=comments, pagination=pagination)
-
-Vulnerability 23:
-File: flask-book/app/main/views.py
- > User input at line 358, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/main/views.py
- > Line 359: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-book/app/main/views.py
- > Line 362: posts = pagination.items
-File: flask-book/app/main/views.py
- > reaches line 363, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination, title='我的资料')
-
-Vulnerability 24:
-File: flask-book/app/admin/views.py
- > User input at line 29, trigger word ".data":
- book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书')
-File: flask-book/app/admin/views.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id))
-
-Vulnerability 25:
-File: flask-book/app/admin/views.py
- > User input at line 29, trigger word ".data":
- book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书')
-File: flask-book/app/admin/views.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id))
-
-Vulnerability 26:
-File: flask-book/app/admin/views.py
- > User input at line 98, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 99: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 102: book_lists = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 103, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/book-list.html',title='图书列表', pagination=pagination, book_lists=book_lists)
-
-Vulnerability 27:
-File: flask-book/app/admin/views.py
- > User input at line 111, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 112: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 115: user_lists = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 116, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/user-list.html',title='用户列表', user_lists=user_lists, pagination=pagination)
-
-Vulnerability 28:
-File: flask-book/app/admin/views.py
- > User input at line 164, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 165: pagination = Order.query.order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 168: orders = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 169, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/order-list.html',orders=orders, pagination=pagination, page=page, title='订单处理')
-
-Vulnerability 29:
-File: flask-book/app/admin/views.py
- > User input at line 188, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-book/app/admin/views.py
- > Line 189: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-book/app/admin/views.py
- > Line 192: comments = pagination.items
-File: flask-book/app/admin/views.py
- > reaches line 193, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('admin/moderate.html',comments=comments, pagination=pagination, page=page, title='评论管理')
-
-
-
-zouliuyun/devops_flask
-https://github.com/zouliuyun/devops_flask
-Entry file: devops_flask/devops/api/__init__.py
-Scanned: 2016-10-20 13:17:59.176728
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rburgos240/hello-flask
-https://github.com/rburgos240/hello-flask
-Entry file: hello-flask/app.py
-Scanned: 2016-10-20 13:17:59.764193
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py
-
-vonvick/learning-flask
-https://github.com/vonvick/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 13:18:00.316931
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Wooden-Robot/flask-blog
-https://github.com/Wooden-Robot/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:18:00.868895
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-RichardzWang/flask-template
-https://github.com/RichardzWang/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:18:01.394827
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/RichardzWang/flask-template.
-
-yawata159/flask-template
-https://github.com/yawata159/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:18:01.899958
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yawata159/flask-template.
-
-kelly3649/Flask-Template
-https://github.com/kelly3649/Flask-Template
-Entry file: Flask-Template/appHW.py
-Scanned: 2016-10-20 13:18:03.723121
-No vulnerabilities found.
-
-
-tvenis/flask_app
-https://github.com/tvenis/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:18:04.223856
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tvenis/flask_app.
-
-caipfei/blog_flask
-https://github.com/caipfei/blog_flask
-Entry file: None
-Scanned: 2016-10-20 13:18:04.754393
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/caipfei/blog_flask.
-
-vitaliylevitskiand/wordsplay_flask
-https://github.com/vitaliylevitskiand/wordsplay_flask
-Entry file: wordsplay_flask/wordsplay_flask.py
-Scanned: 2016-10-20 13:18:08.345604
-No vulnerabilities found.
-
-
-joshparrish/docker-flask
-https://github.com/joshparrish/docker-flask
-Entry file: None
-Scanned: 2016-10-20 13:18:08.867590
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/joshparrish/docker-flask.
-
-Alexanderklau/Flask-Blog
-https://github.com/Alexanderklau/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 13:18:09.395439
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jschluger/Flask_Occupations
-https://github.com/jschluger/Flask_Occupations
-Entry file: Flask_Occupations/app.py
-Scanned: 2016-10-20 13:18:10.839471
-No vulnerabilities found.
-
-
-lgarces/flask_app
-https://github.com/lgarces/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:18:11.340797
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lgarces/flask_app.
-
-Horla74/Flask-blog
-https://github.com/Horla74/Flask-blog
-Entry file: Flask-blog/app/__init__.py
-Scanned: 2016-10-20 13:18:11.849593
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cuttlesoft/flask-workshop
-https://github.com/cuttlesoft/flask-workshop
-Entry file: flask-workshop/hello_world/hello.py
-Scanned: 2016-10-20 13:18:13.755392
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulVudutala/flask
-https://github.com/rahulVudutala/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:18:14.343414
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-jesusalatorre/Flask
-https://github.com/jesusalatorre/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:18:24.906139
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mod2695/flask
-https://github.com/mod2695/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:18:25.535544
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-yueqingwang/flask
-https://github.com/yueqingwang/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:18:35.140389
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-tcyfs/flask
-https://github.com/tcyfs/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:18:35.714274
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-lastone9182/flask
-https://github.com/lastone9182/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:18:36.304936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sakuuat/Flask
-https://github.com/sakuuat/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:18:36.809014
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-hit9/flask-idempotent2
-https://github.com/hit9/flask-idempotent2
-Entry file: flask-idempotent2/flask_idempotent2.py
-Scanned: 2016-10-20 13:18:44.285604
-No vulnerabilities found.
-
-
-AminHP/flask-mvc
-https://github.com/AminHP/flask-mvc
-Entry file: flask-mvc/project/application.py
-Scanned: 2016-10-20 13:18:45.286225
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-juli1/flaskyelp
-https://github.com/juli1/flaskyelp
-Entry file: None
-Scanned: 2016-10-20 13:18:46.702380
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/juli1/flaskyelp.
-
-SchmidtWong/flaskr
-https://github.com/SchmidtWong/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:18:47.216624
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ChrisDBrooks/flaskbyexample
-https://github.com/ChrisDBrooks/flaskbyexample
-Entry file: flaskbyexample/hello.py
-Scanned: 2016-10-20 13:18:52.534512
-No vulnerabilities found.
-
-
-mkykadir/flaskrofficialtut
-https://github.com/mkykadir/flaskrofficialtut
-Entry file: flaskrofficialtut/flaskr.py
-Scanned: 2016-10-20 13:19:00.828821
-No vulnerabilities found.
-
-
-rbunch-dc/flasksql
-https://github.com/rbunch-dc/flasksql
-Entry file: flasksql/flaskMysql.py
-Scanned: 2016-10-20 13:19:07.925789
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yorolifarg/flasksample
-https://github.com/yorolifarg/flasksample
-Entry file: flasksample/chapter2/app.py
-Scanned: 2016-10-20 13:19:08.521456
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cirocfc/flaskapi
-https://github.com/cirocfc/flaskapi
-Entry file: flaskapi/aydaapi3.py
-Scanned: 2016-10-20 13:19:09.188230
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/genericpath.py
-
-Arlus/flasktest
-https://github.com/Arlus/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:19:09.733855
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Githuberzhang/flaskdemo
-https://github.com/Githuberzhang/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:19:10.247881
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-cagdasgerede/flaskdemo
-https://github.com/cagdasgerede/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:19:10.756145
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-TaiyuanHot/Flaskr
-https://github.com/TaiyuanHot/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-20 13:19:11.269437
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ouguangqian/flasklearn
-https://github.com/ouguangqian/flasklearn
-Entry file: flasklearn/flasklearn.py
-Scanned: 2016-10-20 13:19:11.842659
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tsicroxe/flaskprojects
-https://github.com/tsicroxe/flaskprojects
-Entry file: flaskprojects/greatNumberGame/server.py
-Scanned: 2016-10-20 13:19:20.331154
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Saksham9Thakur/flask1
-https://github.com/Saksham9Thakur/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 13:19:20.951663
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-joserferreyra/FlaskApp
-https://github.com/joserferreyra/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 13:19:21.524624
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-topher91/FlaskTutorial
-https://github.com/topher91/FlaskTutorial
-Entry file: None
-Scanned: 2016-10-20 13:19:22.510165
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hal0eye/FlaskWeb
-https://github.com/hal0eye/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 13:19:23.106004
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-rschmidtz/flaskRestaurant
-https://github.com/rschmidtz/flaskRestaurant
-Entry file: flaskRestaurant/project2.py
-Scanned: 2016-10-20 13:19:24.883167
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JFreyra/FlaskLogin
-https://github.com/JFreyra/FlaskLogin
-Entry file: FlaskLogin/app.py
-Scanned: 2016-10-20 13:19:26.201917
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-soulerforgit/FlaskWeb
-https://github.com/soulerforgit/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-20 13:19:26.792364
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py
-
-paigen11/flask101
-https://github.com/paigen11/flask101
-Entry file: flask101/hello.py
-Scanned: 2016-10-20 13:19:27.320701
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Edisontom/flaskBlog
-https://github.com/Edisontom/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 13:19:27.930051
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-codingPingjun/FlaskDemo
-https://github.com/codingPingjun/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 13:19:35.439113
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-giladsh1/flaskTest
-https://github.com/giladsh1/flaskTest
-Entry file: flaskTest/url.py
-Scanned: 2016-10-20 13:19:35.961956
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PirieD704/flask101
-https://github.com/PirieD704/flask101
-Entry file: flask101/hello.py
-Scanned: 2016-10-20 13:19:36.473565
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jkaberg/tvhProxy
-https://github.com/jkaberg/tvhProxy
-Entry file: tvhProxy/tvhProxy.py
-Scanned: 2016-10-20 13:19:37.917796
-No vulnerabilities found.
-
-
-fengyunlsm/Flask-Blog
-https://github.com/fengyunlsm/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-20 13:19:43.511955
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jttwnsnd/flask_example
-https://github.com/jttwnsnd/flask_example
-Entry file: None
-Scanned: 2016-10-20 13:19:45.052867
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-max-l-weaver/flask_microblog
-https://github.com/max-l-weaver/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-20 13:19:45.573566
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tangzhiyi11/flask_blog
-https://github.com/tangzhiyi11/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:19:46.070058
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-imhuwq/read_flask
-https://github.com/imhuwq/read_flask
-Entry file: read_flask/app/__init__.py
-Scanned: 2016-10-20 13:19:48.446263
-Vulnerability 1:
-File: read_flask/app/__init__.py
- > User input at line 18, trigger word "get(":
- msg = request.args.get('msg', 'Hello Flask')
-File: read_flask/app/__init__.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('msg'msg)
-
-Vulnerability 2:
-File: read_flask/app/__init__.py
- > User input at line 27, trigger word "get(":
- name = session.get('user', 'stranger')
-File: read_flask/app/__init__.py
- > reaches line 28, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('greeting''Hello %s' % name)
-
-Vulnerability 3:
-File: read_flask/app/__init__.py
- > User input at line 40, trigger word "get(":
- user = session.get('user')
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 46: user = users.get(uid, None)
-File: read_flask/app/__init__.py
- > reaches line 42, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user))
-
-Vulnerability 4:
-File: read_flask/app/__init__.py
- > User input at line 43, trigger word "get(":
- uid = request.form.get('uid')
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 46: user = users.get(uid, None)
- File: read_flask/app/__init__.py
- > Line 40: user = session.get('user')
-File: read_flask/app/__init__.py
- > reaches line 42, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user))
-
-Vulnerability 5:
-File: read_flask/app/__init__.py
- > User input at line 46, trigger word "get(":
- user = users.get(uid, None)
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 40: user = session.get('user')
-File: read_flask/app/__init__.py
- > reaches line 42, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user))
-
-Vulnerability 6:
-File: read_flask/app/__init__.py
- > User input at line 40, trigger word "get(":
- user = session.get('user')
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 46: user = users.get(uid, None)
-File: read_flask/app/__init__.py
- > reaches line 42, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user))
-
-Vulnerability 7:
-File: read_flask/app/__init__.py
- > User input at line 43, trigger word "get(":
- uid = request.form.get('uid')
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 46: user = users.get(uid, None)
- File: read_flask/app/__init__.py
- > Line 40: user = session.get('user')
-File: read_flask/app/__init__.py
- > reaches line 42, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user))
-
-Vulnerability 8:
-File: read_flask/app/__init__.py
- > User input at line 46, trigger word "get(":
- user = users.get(uid, None)
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 40: user = session.get('user')
-File: read_flask/app/__init__.py
- > reaches line 42, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user))
-
-Vulnerability 9:
-File: read_flask/app/__init__.py
- > User input at line 40, trigger word "get(":
- user = session.get('user')
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 46: user = users.get(uid, None)
-File: read_flask/app/__init__.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('msg''hello %s' % user.get('name'))
-
-Vulnerability 10:
-File: read_flask/app/__init__.py
- > User input at line 43, trigger word "get(":
- uid = request.form.get('uid')
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 46: user = users.get(uid, None)
- File: read_flask/app/__init__.py
- > Line 40: user = session.get('user')
-File: read_flask/app/__init__.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('msg''hello %s' % user.get('name'))
-
-Vulnerability 11:
-File: read_flask/app/__init__.py
- > User input at line 46, trigger word "get(":
- user = users.get(uid, None)
-Reassigned in:
- File: read_flask/app/__init__.py
- > Line 40: user = session.get('user')
-File: read_flask/app/__init__.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('msg''hello %s' % user.get('name'))
-
-
-
-lawliet89/flask-redirector
-https://github.com/lawliet89/flask-redirector
-Entry file: flask-redirector/redirector/app.py
-Scanned: 2016-10-20 13:19:52.906200
-No vulnerabilities found.
-
-
-jonathan-kosgei/flask-rq
-https://github.com/jonathan-kosgei/flask-rq
-Entry file: flask-rq/app.py
-Scanned: 2016-10-20 13:20:01.206360
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-huazhicai/flask-blog
-https://github.com/huazhicai/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:20:01.764322
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-tpapic/flask-login
-https://github.com/tpapic/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-20 13:20:09.365582
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lcfyuen/RPiFlask
-https://github.com/lcfyuen/RPiFlask
-Entry file: RPiFlask/main.py
-Scanned: 2016-10-20 13:20:09.893837
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-getDolla/flask-login
-https://github.com/getDolla/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-20 13:20:10.489464
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-citaret/flask-intro
-https://github.com/citaret/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 13:20:10.993388
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sm-azure/flask-api
-https://github.com/sm-azure/flask-api
-Entry file: flask-api/sports.py
-Scanned: 2016-10-20 13:20:11.498166
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brennv/flask-app
-https://github.com/brennv/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 13:20:11.997395
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stw1/python_flask
-https://github.com/stw1/python_flask
-Entry file: None
-Scanned: 2016-10-20 13:20:12.512296
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/stw1/python_flask.
-
-billywongstuy/Login-Flask
-https://github.com/billywongstuy/Login-Flask
-Entry file: Login-Flask/app.py
-Scanned: 2016-10-20 13:20:13.953678
-No vulnerabilities found.
-
-
-Horla74/Flask-bbs
-https://github.com/Horla74/Flask-bbs
-Entry file: Flask-bbs/app.py
-Scanned: 2016-10-20 13:20:22.904720
-Vulnerability 1:
-File: Flask-bbs/routes/comment.py
- > User input at line 34, trigger word "get(":
- article_id = form.get('article_id', '')
-Reassigned in:
- File: Flask-bbs/routes/comment.py
- > Line 35: m.num = get_num(article_id)
-File: Flask-bbs/routes/comment.py
- > reaches line 37, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id))
-
-Vulnerability 2:
-File: Flask-bbs/routes/comment.py
- > User input at line 34, trigger word "get(":
- article_id = form.get('article_id', '')
-Reassigned in:
- File: Flask-bbs/routes/comment.py
- > Line 35: m.num = get_num(article_id)
-File: Flask-bbs/routes/comment.py
- > reaches line 37, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id))
-
-Vulnerability 3:
-File: Flask-bbs/routes/comment.py
- > User input at line 43, trigger word "get(":
- t = Model.query.get(id)
-Reassigned in:
- File: Flask-bbs/routes/comment.py
- > Line 45: article_id = t.article.id
-File: Flask-bbs/routes/comment.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id))
-
-Vulnerability 4:
-File: Flask-bbs/routes/comment.py
- > User input at line 43, trigger word "get(":
- t = Model.query.get(id)
-Reassigned in:
- File: Flask-bbs/routes/comment.py
- > Line 45: article_id = t.article.id
-File: Flask-bbs/routes/comment.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id))
-
-Vulnerability 5:
-File: Flask-bbs/routes/comment.py
- > User input at line 51, trigger word "get(":
- t = Model.query.get(id)
-Reassigned in:
- File: Flask-bbs/routes/comment.py
- > Line 52: article_id = t.article.id
-File: Flask-bbs/routes/comment.py
- > reaches line 54, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id))
-
-Vulnerability 6:
-File: Flask-bbs/routes/comment.py
- > User input at line 51, trigger word "get(":
- t = Model.query.get(id)
-Reassigned in:
- File: Flask-bbs/routes/comment.py
- > Line 52: article_id = t.article.id
-File: Flask-bbs/routes/comment.py
- > reaches line 54, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id))
-
-
-
-marlon407/flask-rest
-https://github.com/marlon407/flask-rest
-Entry file: flask-rest/haystack/core.py
-Scanned: 2016-10-20 13:20:23.907763
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-shihuibei/flask-project
-https://github.com/shihuibei/flask-project
-Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:20:31.700327
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-ethan-funny/flask-demos
-https://github.com/ethan-funny/flask-demos
-Entry file: flask-demos/application/app.py
-Scanned: 2016-10-20 13:20:33.184014
-No vulnerabilities found.
-
-
-HedleyPty/learning-flask
-https://github.com/HedleyPty/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 13:20:33.770675
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alex1x/flask-app
-https://github.com/alex1x/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-20 13:20:34.273896
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lilharry/occupation_flask
-https://github.com/lilharry/occupation_flask
-Entry file: occupation_flask/fp.py
-Scanned: 2016-10-20 13:20:35.602524
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jeffsui/flask_app
-https://github.com/jeffsui/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:20:36.116254
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeffsui/flask_app.
-
-SushisMakis/Flask-Firewall
-https://github.com/SushisMakis/Flask-Firewall
-Entry file: Flask-Firewall/flask-example.py
-Scanned: 2016-10-20 13:20:36.638680
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ssepehrnoush/Learning-Flask
-https://github.com/ssepehrnoush/Learning-Flask
-Entry file: Learning-Flask/routes.py
-Scanned: 2016-10-20 13:20:44.313751
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-igortmb/flask_blog
-https://github.com/igortmb/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:20:44.845401
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-fleeby/flask_tutorial
-https://github.com/fleeby/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 13:20:45.368544
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SwartzCr/flask_app
-https://github.com/SwartzCr/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:20:45.881035
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SwartzCr/flask_app.
-
-lunemec/flask_twitter
-https://github.com/lunemec/flask_twitter
-Entry file: flask_twitter/twitter/__main__.py
-Scanned: 2016-10-20 13:20:47.223609
-No vulnerabilities found.
-
-
-uehara1414/flask-heroku
-https://github.com/uehara1414/flask-heroku
-Entry file: flask-heroku/app.py
-Scanned: 2016-10-20 13:20:48.568346
-No vulnerabilities found.
-
-
-AnumSheraz/test_flask
-https://github.com/AnumSheraz/test_flask
-Entry file: test_flask/init.py
-Scanned: 2016-10-20 13:20:49.894336
-No vulnerabilities found.
-
-
-eladitzhakian/flask-boilerplate
-https://github.com/eladitzhakian/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-20 13:20:50.434625
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/eladitzhakian/flask-boilerplate.
-
-zouliuyun/devops_flask
-https://github.com/zouliuyun/devops_flask
-Entry file: devops_flask/devops/api/__init__.py
-Scanned: 2016-10-20 13:20:52.442293
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-drvc57/learning-flask
-https://github.com/drvc57/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 13:21:01.020510
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bharris62/flask-blog
-https://github.com/bharris62/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:21:02.586468
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-midoribaka/flask-board
-https://github.com/midoribaka/flask-board
-Entry file: flask-board/app/__init__.py
-Scanned: 2016-10-20 13:21:10.926282
-No vulnerabilities found.
-
-
-joshparrish/docker-flask
-https://github.com/joshparrish/docker-flask
-Entry file: None
-Scanned: 2016-10-20 13:21:11.443332
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/joshparrish/docker-flask.
-
-blacktrub/test_flask
-https://github.com/blacktrub/test_flask
-Entry file: test_flask/test_run.py
-Scanned: 2016-10-20 13:21:12.847761
-No vulnerabilities found.
-
-
-whittlbc/flask-boiler
-https://github.com/whittlbc/flask-boiler
-Entry file: None
-Scanned: 2016-10-20 13:21:13.360880
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhengxit/flask_web
-https://github.com/zhengxit/flask_web
-Entry file: flask_web/helloflask.py
-Scanned: 2016-10-20 13:21:13.958511
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py
-
-clivegross/flask-usermgr
-https://github.com/clivegross/flask-usermgr
-Entry file: flask-usermgr/app/__init__.py
-Scanned: 2016-10-20 13:21:22.275207
-Vulnerability 1:
-File: flask-usermgr/app/module_auth/controllers.py
- > User input at line 19, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: flask-usermgr/app/module_auth/controllers.py
- > Line 21: session['user_id'] = user.id
-File: flask-usermgr/app/module_auth/controllers.py
- > reaches line 22, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-williamcabrera4/docker-flask
-https://github.com/williamcabrera4/docker-flask
-Entry file: None
-Scanned: 2016-10-20 13:21:22.845918
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/williamcabrera4/docker-flask.
-
-Zzcnick/flask_forms
-https://github.com/Zzcnick/flask_forms
-Entry file: flask_forms/flask_app/app.py
-Scanned: 2016-10-20 13:21:24.286733
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-garydai/flask_vpnserver
-https://github.com/garydai/flask_vpnserver
-Entry file: flask_vpnserver/start.py
-Scanned: 2016-10-20 13:21:25.605922
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kelly3649/04_flask
-https://github.com/kelly3649/04_flask
-Entry file: 04_flask/appHW.py
-Scanned: 2016-10-20 13:21:27.000548
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yhzhan/login_flask
-https://github.com/yhzhan/login_flask
-Entry file: login_flask/app.py
-Scanned: 2016-10-20 13:21:28.297942
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ogal7/flask_login
-https://github.com/ogal7/flask_login
-Entry file: None
-Scanned: 2016-10-20 13:21:28.813802
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ogal7/flask_login.
-
-axiaoxin/flask-demo
-https://github.com/axiaoxin/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:21:32.334662
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/axiaoxin/flask-demo.
-
-hmdfsn/test_flask
-https://github.com/hmdfsn/test_flask
-Entry file: test_flask/setup.py
-Scanned: 2016-10-20 13:21:42.392969
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ilyinon/flask_test
-https://github.com/ilyinon/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 13:21:42.972318
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-xxiaoxiao/flask_practice
-https://github.com/xxiaoxiao/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 13:21:43.494318
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-qimiaoxue/flask_todo
-https://github.com/qimiaoxue/flask_todo
-Entry file: None
-Scanned: 2016-10-20 13:21:44.000210
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gaotongfei/flask_tutorial
-https://github.com/gaotongfei/flask_tutorial
-Entry file: None
-Scanned: 2016-10-20 13:21:44.529767
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sp0rkie/flask-framework
-https://github.com/sp0rkie/flask-framework
-Entry file: flask-framework/app/__init__.py
-Scanned: 2016-10-20 13:21:46.360093
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-boddumanohar/Flask-tdd
-https://github.com/boddumanohar/Flask-tdd
-Entry file: Flask-tdd/app.py
-Scanned: 2016-10-20 13:21:47.694046
-No vulnerabilities found.
-
-
-fpgentil/flask-learning
-https://github.com/fpgentil/flask-learning
-Entry file: flask-learning/app.py
-Scanned: 2016-10-20 13:21:54.796956
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-learning/venv/lib/python2.7/genericpath.py
-
-volneyrock/ProjFlask
-https://github.com/volneyrock/ProjFlask
-Entry file: ProjFlask/app/__init__.py
-Scanned: 2016-10-20 13:21:56.123848
-No vulnerabilities found.
-
-
-jschluger/Flask_Login
-https://github.com/jschluger/Flask_Login
-Entry file: Flask_Login/app.py
-Scanned: 2016-10-20 13:21:57.524381
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rahulVudutala/flask
-https://github.com/rahulVudutala/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:21:59.430479
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sanie4eg/Flask
-https://github.com/sanie4eg/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:21:59.940540
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-skraiman/flask
-https://github.com/skraiman/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:22:00.520476
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-g00302826/Flask
-https://github.com/g00302826/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:22:01.030558
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rdeeds/flask
-https://github.com/rdeeds/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:22:02.575929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-rionagreally/Flask
-https://github.com/rionagreally/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:22:11.111813
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-konwan/flask
-https://github.com/konwan/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:22:11.646425
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-arcVyas/flask
-https://github.com/arcVyas/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:22:12.199769
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-VishnuArukat/flask
-https://github.com/VishnuArukat/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:22:13.787535
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-lk-geimfari/flask_church
-https://github.com/lk-geimfari/flask_church
-Entry file: flask_church/example.py
-Scanned: 2016-10-20 13:22:15.522191
-No vulnerabilities found.
-
-
-padznich/_flask
-https://github.com/padznich/_flask
-Entry file: _flask/proj_3_Sijax/start.py
-Scanned: 2016-10-20 13:22:16.984473
-No vulnerabilities found.
-
-
-rofrano/nyu-lab-restful-flask
-https://github.com/rofrano/nyu-lab-restful-flask
-Entry file: nyu-lab-restful-flask/server.py
-Scanned: 2016-10-20 13:22:24.457830
-No vulnerabilities found.
-
-
-sharath1231/flaskpythonapp
-https://github.com/sharath1231/flaskpythonapp
-Entry file: flaskpythonapp/routes.py
-Scanned: 2016-10-20 13:22:26.976033
-No vulnerabilities found.
-
-
-SchmidtWong/flaskr
-https://github.com/SchmidtWong/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:22:27.487485
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mwoo99/flasktemplate
-https://github.com/mwoo99/flasktemplate
-Entry file: flasktemplate/flask_template.py
-Scanned: 2016-10-20 13:22:28.777401
-No vulnerabilities found.
-
-
-ChrisDBrooks/flaskbyexample
-https://github.com/ChrisDBrooks/flaskbyexample
-Entry file: flaskbyexample/hello.py
-Scanned: 2016-10-20 13:22:30.250232
-No vulnerabilities found.
-
-
-smancebo/flasktest
-https://github.com/smancebo/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:22:30.787100
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cagdasgerede/flaskdemo
-https://github.com/cagdasgerede/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:22:33.304614
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-timabe/flasky
-https://github.com/timabe/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:22:34.826952
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-melmandd/flaskr
-https://github.com/melmandd/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:22:43.337513
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-AlexAerow/flasktest
-https://github.com/AlexAerow/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:22:43.877285
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-downtownhub/flaskapp
-https://github.com/downtownhub/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:22:44.408970
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/downtownhub/flaskapp.
-
-ouguangqian/flasklearn
-https://github.com/ouguangqian/flasklearn
-Entry file: flasklearn/flasklearn.py
-Scanned: 2016-10-20 13:22:44.932153
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mabbie/flasky
-https://github.com/mabbie/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:22:45.428905
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paulmoliva/flaskr
-https://github.com/paulmoliva/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:22:45.951787
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-proxyroot/flaskit
-https://github.com/proxyroot/flaskit
-Entry file: flaskit/__init__.py
-Scanned: 2016-10-20 13:22:48.284724
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SwartzCr/flaskr
-https://github.com/SwartzCr/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:22:48.803220
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lisaheff95/flask1
-https://github.com/lisaheff95/flask1
-Entry file: flask1/fl.py
-Scanned: 2016-10-20 13:22:56.971766
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py
-
-willieaugustine/FlaskApp
-https://github.com/willieaugustine/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 13:22:58.567233
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-matsuh/FlaskSample
-https://github.com/matsuh/FlaskSample
-Entry file: FlaskSample/flask03.py
-Scanned: 2016-10-20 13:23:00.890914
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JFreyra/FlaskLogin
-https://github.com/JFreyra/FlaskLogin
-Entry file: FlaskLogin/app.py
-Scanned: 2016-10-20 13:23:01.400200
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ogilhinn/flaskTest
-https://github.com/ogilhinn/flaskTest
-Entry file: flaskTest/url.py
-Scanned: 2016-10-20 13:23:01.922594
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-scottfabini/flaskApp
-https://github.com/scottfabini/flaskApp
-Entry file: flaskApp/apiApp_new.py
-Scanned: 2016-10-20 13:23:02.442332
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ricardomart/FlaskApp
-https://github.com/ricardomart/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-20 13:23:03.017769
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-chiawen82/flaskFirst
-https://github.com/chiawen82/flaskFirst
-Entry file: None
-Scanned: 2016-10-20 13:23:19.215150
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-meledir/flaskBlog
-https://github.com/meledir/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-20 13:23:19.801312
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py
-
-lcfyuen/RPiFlask
-https://github.com/lcfyuen/RPiFlask
-Entry file: RPiFlask/main.py
-Scanned: 2016-10-20 13:23:20.304755
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-sasham43/flask-test
-https://github.com/sasham43/flask-test
-Entry file: flask-test/FlaskApp/__init__.py
-Scanned: 2016-10-20 13:23:20.868488
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py
-
-mickengland/vagrant-flask
-https://github.com/mickengland/vagrant-flask
-Entry file: vagrant-flask/api.py
-Scanned: 2016-10-20 13:23:22.209786
-No vulnerabilities found.
-
-
-citaret/flask-intro
-https://github.com/citaret/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 13:23:22.717679
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-elderjoe/rest_flask
-https://github.com/elderjoe/rest_flask
-Entry file: rest_flask/api/__init__.py
-Scanned: 2016-10-20 13:23:24.237353
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-manassolanki/ProjectFlask
-https://github.com/manassolanki/ProjectFlask
-Entry file: ProjectFlask/project.py
-Scanned: 2016-10-20 13:23:30.838552
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Parlefan/flask-blog
-https://github.com/Parlefan/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:23:31.387692
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-bamboo-yujiro/my_flask
-https://github.com/bamboo-yujiro/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 13:23:32.093427
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-igortmb/flask_blog
-https://github.com/igortmb/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:23:32.610253
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lunemec/flask_twitter
-https://github.com/lunemec/flask_twitter
-Entry file: flask_twitter/twitter/__main__.py
-Scanned: 2016-10-20 13:23:33.955698
-No vulnerabilities found.
-
-
-uehara1414/flask-heroku
-https://github.com/uehara1414/flask-heroku
-Entry file: flask-heroku/app.py
-Scanned: 2016-10-20 13:23:35.261480
-No vulnerabilities found.
-
-
-AnumSheraz/test_flask
-https://github.com/AnumSheraz/test_flask
-Entry file: test_flask/setup.py
-Scanned: 2016-10-20 13:23:35.926429
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vzhz/flask_blog
-https://github.com/vzhz/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:23:43.454888
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-garibo/Flask-Social
-https://github.com/garibo/Flask-Social
-Entry file: Flask-Social/app.py
-Scanned: 2016-10-20 13:23:46.820552
-Vulnerability 1:
-File: Flask-Social/app.py
- > User input at line 108, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: Flask-Social/app.py
- > Line 116: user = current_user
-File: Flask-Social/app.py
- > reaches line 119, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: Flask-Social/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social/app.py
- > reaches line 146, trigger word "flash(":
- flash('You're now following {}!'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: Flask-Social/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social/app.py
- > reaches line 147, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: Flask-Social/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social/app.py
- > reaches line 147, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: Flask-Social/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social/app.py
- > reaches line 165, trigger word "flash(":
- flash('You've unfollowed {}!'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: Flask-Social/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social/app.py
- > reaches line 166, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: Flask-Social/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social/app.py
- > reaches line 166, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-harishtm/flask-blog
-https://github.com/harishtm/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:23:47.391211
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-AdamSalma/flask-experiment
-https://github.com/AdamSalma/flask-experiment
-Entry file: flask-experiment/test/test.py
-Scanned: 2016-10-20 13:23:48.412196
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lyoncc/learn-flask
-https://github.com/lyoncc/learn-flask
-Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:23:49.074077
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wunderlins/todo-flask
-https://github.com/wunderlins/todo-flask
-Entry file: None
-Scanned: 2016-10-20 13:23:49.580586
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wunderlins/todo-flask.
-
-affinespaces/flask_test
-https://github.com/affinespaces/flask_test
-Entry file: flask_test/app.py
-Scanned: 2016-10-20 13:23:50.187034
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-clivegross/flask-usermgr
-https://github.com/clivegross/flask-usermgr
-Entry file: flask-usermgr/app/__init__.py
-Scanned: 2016-10-20 13:24:03.548334
-Vulnerability 1:
-File: flask-usermgr/app/module_auth/controllers.py
- > User input at line 19, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: flask-usermgr/app/module_auth/controllers.py
- > Line 21: session['user_id'] = user.id
-File: flask-usermgr/app/module_auth/controllers.py
- > reaches line 22, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-seantking/flask-introduction
-https://github.com/seantking/flask-introduction
-Entry file: flask-introduction/exercise2_1.py
-Scanned: 2016-10-20 13:24:09.073185
-No vulnerabilities found.
-
-
-FelixRiegBaumhauer/flask-template
-https://github.com/FelixRiegBaumhauer/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:24:09.582599
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/FelixRiegBaumhauer/flask-template.
-
-bluenight1994/flask_time
-https://github.com/bluenight1994/flask_time
-Entry file: None
-Scanned: 2016-10-20 13:24:16.582111
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Zzcnick/flask_forms
-https://github.com/Zzcnick/flask_forms
-Entry file: flask_forms/flask_app/app.py
-Scanned: 2016-10-20 13:24:17.106503
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-canofre/flask_crud
-https://github.com/canofre/flask_crud
-Entry file: flask_crud/app/__init__.py
-Scanned: 2016-10-20 13:24:18.544338
-No vulnerabilities found.
-
-
-kelly3649/04_flask
-https://github.com/kelly3649/04_flask
-Entry file: 04_flask/appHW.py
-Scanned: 2016-10-20 13:24:19.065476
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-yhzhan/login_flask
-https://github.com/yhzhan/login_flask
-Entry file: login_flask/app.py
-Scanned: 2016-10-20 13:24:19.559428
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ogal7/flask_login
-https://github.com/ogal7/flask_login
-Entry file: None
-Scanned: 2016-10-20 13:24:20.070846
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ogal7/flask_login.
-
-axiaoxin/flask-demo
-https://github.com/axiaoxin/flask-demo
-Entry file: None
-Scanned: 2016-10-20 13:24:20.577222
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/axiaoxin/flask-demo.
-
-bschumacher/Flask-BS
-https://github.com/bschumacher/Flask-BS
-Entry file: Flask-BS/test.py
-Scanned: 2016-10-20 13:24:22.024947
-No vulnerabilities found.
-
-
-towercity/flask-tutorial
-https://github.com/towercity/flask-tutorial
-Entry file: None
-Scanned: 2016-10-20 13:24:22.561657
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ed201971/simple_flask
-https://github.com/ed201971/simple_flask
-Entry file: simple_flask/hello.py
-Scanned: 2016-10-20 13:24:23.189890
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jschluger/Flask_Login
-https://github.com/jschluger/Flask_Login
-Entry file: Flask_Login/app.py
-Scanned: 2016-10-20 13:24:23.693382
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Might-M/flask_repo
-https://github.com/Might-M/flask_repo
-Entry file: flask_repo/app/__init__.py
-Scanned: 2016-10-20 13:24:27.565761
-No vulnerabilities found.
-
-
-BAM-X/Flask-seed
-https://github.com/BAM-X/Flask-seed
-Entry file: Flask-seed/app/app.py
-Scanned: 2016-10-20 13:24:33.041433
-No vulnerabilities found.
-
-
-zhangzhidao/Flask-blog
-https://github.com/zhangzhidao/Flask-blog
-Entry file: Flask-blog/app/__init__.py
-Scanned: 2016-10-20 13:24:33.585647
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-rforgione/flask_playground
-https://github.com/rforgione/flask_playground
-Entry file: flask_playground/hello_world.py
-Scanned: 2016-10-20 13:24:34.100581
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-argetamorina/Python-Flask
-https://github.com/argetamorina/Python-Flask
-Entry file: None
-Scanned: 2016-10-20 13:24:34.623743
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/argetamorina/Python-Flask.
-
-JavierGarciaD/flask_ing
-https://github.com/JavierGarciaD/flask_ing
-Entry file: flask_ing/blog/blog.py
-Scanned: 2016-10-20 13:24:36.039161
-No vulnerabilities found.
-
-
-PavanTejaAnne/Flask-SQLAlchemy
-https://github.com/PavanTejaAnne/Flask-SQLAlchemy
-Entry file: Flask-SQLAlchemy/app.py
-Scanned: 2016-10-20 13:24:36.583994
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-clakits/Flask_Webapp
-https://github.com/clakits/Flask_Webapp
-Entry file: Flask_Webapp/Redirect.py
-Scanned: 2016-10-20 13:24:45.048679
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-keathmilligan/flask-quickstart
-https://github.com/keathmilligan/flask-quickstart
-Entry file: flask-quickstart/flask-quickstart/cli.py
-Scanned: 2016-10-20 13:24:45.562420
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-dhurataK/flask_mysql
-https://github.com/dhurataK/flask_mysql
-Entry file: flask_mysql/email_validation_with_db/server.py
-Scanned: 2016-10-20 13:24:49.065281
-Vulnerability 1:
-File: flask_mysql/email_validation_with_db/server.py
- > User input at line 16, trigger word "form[":
- email = request.form['email']
-File: flask_mysql/email_validation_with_db/server.py
- > reaches line 28, trigger word "flash(":
- flash('The email address you entered ' + email + ' is a VALID email address! Thank you!')
-
-
-
-Urumasi/Flask-Bones
-https://github.com/Urumasi/Flask-Bones
-Entry file: Flask-Bones/app/__init__.py
-Scanned: 2016-10-20 13:24:54.970530
-Vulnerability 1:
-File: Flask-Bones/app/auth/views.py
- > User input at line 48, trigger word ".data":
- group = Group.create(nazev=form.data['nazev'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 50, trigger word "flash(":
- flash(gettext('Group {name} created').format(name=group.nazev), 'success')
-
-Vulnerability 2:
-File: Flask-Bones/app/auth/views.py
- > User input at line 60, trigger word ".data":
- firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website'])
-File: Flask-Bones/app/auth/views.py
- > reaches line 67, trigger word "flash(":
- flash(gettext('Organization {name} created').format(name=firma.nazev), 'success')
-
-Vulnerability 3:
-File: Flask-Bones/app/public/views.py
- > User input at line 39, trigger word ".data":
- user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni'])
-Reassigned in:
- File: Flask-Bones/app/public/views.py
- > Line 49: token = s.dumps(user.id)
-File: Flask-Bones/app/public/views.py
- > reaches line 53, trigger word "flash(":
- flash(gettext('Sent verification email to {email}').format(email=user.email), 'success')
-
-
-
-MekonenW/Dojo_survey
-https://github.com/MekonenW/Dojo_survey
-Entry file: Dojo_survey/survey.py
-Scanned: 2016-10-20 13:25:01.895464
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Dojo_survey/venv/lib/python2.7/genericpath.py
-
-mat105/Docker-Test
-https://github.com/mat105/Docker-Test
-Entry file: Docker-Test/aplicacion/app.py
-Scanned: 2016-10-20 13:25:03.220057
-No vulnerabilities found.
-
-
-gauravkulkarni96/microblog
-https://github.com/gauravkulkarni96/microblog
-Entry file: None
-Scanned: 2016-10-20 13:25:03.737065
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-BreslawScripts/flask_hello_world
-https://github.com/BreslawScripts/flask_hello_world
-Entry file: None
-Scanned: 2016-10-20 13:25:04.248873
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/BreslawScripts/flask_hello_world.
-
-PeteLing/my_blog
-https://github.com/PeteLing/my_blog
-Entry file: my_blog/app/__init__.py
-Scanned: 2016-10-20 13:25:07.323984
-No vulnerabilities found.
-
-
-MatthewLally/FlaskProblemSheet
-https://github.com/MatthewLally/FlaskProblemSheet
-Entry file: FlaskProblemSheet/hello.py
-Scanned: 2016-10-20 13:25:08.652822
-No vulnerabilities found.
-
-
-ysalimi/flaskRestCrud
-https://github.com/ysalimi/flaskRestCrud
-Entry file: flaskRestCrud/project/__init__.py
-Scanned: 2016-10-20 13:25:11.116951
-Vulnerability 1:
-File: flaskRestCrud/project/api_v1/authority.py
- > User input at line 29, trigger word ".data":
- res = scheme.data
-Reassigned in:
- File: flaskRestCrud/project/api_v1/authority.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400)
-File: flaskRestCrud/project/api_v1/authority.py
- > reaches line 34, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = authority_schema.jsonify(res)
-
-Vulnerability 2:
-File: flaskRestCrud/project/api_v1/authority.py
- > User input at line 40, trigger word "get(":
- authority = Authority.query.get(id)
-File: flaskRestCrud/project/api_v1/authority.py
- > reaches line 46, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = authority_schema.jsonify(authority)
-
-Vulnerability 3:
-File: flaskRestCrud/project/api_v1/user.py
- > User input at line 127, trigger word ".data":
- res = scheme.data
-Reassigned in:
- File: flaskRestCrud/project/api_v1/user.py
- > Line 129: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400)
-File: flaskRestCrud/project/api_v1/user.py
- > reaches line 131, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (user_schema_secure.jsonify(User.query.filter_by(email=res.email).first()), 409)
-
-Vulnerability 4:
-File: flaskRestCrud/project/api_v1/user.py
- > User input at line 127, trigger word ".data":
- res = scheme.data
-Reassigned in:
- File: flaskRestCrud/project/api_v1/user.py
- > Line 129: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400)
-File: flaskRestCrud/project/api_v1/user.py
- > reaches line 134, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = user_schema_secure.jsonify(res)
-
-Vulnerability 5:
-File: flaskRestCrud/project/api_v1/user.py
- > User input at line 140, trigger word "get(":
- user = User.query.get(id)
-File: flaskRestCrud/project/api_v1/user.py
- > reaches line 151, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = user_schema_secure.jsonify(user)
-
-Vulnerability 6:
-File: flaskRestCrud/project/api_v1/role.py
- > User input at line 32, trigger word ".data":
- res = scheme.data
-Reassigned in:
- File: flaskRestCrud/project/api_v1/role.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400)
-File: flaskRestCrud/project/api_v1/role.py
- > reaches line 39, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = role_schema.jsonify(res)
-
-Vulnerability 7:
-File: flaskRestCrud/project/api_v1/role.py
- > User input at line 46, trigger word "get(":
- role = Role.query.get(id)
-Reassigned in:
- File: flaskRestCrud/project/api_v1/role.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = (jsonify(), 404)
-File: flaskRestCrud/project/api_v1/role.py
- > reaches line 53, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = role_schema.jsonify(role)
-
-
-
-richardadalton/flask2google
-https://github.com/richardadalton/flask2google
-Entry file: flask2google/main.py
-Scanned: 2016-10-20 13:25:12.440340
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-JFreyra/FlaskLogin_02
-https://github.com/JFreyra/FlaskLogin_02
-Entry file: FlaskLogin_02/app.py
-Scanned: 2016-10-20 13:25:18.828628
-No vulnerabilities found.
-
-
-JesseTellez/FlaskWordApp
-https://github.com/JesseTellez/FlaskWordApp
-Entry file: FlaskWordApp/myenv/app.py
-Scanned: 2016-10-20 13:25:25.032342
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-ribbondz/erp_flask_app
-https://github.com/ribbondz/erp_flask_app
-Entry file: erp_flask_app/site-packages/flask/sessions.py
-Scanned: 2016-10-20 13:25:33.098863
-No vulnerabilities found.
-
-
-IanLondon/simple_flask_docker
-https://github.com/IanLondon/simple_flask_docker
-Entry file: simple_flask_docker/app/main.py
-Scanned: 2016-10-20 13:25:35.475341
-No vulnerabilities found.
-
-
-mustafawm/Flask-LocationApp
-https://github.com/mustafawm/Flask-LocationApp
-Entry file: Flask-LocationApp/routes.py
-Scanned: 2016-10-20 13:25:38.781465
-Vulnerability 1:
-File: Flask-LocationApp/routes.py
- > User input at line 31, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: Flask-LocationApp/routes.py
- > Line 33: my_coordinates = p.address_to_latlng(address)
- File: Flask-LocationApp/routes.py
- > Line 34: places = p.query(address)
- File: Flask-LocationApp/routes.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: Flask-LocationApp/routes.py
- > Line 24: my_coordinates = (37.4221, -122.0844)
- File: Flask-LocationApp/routes.py
- > Line 25: places = []
- File: Flask-LocationApp/routes.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: Flask-LocationApp/routes.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-Vulnerability 2:
-File: Flask-LocationApp/routes.py
- > User input at line 31, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: Flask-LocationApp/routes.py
- > Line 33: my_coordinates = p.address_to_latlng(address)
- File: Flask-LocationApp/routes.py
- > Line 34: places = p.query(address)
- File: Flask-LocationApp/routes.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: Flask-LocationApp/routes.py
- > Line 24: my_coordinates = (37.4221, -122.0844)
- File: Flask-LocationApp/routes.py
- > Line 25: places = []
- File: Flask-LocationApp/routes.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: Flask-LocationApp/routes.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-
-
-ImNaren/Docker_Compose-Flask-Mysql-
-https://github.com/ImNaren/Docker_Compose-Flask-Mysql-
-Entry file: Docker_Compose-Flask-Mysql-/app/model.py
-Scanned: 2016-10-20 13:25:40.616794
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-konwan/flask
-https://github.com/konwan/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:42.681025
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-dalyddaly/flask
-https://github.com/dalyddaly/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:43.264929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-CliveCullen/flask
-https://github.com/CliveCullen/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:43.839382
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Carryopendoor1/flask
-https://github.com/Carryopendoor1/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:44.406488
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-lsyff210/flask
-https://github.com/lsyff210/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:44.986284
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-jyntran/flask
-https://github.com/jyntran/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:45.559935
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-larry1994/flask
-https://github.com/larry1994/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:46.141398
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-juliascript/Flask
-https://github.com/juliascript/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:25:46.644252
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-davinbutler/flask
-https://github.com/davinbutler/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:47.222754
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-skraiman/flask
-https://github.com/skraiman/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:47.790716
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Gershine/Flask
-https://github.com/Gershine/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:25:48.296992
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ricardonhuang/flask
-https://github.com/ricardonhuang/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:49.875289
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-cmeisinger/flask
-https://github.com/cmeisinger/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:25:56.462039
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sanie4eg/Flask
-https://github.com/sanie4eg/Flask
-Entry file: Flask/test_hello.py
-Scanned: 2016-10-20 13:26:02.974846
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-vojtahelle/flask
-https://github.com/vojtahelle/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:26:04.545317
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-bharatsush/flask
-https://github.com/bharatsush/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:26:05.111910
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-Tangugo/flask
-https://github.com/Tangugo/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:26:05.678315
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-darylkeane/flask
-https://github.com/darylkeane/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:26:08.262356
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-fushouhai/flask
-https://github.com/fushouhai/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:26:10.826922
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-sadscv/flask
-https://github.com/sadscv/flask
-Entry file: flask/hello.py
-Scanned: 2016-10-20 13:26:12.403198
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py
-
-arpitbbhayani/flasksr
-https://github.com/arpitbbhayani/flasksr
-Entry file: flasksr/examples/basicsr.py
-Scanned: 2016-10-20 13:26:19.920165
-No vulnerabilities found.
-
-
-I-am-Gabi/flask-minicurso
-https://github.com/I-am-Gabi/flask-minicurso
-Entry file: flask-minicurso/minicurso-flask.py
-Scanned: 2016-10-20 13:26:26.596546
-No vulnerabilities found.
-
-
-Millyn/uFlask
-https://github.com/Millyn/uFlask
-Entry file: uFlask/project/__init__.py
-Scanned: 2016-10-20 13:26:27.933919
-No vulnerabilities found.
-
-
-zhangheli/flask-google
-https://github.com/zhangheli/flask-google
-Entry file: flask-google/g.py
-Scanned: 2016-10-20 13:26:35.377393
-No vulnerabilities found.
-
-
-janmandel/flasktest
-https://github.com/janmandel/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:26:35.923096
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-springleeo/flasklearning
-https://github.com/springleeo/flasklearning
-Entry file: flasklearning/flasklearning.py
-Scanned: 2016-10-20 13:26:37.251556
-No vulnerabilities found.
-
-
-Irabor/flaskbg
-https://github.com/Irabor/flaskbg
-Entry file: flaskbg/app.py
-Scanned: 2016-10-20 13:26:38.564021
-No vulnerabilities found.
-
-
-hartwork/flasktop
-https://github.com/hartwork/flasktop
-Entry file: flasktop/flasktop.py
-Scanned: 2016-10-20 13:26:40.943668
-No vulnerabilities found.
-
-
-xhygh/flaskr
-https://github.com/xhygh/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:26:41.456992
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-joaozecchin/flasktemp
-https://github.com/joaozecchin/flasktemp
-Entry file: flasktemp/app/__init__.py
-Scanned: 2016-10-20 13:26:42.767784
-No vulnerabilities found.
-
-
-HecvStyle/flasky
-https://github.com/HecvStyle/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:26:43.277454
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-superdachs/flaskdaemon
-https://github.com/superdachs/flaskdaemon
-Entry file: flaskdaemon/flaskdaemon.py
-Scanned: 2016-10-20 13:26:44.583368
-No vulnerabilities found.
-
-
-Cushionyten0/flasktaskr
-https://github.com/Cushionyten0/flasktaskr
-Entry file: None
-Scanned: 2016-10-20 13:26:45.098068
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-uMtMu/flasksite
-https://github.com/uMtMu/flasksite
-Entry file: flasksite/app.py
-Scanned: 2016-10-20 13:26:45.625320
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-brianmugweru/flaskpython
-https://github.com/brianmugweru/flaskpython
-Entry file: None
-Scanned: 2016-10-20 13:26:53.739355
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-asynte/flasktechdemo
-https://github.com/asynte/flasktechdemo
-Entry file: flasktechdemo/app/__init__.py
-Scanned: 2016-10-20 13:27:02.091807
-No vulnerabilities found.
-
-
-btotharye/flaskmicroblog
-https://github.com/btotharye/flaskmicroblog
-Entry file: None
-Scanned: 2016-10-20 13:27:02.642785
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gavinroderick/flaskapp
-https://github.com/gavinroderick/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:27:03.149221
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/gavinroderick/flaskapp.
-
-pradyumnac/flasklearn
-https://github.com/pradyumnac/flasklearn
-Entry file: flasklearn/flasklearn.py
-Scanned: 2016-10-20 13:27:03.667230
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-songxiaowei/flaskdemo
-https://github.com/songxiaowei/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:27:04.234193
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ryanmartinneutrino/flaskwf
-https://github.com/ryanmartinneutrino/flaskwf
-Entry file: flaskwf/flaskwf.py
-Scanned: 2016-10-20 13:27:05.689363
-No vulnerabilities found.
-
-
-Jorge-Fuentes/flaskrplus
-https://github.com/Jorge-Fuentes/flaskrplus
-Entry file: flaskrplus/flaskr+.py
-Scanned: 2016-10-20 13:27:07.142112
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-ajjkennedy/flaskaws
-https://github.com/ajjkennedy/flaskaws
-Entry file: flaskaws/flask-aws/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-20 13:27:17.318490
-No vulnerabilities found.
-
-
-xando/flaskr
-https://github.com/xando/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:27:18.451094
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-tiancegit/flasky
-https://github.com/tiancegit/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:27:18.995448
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wasabi222/flaskdemo
-https://github.com/wasabi222/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-20 13:27:19.510120
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-HuanChenLu/flasky
-https://github.com/HuanChenLu/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:27:20.010369
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-phillinzzz/flasky
-https://github.com/phillinzzz/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:27:20.522235
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-paulmoliva/flaskr
-https://github.com/paulmoliva/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:27:21.020217
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-mdzhang/flaskr
-https://github.com/mdzhang/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:27:27.538080
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jaysharm/flaskio
-https://github.com/jaysharm/flaskio
-Entry file: flaskio/app.py
-Scanned: 2016-10-20 13:27:35.912375
-No vulnerabilities found.
-
-
-SeamusGillespie/flasktest
-https://github.com/SeamusGillespie/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-20 13:27:36.426063
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-cw-andrews/flasked
-https://github.com/cw-andrews/flasked
-Entry file: flasked/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:27:48.668744
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-princess0307/flaskapp
-https://github.com/princess0307/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:27:49.190999
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/princess0307/flaskapp.
-
-cabbagesmasher/flaskapp
-https://github.com/cabbagesmasher/flaskapp
-Entry file: None
-Scanned: 2016-10-20 13:27:49.738677
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cabbagesmasher/flaskapp.
-
-tazou/flasktickets
-https://github.com/tazou/flasktickets
-Entry file: flasktickets/main.py
-Scanned: 2016-10-20 13:27:51.585884
-No vulnerabilities found.
-
-
-WtemptyE/flaskr
-https://github.com/WtemptyE/flaskr
-Entry file: flaskr/flaskr.py
-Scanned: 2016-10-20 13:27:52.091538
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-SpringToooh/flasky
-https://github.com/SpringToooh/flasky
-Entry file: flasky/flasky/flask/app.py
-Scanned: 2016-10-20 13:27:52.596866
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-LostMailman/FlaskPractice
-https://github.com/LostMailman/FlaskPractice
-Entry file: FlaskPractice/flask/Lib/site-packages/flask_openid.py
-Scanned: 2016-10-20 13:28:03.060253
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-harishtm/FlaskDemo
-https://github.com/harishtm/FlaskDemo
-Entry file: FlaskDemo/test.py
-Scanned: 2016-10-20 13:28:03.605326
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Original-heapsters/FlaskPortal
-https://github.com/Original-heapsters/FlaskPortal
-Entry file: FlaskPortal/Portal_Main/app.py
-Scanned: 2016-10-20 13:28:04.937013
-Vulnerability 1:
-File: FlaskPortal/Portal_Main/app.py
- > User input at line 20, trigger word "form[":
- POST_USERNAME = str(request.form['username'])
-File: FlaskPortal/Portal_Main/app.py
- > reaches line 26, trigger word "filter(":
- query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD]))
-
-Vulnerability 2:
-File: FlaskPortal/Portal_Main/app.py
- > User input at line 21, trigger word "form[":
- POST_PASSWORD = str(request.form['password'])
-File: FlaskPortal/Portal_Main/app.py
- > reaches line 26, trigger word "filter(":
- query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD]))
-
-
-
-dsikes/FlaskSample
-https://github.com/dsikes/FlaskSample
-Entry file: FlaskSample/flask03.py
-Scanned: 2016-10-20 13:28:05.479281
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-stackeric/flask_starter
-https://github.com/stackeric/flask_starter
-Entry file: flask_starter/resources/__init__.py
-Scanned: 2016-10-20 13:28:06.799432
-No vulnerabilities found.
-
-
-yimuyang/FlaskStudy
-https://github.com/yimuyang/FlaskStudy
-Entry file: FlaskStudy/flaskr.py
-Scanned: 2016-10-20 13:28:07.323139
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-lisaheff95/flask2
-https://github.com/lisaheff95/flask2
-Entry file: flask2/app.py
-Scanned: 2016-10-20 13:28:07.837338
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-coderminer/FlaskBlog
-https://github.com/coderminer/FlaskBlog
-Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py
-Scanned: 2016-10-20 13:28:08.472339
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-smitthakkar96/flask-restful-boilerplate
-https://github.com/smitthakkar96/flask-restful-boilerplate
-Entry file: flask-restful-boilerplate/api.py
-Scanned: 2016-10-20 13:28:09.878182
-No vulnerabilities found.
-
-
-pwgraham91/flask-template
-https://github.com/pwgraham91/flask-template
-Entry file: None
-Scanned: 2016-10-20 13:28:10.394425
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pwgraham91/flask-template.
-
-MarFerPra/learning-flask
-https://github.com/MarFerPra/learning-flask
-Entry file: learning-flask/hello.py
-Scanned: 2016-10-20 13:28:10.941876
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-bamboo-yujiro/my_flask
-https://github.com/bamboo-yujiro/my_flask
-Entry file: my_flask/hello.py
-Scanned: 2016-10-20 13:28:11.566025
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py
-
-zheng-zy/flask_app
-https://github.com/zheng-zy/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:28:12.064100
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zheng-zy/flask_app.
-
-amarshukla/flask_app
-https://github.com/amarshukla/flask_app
-Entry file: None
-Scanned: 2016-10-20 13:28:18.593184
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amarshukla/flask_app.
-
-ultimatesword/learn_flask
-https://github.com/ultimatesword/learn_flask
-Entry file: learn_flask/hello.py
-Scanned: 2016-10-20 13:28:19.139492
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Fiksers/myFlask
-https://github.com/Fiksers/myFlask
-Entry file: myFlask/project.py
-Scanned: 2016-10-20 13:28:19.652881
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-Naivee-Bref/Flask-Bref
-https://github.com/Naivee-Bref/Flask-Bref
-Entry file: Flask-Bref/app.py
-Scanned: 2016-10-20 13:28:20.984732
-No vulnerabilities found.
-
-
-jacquelineawatts/Flask_Intro
-https://github.com/jacquelineawatts/Flask_Intro
-Entry file: Flask_Intro/nice.py
-Scanned: 2016-10-20 13:28:21.575253
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Intro/env/lib/python2.7/genericpath.py
-
-mrkewen/flask-blog
-https://github.com/mrkewen/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-20 13:28:22.121891
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py
-
-kszgbr/flask-min
-https://github.com/kszgbr/flask-min
-Entry file: flask-min/main.py
-Scanned: 2016-10-20 13:28:23.456588
-No vulnerabilities found.
-
-
-renefs87/flask-skeleton
-https://github.com/renefs87/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 13:28:27.989512
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/renefs87/flask-skeleton.
-
-LuckyLuke201/flask-skeleton
-https://github.com/LuckyLuke201/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 13:28:35.531869
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/LuckyLuke201/flask-skeleton.
-
-curiousboy2/flask_blog
-https://github.com/curiousboy2/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-20 13:28:37.041947
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-wqxu/flask_practice
-https://github.com/wqxu/flask_practice
-Entry file: flask_practice/app/__init__.py
-Scanned: 2016-10-20 13:28:37.567585
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-alrifqi/flask-learning
-https://github.com/alrifqi/flask-learning
-Entry file: flask-learning/app.py
-Scanned: 2016-10-20 13:28:50.202894
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-learning/venv/lib/python2.7/genericpath.py
-
-noelis/flask-intro
-https://github.com/noelis/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 13:28:50.713224
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jrhian/Flask-intro
-https://github.com/jrhian/Flask-intro
-Entry file: Flask-intro/nice.py
-Scanned: 2016-10-20 13:28:51.225498
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-kmjch/flask-intro
-https://github.com/kmjch/flask-intro
-Entry file: flask-intro/routes.py
-Scanned: 2016-10-20 13:28:51.744601
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-PSquared0/Flask_lab
-https://github.com/PSquared0/Flask_lab
-Entry file: Flask_lab/nice.py
-Scanned: 2016-10-20 13:28:53.086458
-No vulnerabilities found.
-
-
-hughmcpartlan/hello_flask
-https://github.com/hughmcpartlan/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-20 13:28:53.609693
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-EddyCodeIt/flask-problem
-https://github.com/EddyCodeIt/flask-problem
-Entry file: flask-problem/flask_1.py
-Scanned: 2016-10-20 13:28:54.912507
-No vulnerabilities found.
-
-
-bschumacher/Flask-Navigate
-https://github.com/bschumacher/Flask-Navigate
-Entry file: Flask-Navigate/test.py
-Scanned: 2016-10-20 13:29:05.514731
-No vulnerabilities found.
-
-
-mapleque/flask_framework
-https://github.com/mapleque/flask_framework
-Entry file: flask_framework/app/__init__.py
-Scanned: 2016-10-20 13:29:06.834165
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
-jk-aneirin/stu_flask
-https://github.com/jk-aneirin/stu_flask
-Entry file: None
-Scanned: 2016-10-20 13:29:07.335066
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kaharonus/flask-skeleton
-https://github.com/Kaharonus/flask-skeleton
-Entry file: None
-Scanned: 2016-10-20 13:29:07.849313
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Kaharonus/flask-skeleton.
-
-neilmaldy/flask_upload
-https://github.com/neilmaldy/flask_upload
-Entry file: flask_upload/test.py
-Scanned: 2016-10-20 13:29:09.185137
-Vulnerability 1:
-File: flask_upload/test.py
- > User input at line 28, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flask_upload/test.py
- > Line 35: filename = secure_filename(file.filename)
- File: flask_upload/test.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
- File: flask_upload/test.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: flask_upload/test.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: flask_upload/test.py
- > reaches line 41, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename='new_' + filename))
-
-Vulnerability 2:
-File: flask_upload/test.py
- > User input at line 28, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flask_upload/test.py
- > Line 35: filename = secure_filename(file.filename)
- File: flask_upload/test.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
- File: flask_upload/test.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: flask_upload/test.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: flask_upload/test.py
- > reaches line 41, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename='new_' + filename))
-
-Vulnerability 3:
-File: flask_upload/quote_scrub_server.py
- > User input at line 54, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flask_upload/quote_scrub_server.py
- > Line 61: filename = secure_filename(file.filename)
- File: flask_upload/quote_scrub_server.py
- > Line 65: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename))
- File: flask_upload/quote_scrub_server.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = '
-
- Quote Scrub
-
Quote XLSX File
-
- '
- File: flask_upload/quote_scrub_server.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: flask_upload/quote_scrub_server.py
- > Line 59: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: flask_upload/quote_scrub_server.py
- > reaches line 69, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename)))
-
-Vulnerability 4:
-File: flask_upload/quote_scrub_server.py
- > User input at line 54, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flask_upload/quote_scrub_server.py
- > Line 61: filename = secure_filename(file.filename)
- File: flask_upload/quote_scrub_server.py
- > Line 65: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename))
- File: flask_upload/quote_scrub_server.py
- > Line 70: ret_MAYBE_FUNCTION_NAME = '
-
- Quote Scrub
-
Quote XLSX File
-
- '
- File: flask_upload/quote_scrub_server.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: flask_upload/quote_scrub_server.py
- > Line 59: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: flask_upload/quote_scrub_server.py
- > reaches line 69, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename)))
-
-Vulnerability 5:
-File: flask_upload/quote_scrub_server.py
- > User input at line 88, trigger word ".data":
- file = form.file_reference.data
-Reassigned in:
- File: flask_upload/quote_scrub_server.py
- > Line 91: filename = secure_filename(file.filename)
- File: flask_upload/quote_scrub_server.py
- > Line 96: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename))
- File: flask_upload/quote_scrub_server.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado')
- File: flask_upload/quote_scrub_server.py
- > Line 104: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado')
- File: flask_upload/quote_scrub_server.py
- > Line 106: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Please insure quote file is in XLSX format')
- File: flask_upload/quote_scrub_server.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='')
-File: flask_upload/quote_scrub_server.py
- > reaches line 100, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename)))
-
-Vulnerability 6:
-File: flask_upload/quote_scrub_server.py
- > User input at line 88, trigger word ".data":
- file = form.file_reference.data
-Reassigned in:
- File: flask_upload/quote_scrub_server.py
- > Line 91: filename = secure_filename(file.filename)
- File: flask_upload/quote_scrub_server.py
- > Line 96: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename))
- File: flask_upload/quote_scrub_server.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado')
- File: flask_upload/quote_scrub_server.py
- > Line 104: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado')
- File: flask_upload/quote_scrub_server.py
- > Line 106: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Please insure quote file is in XLSX format')
- File: flask_upload/quote_scrub_server.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='')
-File: flask_upload/quote_scrub_server.py
- > reaches line 100, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename)))
-
-
-
-debuggerboy/flask-appserv
-https://github.com/debuggerboy/flask-appserv
-Entry file: flask-appserv/app/main.py
-Scanned: 2016-10-20 13:29:10.600344
-No vulnerabilities found.
-
-
-SujoyDU/python-flask
-https://github.com/SujoyDU/python-flask
-Entry file: python-flask/rest/__init__.py
-Scanned: 2016-10-20 13:29:11.118038
-No vulnerabilities found.
-An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed.
-
diff --git a/scan_results/archived_26_10_scan.pyt b/scan_results/archived_26_10_scan.pyt
deleted file mode 100644
index ae82019a..00000000
--- a/scan_results/archived_26_10_scan.pyt
+++ /dev/null
@@ -1,43642 +0,0 @@
-maxcountryman/flask-uploads
-https://github.com/maxcountryman/flask-uploads
-Entry file: flask-uploads/tests.py
-Scanned: 2016-10-25 14:55:15.361457
-No vulnerabilities found.
-
-
-masonicGIT/21-Flask-Boilerplate
-https://github.com/masonicGIT/21-Flask-Boilerplate
-Entry file: 21-Flask-Boilerplate/app/__init__.py
-Scanned: 2016-10-25 14:55:21.213012
-Vulnerability 1:
-File: 21-Flask-Boilerplate/app/views/main.py
- > User input at line 64, trigger word ".data":
- tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password)
-Reassigned in:
- File: 21-Flask-Boilerplate/app/views/main.py
- > Line 67: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: 21-Flask-Boilerplate/app/views/main.py
- > reaches line 68, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 2:
-File: 21-Flask-Boilerplate/app/views/main.py
- > User input at line 67, trigger word ".data":
- message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: 21-Flask-Boilerplate/app/views/main.py
- > reaches line 68, trigger word "flash(":
- flash(message, 'positive')
-
-Vulnerability 3:
-File: 21-Flask-Boilerplate/app/views/main.py
- > User input at line 64, trigger word ".data":
- tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password)
-Reassigned in:
- File: 21-Flask-Boilerplate/app/views/main.py
- > Line 67: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx)
-File: 21-Flask-Boilerplate/app/views/main.py
- > reaches line 72, trigger word "flash(":
- flash(tx['message'], 'negative')
-
-Vulnerability 4:
-File: 21-Flask-Boilerplate/app/views/main.py
- > User input at line 78, trigger word "form(":
- points = [(random.uniform(48.84341, 48.86341), random.uniform(2.3388, 2.3588)) for _ in range(random.randint(2, 9))]
-File: 21-Flask-Boilerplate/app/views/main.py
- > reaches line 81, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('points'points)
-
-Vulnerability 5:
-File: 21-Flask-Boilerplate/app/views/user.py
- > User input at line 24, trigger word ".data":
- user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data)
-Reassigned in:
- File: 21-Flask-Boilerplate/app/views/user.py
- > Line 39: token = ts.dumps(user.email,salt='email-confirm-key')
-File: 21-Flask-Boilerplate/app/views/user.py
- > reaches line 41, trigger word "url_for(":
- confirmUrl = url_for('userbp.confirm',token=token, _external=True)
-
-Vulnerability 6:
-File: 21-Flask-Boilerplate/app/views/user.py
- > User input at line 24, trigger word ".data":
- user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data)
-Reassigned in:
- File: 21-Flask-Boilerplate/app/views/user.py
- > Line 39: token = ts.dumps(user.email,salt='email-confirm-key')
-File: 21-Flask-Boilerplate/app/views/user.py
- > reaches line 43, trigger word "render_template(":
- html = render_template('email/confirm.html',confirm_url=confirmUrl)
-
-Vulnerability 7:
-File: 21-Flask-Boilerplate/app/views/user.py
- > User input at line 118, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: 21-Flask-Boilerplate/app/views/user.py
- > Line 124: token = ts.dumps(user.email,salt='password-reset-key')
-File: 21-Flask-Boilerplate/app/views/user.py
- > reaches line 126, trigger word "url_for(":
- resetUrl = url_for('userbp.reset',token=token, _external=True)
-
-Vulnerability 8:
-File: 21-Flask-Boilerplate/app/views/user.py
- > User input at line 118, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: 21-Flask-Boilerplate/app/views/user.py
- > Line 124: token = ts.dumps(user.email,salt='password-reset-key')
-File: 21-Flask-Boilerplate/app/views/user.py
- > reaches line 128, trigger word "render_template(":
- html = render_template('email/reset.html',reset_url=resetUrl)
-
-Vulnerability 9:
-File: 21-Flask-Boilerplate/app/forms/user.py
- > User input at line 25, trigger word ".data":
- check = self.model.query.filter(self.field == field.data).first()
-File: 21-Flask-Boilerplate/app/forms/user.py
- > reaches line 25, trigger word "filter(":
- check = self.model.query.filter(self.field == field.data).first()
-
-
-
-ChinaChou/Flask
-https://github.com/ChinaChou/Flask
-Entry file: Flask/application/debugs.py
-Scanned: 2016-10-25 14:55:22.541094
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-extranjero/flask
-https://github.com/extranjero/flask
-Entry file: flask/app/__init__.py
-Scanned: 2016-10-25 14:55:23.878824
-Vulnerability 1:
-File: flask/app/handlers/subjects.py
- > User input at line 22, trigger word "get(":
- subject = Subject.query.get(id)
-Reassigned in:
- File: flask/app/handlers/subjects.py
- > Line 23: subject.name = request.json.get('name', subject.name)
-File: flask/app/handlers/subjects.py
- > reaches line 25, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(subject.dict())
-
-Vulnerability 2:
-File: flask/app/handlers/students.py
- > User input at line 22, trigger word "get(":
- student = Student.query.get(id)
-Reassigned in:
- File: flask/app/handlers/students.py
- > Line 23: student.name = request.json.get('name', student.name)
-File: flask/app/handlers/students.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(student.dict())
-
-Vulnerability 3:
-File: flask/app/handlers/marks.py
- > User input at line 15, trigger word "get(":
- mark = Mark.query.get(id)
-File: flask/app/handlers/marks.py
- > reaches line 16, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(mark.dict())
-
-Vulnerability 4:
-File: flask/app/handlers/marks.py
- > User input at line 20, trigger word "get(":
- mark = Mark.query.get(id)
-Reassigned in:
- File: flask/app/handlers/marks.py
- > Line 21: mark.student_id = request.json.get('student_id', mark.student_id)
- File: flask/app/handlers/marks.py
- > Line 22: mark.subject_id = request.json.get('subject_id', mark.subject_id)
- File: flask/app/handlers/marks.py
- > Line 23: mark.mark = request.json.get('mark', mark.mark)
-File: flask/app/handlers/marks.py
- > reaches line 25, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(mark.dict())
-
-
-
-aolSvt/flask
-https://github.com/aolSvt/flask
-Entry file: flask/flask/xmas.py
-Scanned: 2016-10-25 14:55:25.257430
-Vulnerability 1:
-File: flask/flask/route.py
- > User input at line 16, trigger word "form[":
- santa_name = request.form['name']
-Reassigned in:
- File: flask/flask/route.py
- > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email
-File: flask/flask/route.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200)
-
-Vulnerability 2:
-File: flask/flask/route.py
- > User input at line 17, trigger word "form[":
- santa_index = request.form['index']
-Reassigned in:
- File: flask/flask/route.py
- > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email
-File: flask/flask/route.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200)
-
-Vulnerability 3:
-File: flask/flask/route.py
- > User input at line 18, trigger word "form[":
- santa_address = request.form['address']
-Reassigned in:
- File: flask/flask/route.py
- > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email
-File: flask/flask/route.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200)
-
-Vulnerability 4:
-File: flask/flask/route.py
- > User input at line 19, trigger word "form[":
- santa_email = request.form['email']
-Reassigned in:
- File: flask/flask/route.py
- > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email
-File: flask/flask/route.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200)
-
-
-
-ShoJinto/flask
-https://github.com/ShoJinto/flask
-Entry file: flask/flaskr/flaskr.py
-Scanned: 2016-10-25 14:55:26.514529
-No vulnerabilities found.
-
-
-jhn316/Flask
-https://github.com/jhn316/Flask
-Entry file: None
-Scanned: 2016-10-25 14:55:33.690747
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bh45k4r/flask
-https://github.com/bh45k4r/flask
-Entry file: flask/http_echo_server/http_echo_server.py
-Scanned: 2016-10-25 14:55:34.977119
-No vulnerabilities found.
-
-
-lhw4d4/flask
-https://github.com/lhw4d4/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:44.709996
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chenyuntc/flask
-https://github.com/chenyuntc/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:45.230521
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Gmingming/Flask
-https://github.com/Gmingming/Flask
-Entry file: None
-Scanned: 2016-10-25 14:55:46.265450
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gd452/flask
-https://github.com/gd452/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:46.798446
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-llh335/flask
-https://github.com/llh335/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:47.328446
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tahmidshahriar/flask
-https://github.com/tahmidshahriar/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:47.841934
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vstorm/Flask
-https://github.com/vstorm/Flask
-Entry file: None
-Scanned: 2016-10-25 14:55:48.385942
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Neo0/flask
-https://github.com/Neo0/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:48.919458
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Berarik/Flask
-https://github.com/Berarik/Flask
-Entry file: None
-Scanned: 2016-10-25 14:55:49.453921
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-seeInside/Flask
-https://github.com/seeInside/Flask
-Entry file: None
-Scanned: 2016-10-25 14:55:50.082534
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-paulmin55/flask
-https://github.com/paulmin55/flask
-Entry file: None
-Scanned: 2016-10-25 14:55:50.594947
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-TwilioDevEd/airtng-flask
-https://github.com/TwilioDevEd/airtng-flask
-Entry file: airtng-flask/airtng_flask/__init__.py
-Scanned: 2016-10-25 14:55:55.948136
-Vulnerability 1:
-File: airtng-flask/airtng_flask/views.py
- > User input at line 51, trigger word ".data":
- candidate_user = User.query.filter(User.email == form.email.data).first()
-File: airtng-flask/airtng_flask/views.py
- > reaches line 51, trigger word "filter(":
- candidate_user = User.query.filter(User.email == form.email.data).first()
-
-Vulnerability 2:
-File: airtng-flask/airtng_flask/views.py
- > User input at line 131, trigger word ".data":
- user = User.query.filter(User.phone_number == form.From.data).first()
-File: airtng-flask/airtng_flask/views.py
- > reaches line 131, trigger word "filter(":
- user = User.query.filter(User.phone_number == form.From.data).first()
-
-Vulnerability 3:
-File: airtng-flask/airtng_flask/views.py
- > User input at line 131, trigger word ".data":
- user = User.query.filter(User.phone_number == form.From.data).first()
-File: airtng-flask/airtng_flask/views.py
- > reaches line 132, trigger word "filter(":
- reservation = Reservation.query.filter(Reservation.status == 'pending' and Reservation.vacation_property.host.id == user.id).first()
-
-
-
-tilda-center/flask-tutorial
-https://github.com/tilda-center/flask-tutorial
-Entry file: flask-tutorial/manage.py
-Scanned: 2016-10-25 14:55:57.390206
-No vulnerabilities found.
-
-
-smoqadam/PyFladesk
-https://github.com/smoqadam/PyFladesk
-Entry file: PyFladesk/routes.py
-Scanned: 2016-10-25 14:55:58.835770
-No vulnerabilities found.
-
-
-CarlEkerot/flask-orm
-https://github.com/CarlEkerot/flask-orm
-Entry file: flask-orm/webapp/__init__.py
-Scanned: 2016-10-25 14:56:00.938781
-No vulnerabilities found.
-
-
-Maru-zhang/iCCUT-Server-Flask
-https://github.com/Maru-zhang/iCCUT-Server-Flask
-Entry file: None
-Scanned: 2016-10-25 14:56:02.716911
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jeffwidman/flask-uploads
-https://github.com/jeffwidman/flask-uploads
-Entry file: flask-uploads/tests.py
-Scanned: 2016-10-25 14:56:04.402423
-No vulnerabilities found.
-
-
-wdm0006/gitnoc
-https://github.com/wdm0006/gitnoc
-Entry file: gitnoc/gitnoc/app.py
-Scanned: 2016-10-25 14:56:10.248676
-Vulnerability 1:
-File: gitnoc/gitnoc/services/metrics.py
- > User input at line 65, trigger word "get(":
- extensions = settings.get('extensions', None)
-Reassigned in:
- File: gitnoc/gitnoc/services/metrics.py
- > Line 71: df = repo.file_detail(extensions=extensions, ignore_dir=ignore_dir)
- File: gitnoc/gitnoc/services/metrics.py
- > Line 72: df = df.reset_index(level=2)
- File: gitnoc/gitnoc/services/metrics.py
- > Line 73: df = df.sort_values(by=['loc'], ascending=False)
-File: gitnoc/gitnoc/services/metrics.py
- > reaches line 76, trigger word "replace(":
- out.append('file_name''loc''owner''extension''last_edit''clean_file_name'df.loc[(idx, 'file')]df.loc[(idx, 'loc')]df.loc[(idx, 'file_owner')]df.loc[(idx, 'ext')]df.loc[(idx, 'last_edit_date')].strftime('%H:%M %d-%m-%Y')df.loc[(idx, 'file')].replace('/', '-'))
-
-Vulnerability 2:
-File: gitnoc/gitnoc/services/metrics.py
- > User input at line 66, trigger word "get(":
- ignore_dir = settings.get('ignore_dir', None)
-Reassigned in:
- File: gitnoc/gitnoc/services/metrics.py
- > Line 71: df = repo.file_detail(extensions=extensions, ignore_dir=ignore_dir)
- File: gitnoc/gitnoc/services/metrics.py
- > Line 72: df = df.reset_index(level=2)
- File: gitnoc/gitnoc/services/metrics.py
- > Line 73: df = df.sort_values(by=['loc'], ascending=False)
-File: gitnoc/gitnoc/services/metrics.py
- > reaches line 76, trigger word "replace(":
- out.append('file_name''loc''owner''extension''last_edit''clean_file_name'df.loc[(idx, 'file')]df.loc[(idx, 'loc')]df.loc[(idx, 'file_owner')]df.loc[(idx, 'ext')]df.loc[(idx, 'last_edit_date')].strftime('%H:%M %d-%m-%Y')df.loc[(idx, 'file')].replace('/', '-'))
-
-
-
-parulsingh/FlaskAppCS194
-https://github.com/parulsingh/FlaskAppCS194
-Entry file: FlaskAppCS194/yelpapp.py
-Scanned: 2016-10-25 14:56:21.372166
-Vulnerability 1:
-File: FlaskAppCS194/yelpapp.py
- > User input at line 89, trigger word "form[":
- reviews = request.form['reviews']
-Reassigned in:
- File: FlaskAppCS194/yelpapp.py
- > Line 90: rating = clf.predictRating(reviews)
-File: FlaskAppCS194/yelpapp.py
- > reaches line 95, trigger word "execute(":
- db.execute('INSERT INTO predictions (lyrics, artist) values (?, ?)', [reviews, str(rating)])
-
-
-
-BeginMan/flask-timing
-https://github.com/BeginMan/flask-timing
-Entry file: flask-timing/app.py
-Scanned: 2016-10-25 14:56:27.593268
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ibininja/upload_file_python
-https://github.com/ibininja/upload_file_python
-Entry file: upload_file_python/src/app_display_multiple_images.py
-Scanned: 2016-10-25 14:56:28.901590
-No vulnerabilities found.
-
-
-fraoustin/flaskserver
-https://github.com/fraoustin/flaskserver
-Entry file: None
-Scanned: 2016-10-25 14:56:30.275553
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver.
-
-yaojf/python3
-https://github.com/yaojf/python3
-Entry file: python3/app.py
-Scanned: 2016-10-25 14:56:32.390376
-Vulnerability 1:
-File: python3/app.py
- > User input at line 17, trigger word "form[":
- username = request.form['username']
-File: python3/app.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('signin-ok.html',username=username)
-
-Vulnerability 2:
-File: python3/app.py
- > User input at line 17, trigger word "form[":
- username = request.form['username']
-File: python3/app.py
- > reaches line 21, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('form.html',message='Bad username or password', username=username)
-
-
-
-pdonorio/restangulask
-https://github.com/pdonorio/restangulask
-Entry file: restangulask/frontend/felask/server.py
-Scanned: 2016-10-25 14:56:38.036810
-Vulnerability 1:
-File: restangulask/frontend/felask/forms.py
- > User input at line 50, trigger word "get(":
- target = get_redirect_target()
-Reassigned in:
- File: restangulask/frontend/felask/forms.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data)
-File: restangulask/frontend/felask/forms.py
- > reaches line 51, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values))
-
-Vulnerability 2:
-File: restangulask/frontend/felask/forms.py
- > User input at line 50, trigger word "get(":
- target = get_redirect_target()
-Reassigned in:
- File: restangulask/frontend/felask/forms.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data)
-File: restangulask/frontend/felask/forms.py
- > reaches line 51, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values))
-
-
-
-CodeSelfStudy/flask_mongoengine_example
-https://github.com/CodeSelfStudy/flask_mongoengine_example
-Entry file: flask_mongoengine_example/app.py
-Scanned: 2016-10-25 14:56:39.361239
-Vulnerability 1:
-File: flask_mongoengine_example/app.py
- > User input at line 20, trigger word "get(":
- page = Page.objects.get(id=page_id)
-File: flask_mongoengine_example/app.py
- > reaches line 21, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('page.html',page=page)
-
-Vulnerability 2:
-File: flask_mongoengine_example/app.py
- > User input at line 34, trigger word "get(":
- profile = Profile.objects.get(id=profile_id)
-File: flask_mongoengine_example/app.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('profiles/profile.html',profile=profile)
-
-
-
-brennv/flaskr-dataset
-https://github.com/brennv/flaskr-dataset
-Entry file: flaskr-dataset/flaskr.py
-Scanned: 2016-10-25 14:56:41.295474
-No vulnerabilities found.
-
-
-weex/basic-flask21
-https://github.com/weex/basic-flask21
-Entry file: basic-flask21/server.py
-Scanned: 2016-10-25 14:56:42.562274
-No vulnerabilities found.
-
-
-c0deTalk/flask-deploy
-https://github.com/c0deTalk/flask-deploy
-Entry file: None
-Scanned: 2016-10-25 14:56:43.816258
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/c0deTalk/flask-deploy.
-
-jinpark/flask-fts
-https://github.com/jinpark/flask-fts
-Entry file: flask-fts/app.py
-Scanned: 2016-10-25 14:56:46.107264
-Vulnerability 1:
-File: flask-fts/app.py
- > User input at line 65, trigger word "form[":
- search_term = request.form['search_term']
-Reassigned in:
- File: flask-fts/app.py
- > Line 66: results = Document.query.search(search_term)
- File: flask-fts/app.py
- > Line 69: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: flask-fts/app.py
- > reaches line 67, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',results=results, search_term=search_term)
-
-Vulnerability 2:
-File: flask-fts/app.py
- > User input at line 74, trigger word "form[":
- search_term = request.form['search_term']
-Reassigned in:
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 79, trigger word "filter(":
- results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term)
-
-Vulnerability 3:
-File: flask-fts/app.py
- > User input at line 75, trigger word "form[":
- distance = request.form['distance']
-Reassigned in:
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 79, trigger word "filter(":
- results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term)
-
-Vulnerability 4:
-File: flask-fts/app.py
- > User input at line 76, trigger word "form[":
- latitude = request.form['latitude']
-Reassigned in:
- File: flask-fts/app.py
- > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326)
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 79, trigger word "filter(":
- results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term)
-
-Vulnerability 5:
-File: flask-fts/app.py
- > User input at line 77, trigger word "form[":
- longitude = request.form['longitude']
-Reassigned in:
- File: flask-fts/app.py
- > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326)
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 79, trigger word "filter(":
- results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term)
-
-Vulnerability 6:
-File: flask-fts/app.py
- > User input at line 74, trigger word "form[":
- search_term = request.form['search_term']
-Reassigned in:
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude)
-
-Vulnerability 7:
-File: flask-fts/app.py
- > User input at line 75, trigger word "form[":
- distance = request.form['distance']
-Reassigned in:
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude)
-
-Vulnerability 8:
-File: flask-fts/app.py
- > User input at line 76, trigger word "form[":
- latitude = request.form['latitude']
-Reassigned in:
- File: flask-fts/app.py
- > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326)
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude)
-
-Vulnerability 9:
-File: flask-fts/app.py
- > User input at line 77, trigger word "form[":
- longitude = request.form['longitude']
-Reassigned in:
- File: flask-fts/app.py
- > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326)
- File: flask-fts/app.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html')
-File: flask-fts/app.py
- > reaches line 80, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude)
-
-
-
-breakbase/flask-cent
-https://github.com/breakbase/flask-cent
-Entry file: flask-cent/tests.py
-Scanned: 2016-10-25 14:56:47.500942
-No vulnerabilities found.
-
-
-ecerami/hello_flask
-https://github.com/ecerami/hello_flask
-Entry file: hello_flask/app.py
-Scanned: 2016-10-25 14:56:48.764316
-No vulnerabilities found.
-
-
-wq1308786830/flaskr
-https://github.com/wq1308786830/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:56:50.635410
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wq1308786830/flaskr.
-
-danparshall/flaskmilestone
-https://github.com/danparshall/flaskmilestone
-Entry file: flaskmilestone/app.py
-Scanned: 2016-10-25 14:56:52.000179
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sabertwilight/flasky
-https://github.com/sabertwilight/flasky
-Entry file: flasky/flasky/app/__init__.py
-Scanned: 2016-10-25 14:56:55.881811
-No vulnerabilities found.
-
-
-jj199611/flaskr
-https://github.com/jj199611/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:56:56.424576
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jj199611/flaskr.
-
-goosling/flaskapp
-https://github.com/goosling/flaskapp
-Entry file: flaskapp/urltest.py
-Scanned: 2016-10-25 14:56:57.719744
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-FredericoVieira/flaskapp
-https://github.com/FredericoVieira/flaskapp
-Entry file: flaskapp/app/__init__.py
-Scanned: 2016-10-25 14:56:59.177336
-Vulnerability 1:
-File: flaskapp/app/insertdata/views.py
- > User input at line 21, trigger word ".data":
- firstName = str(form.firstName.data)
-File: flaskapp/app/insertdata/views.py
- > reaches line 27, trigger word "execute(":
- cursor.execute('INSERT INTO users (firstName, lastName, phone) VALUES ('%s', '%s', '%s')' % (firstName, lastName, phone))
-
-Vulnerability 2:
-File: flaskapp/app/insertdata/views.py
- > User input at line 22, trigger word ".data":
- lastName = str(form.lastName.data)
-File: flaskapp/app/insertdata/views.py
- > reaches line 27, trigger word "execute(":
- cursor.execute('INSERT INTO users (firstName, lastName, phone) VALUES ('%s', '%s', '%s')' % (firstName, lastName, phone))
-
-Vulnerability 3:
-File: flaskapp/app/insertdata/views.py
- > User input at line 23, trigger word ".data":
- phone = str(form.phone.data)
-File: flaskapp/app/insertdata/views.py
- > reaches line 27, trigger word "execute(":
- cursor.execute('INSERT INTO users (firstName, lastName, phone) VALUES ('%s', '%s', '%s')' % (firstName, lastName, phone))
-
-Vulnerability 4:
-File: flaskapp/app/insertdata/views.py
- > User input at line 21, trigger word ".data":
- firstName = str(form.firstName.data)
-File: flaskapp/app/insertdata/views.py
- > reaches line 30, trigger word "flash(":
- flash('Dados inseridos com sucesso! First Name = "%s", Last Name = "%s", Phone = "%s"' % (firstName, lastName, phone))
-
-Vulnerability 5:
-File: flaskapp/app/insertdata/views.py
- > User input at line 22, trigger word ".data":
- lastName = str(form.lastName.data)
-File: flaskapp/app/insertdata/views.py
- > reaches line 30, trigger word "flash(":
- flash('Dados inseridos com sucesso! First Name = "%s", Last Name = "%s", Phone = "%s"' % (firstName, lastName, phone))
-
-Vulnerability 6:
-File: flaskapp/app/insertdata/views.py
- > User input at line 23, trigger word ".data":
- phone = str(form.phone.data)
-File: flaskapp/app/insertdata/views.py
- > reaches line 30, trigger word "flash(":
- flash('Dados inseridos com sucesso! First Name = "%s", Last Name = "%s", Phone = "%s"' % (firstName, lastName, phone))
-
-
-
-dogom/flasky
-https://github.com/dogom/flasky
-Entry file: flasky/hello.py
-Scanned: 2016-10-25 14:57:00.497624
-No vulnerabilities found.
-
-
-alex-marmot/flaskr
-https://github.com/alex-marmot/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:57:01.058126
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/alex-marmot/flaskr.
-
-kai1/flasktest
-https://github.com/kai1/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 14:57:02.627573
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-willianribeiro/flaskr
-https://github.com/willianribeiro/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:57:03.174986
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr.
-
-lz1988/flaskweb
-https://github.com/lz1988/flaskweb
-Entry file: flaskweb/flaskr/flaskr.py
-Scanned: 2016-10-25 14:57:09.411711
-No vulnerabilities found.
-
-
-StuartChristie/Flasky
-https://github.com/StuartChristie/Flasky
-Entry file: Flasky/untitled.py
-Scanned: 2016-10-25 14:57:10.701712
-No vulnerabilities found.
-
-
-buchenglei/flaskr
-https://github.com/buchenglei/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:57:11.223012
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/buchenglei/flaskr.
-
-cteeeri/flaskblueprint
-https://github.com/cteeeri/flaskblueprint
-Entry file: flaskblueprint/app/__init__.py
-Scanned: 2016-10-25 14:57:12.457312
-No vulnerabilities found.
-
-
-KevinFuU/flasky
-https://github.com/KevinFuU/flasky
-Entry file: flasky/hello1.py
-Scanned: 2016-10-25 14:57:14.294197
-Vulnerability 1:
-File: flasky/tests/test_client.py
- > User input at line 22, trigger word "get(":
- response = self.client.get(url_for('main.index'))
-File: flasky/tests/test_client.py
- > reaches line 22, trigger word "url_for(":
- response = self.client.get(url_for('main.index'))
-
-Vulnerability 2:
-File: flasky/tests/test_client.py
- > User input at line 47, trigger word "get(":
- response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 27, trigger word "url_for(":
- response = self.client.post(url_for('auth.register'),data='email''username''password''password2''john@example.com''john''cat''cat')
-
-Vulnerability 3:
-File: flasky/tests/test_client.py
- > User input at line 53, trigger word "get(":
- response = self.client.get(url_for('auth.logout'),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 27, trigger word "url_for(":
- response = self.client.post(url_for('auth.register'),data='email''username''password''password2''john@example.com''john''cat''cat')
-
-Vulnerability 4:
-File: flasky/tests/test_client.py
- > User input at line 47, trigger word "get(":
- response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 36, trigger word "url_for(":
- response = self.client.post(url_for('auth.login'),data='email''password''john@example.com''cat', follow_redirects=True)
-
-Vulnerability 5:
-File: flasky/tests/test_client.py
- > User input at line 53, trigger word "get(":
- response = self.client.get(url_for('auth.logout'),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 36, trigger word "url_for(":
- response = self.client.post(url_for('auth.login'),data='email''password''john@example.com''cat', follow_redirects=True)
-
-Vulnerability 6:
-File: flasky/tests/test_client.py
- > User input at line 47, trigger word "get(":
- response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 47, trigger word "url_for(":
- response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True)
-
-Vulnerability 7:
-File: flasky/tests/test_client.py
- > User input at line 53, trigger word "get(":
- response = self.client.get(url_for('auth.logout'),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 47, trigger word "url_for(":
- response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True)
-
-Vulnerability 8:
-File: flasky/tests/test_client.py
- > User input at line 47, trigger word "get(":
- response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 53, trigger word "url_for(":
- response = self.client.get(url_for('auth.logout'),follow_redirects=True)
-
-Vulnerability 9:
-File: flasky/tests/test_client.py
- > User input at line 53, trigger word "get(":
- response = self.client.get(url_for('auth.logout'),follow_redirects=True)
-File: flasky/tests/test_client.py
- > reaches line 53, trigger word "url_for(":
- response = self.client.get(url_for('auth.logout'),follow_redirects=True)
-
-Vulnerability 10:
-File: flasky/tests/test_api.py
- > User input at line 41, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),content_type='application/json')
-File: flasky/tests/test_api.py
- > reaches line 41, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),content_type='application/json')
-
-Vulnerability 11:
-File: flasky/tests/test_api.py
- > User input at line 55, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'dog'))
-File: flasky/tests/test_api.py
- > reaches line 55, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'dog'))
-
-Vulnerability 12:
-File: flasky/tests/test_api.py
- > User input at line 70, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-File: flasky/tests/test_api.py
- > reaches line 70, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-
-Vulnerability 13:
-File: flasky/tests/test_api.py
- > User input at line 76, trigger word "get(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 70, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-
-Vulnerability 14:
-File: flasky/tests/test_api.py
- > User input at line 80, trigger word ".data":
- json_response = json.loads(response.data.decode('utf-8'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 82: token = json_response['token']
-File: flasky/tests/test_api.py
- > reaches line 70, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-
-Vulnerability 15:
-File: flasky/tests/test_api.py
- > User input at line 85, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-File: flasky/tests/test_api.py
- > reaches line 70, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-
-Vulnerability 16:
-File: flasky/tests/test_api.py
- > User input at line 70, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-File: flasky/tests/test_api.py
- > reaches line 76, trigger word "url_for(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 17:
-File: flasky/tests/test_api.py
- > User input at line 76, trigger word "get(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 76, trigger word "url_for(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 18:
-File: flasky/tests/test_api.py
- > User input at line 80, trigger word ".data":
- json_response = json.loads(response.data.decode('utf-8'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 82: token = json_response['token']
-File: flasky/tests/test_api.py
- > reaches line 76, trigger word "url_for(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 19:
-File: flasky/tests/test_api.py
- > User input at line 85, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-File: flasky/tests/test_api.py
- > reaches line 76, trigger word "url_for(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 20:
-File: flasky/tests/test_api.py
- > User input at line 70, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', ''))
-File: flasky/tests/test_api.py
- > reaches line 85, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-
-Vulnerability 21:
-File: flasky/tests/test_api.py
- > User input at line 76, trigger word "get(":
- response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 85, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-
-Vulnerability 22:
-File: flasky/tests/test_api.py
- > User input at line 80, trigger word ".data":
- json_response = json.loads(response.data.decode('utf-8'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 82: token = json_response['token']
-File: flasky/tests/test_api.py
- > reaches line 85, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-
-Vulnerability 23:
-File: flasky/tests/test_api.py
- > User input at line 85, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-File: flasky/tests/test_api.py
- > reaches line 85, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, ''))
-
-Vulnerability 24:
-File: flasky/tests/test_api.py
- > User input at line 91, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('', ''))
-File: flasky/tests/test_api.py
- > reaches line 91, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('', ''))
-
-Vulnerability 25:
-File: flasky/tests/test_api.py
- > User input at line 106, trigger word "get(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 106, trigger word "url_for(":
- response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 26:
-File: flasky/tests/test_api.py
- > User input at line 133, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 121, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body'''))
-
-Vulnerability 27:
-File: flasky/tests/test_api.py
- > User input at line 137, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 121, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body'''))
-
-Vulnerability 28:
-File: flasky/tests/test_api.py
- > User input at line 149, trigger word "get(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 121, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body'''))
-
-Vulnerability 29:
-File: flasky/tests/test_api.py
- > User input at line 159, trigger word "get(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 121, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body'''))
-
-Vulnerability 30:
-File: flasky/tests/test_api.py
- > User input at line 133, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 128, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post'))
-
-Vulnerability 31:
-File: flasky/tests/test_api.py
- > User input at line 137, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 128, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post'))
-
-Vulnerability 32:
-File: flasky/tests/test_api.py
- > User input at line 149, trigger word "get(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 128, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post'))
-
-Vulnerability 33:
-File: flasky/tests/test_api.py
- > User input at line 159, trigger word "get(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 128, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post'))
-
-Vulnerability 34:
-File: flasky/tests/test_api.py
- > User input at line 133, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 149, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 35:
-File: flasky/tests/test_api.py
- > User input at line 137, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 149, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 36:
-File: flasky/tests/test_api.py
- > User input at line 149, trigger word "get(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 149, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 37:
-File: flasky/tests/test_api.py
- > User input at line 159, trigger word "get(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 149, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 38:
-File: flasky/tests/test_api.py
- > User input at line 133, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 159, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 39:
-File: flasky/tests/test_api.py
- > User input at line 137, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 159, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 40:
-File: flasky/tests/test_api.py
- > User input at line 149, trigger word "get(":
- response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 159, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 41:
-File: flasky/tests/test_api.py
- > User input at line 159, trigger word "get(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
- File: flasky/tests/test_api.py
- > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body'))
-File: flasky/tests/test_api.py
- > reaches line 159, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat'))
-
-Vulnerability 42:
-File: flasky/tests/test_api.py
- > User input at line 191, trigger word "get(":
- response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-File: flasky/tests/test_api.py
- > reaches line 191, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 43:
-File: flasky/tests/test_api.py
- > User input at line 197, trigger word "get(":
- response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-File: flasky/tests/test_api.py
- > reaches line 191, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 44:
-File: flasky/tests/test_api.py
- > User input at line 191, trigger word "get(":
- response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-File: flasky/tests/test_api.py
- > reaches line 197, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 45:
-File: flasky/tests/test_api.py
- > User input at line 197, trigger word "get(":
- response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-File: flasky/tests/test_api.py
- > reaches line 197, trigger word "url_for(":
- response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 46:
-File: flasky/tests/test_api.py
- > User input at line 227, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 221, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!'))
-
-Vulnerability 47:
-File: flasky/tests/test_api.py
- > User input at line 235, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 221, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!'))
-
-Vulnerability 48:
-File: flasky/tests/test_api.py
- > User input at line 250, trigger word "get(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 221, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!'))
-
-Vulnerability 49:
-File: flasky/tests/test_api.py
- > User input at line 259, trigger word "get(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 221, trigger word "url_for(":
- response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!'))
-
-Vulnerability 50:
-File: flasky/tests/test_api.py
- > User input at line 227, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 250, trigger word "url_for(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 51:
-File: flasky/tests/test_api.py
- > User input at line 235, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 250, trigger word "url_for(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 52:
-File: flasky/tests/test_api.py
- > User input at line 250, trigger word "get(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 250, trigger word "url_for(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 53:
-File: flasky/tests/test_api.py
- > User input at line 259, trigger word "get(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 250, trigger word "url_for(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 54:
-File: flasky/tests/test_api.py
- > User input at line 227, trigger word "get(":
- url = response.headers.get('Location')
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 259, trigger word "url_for(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 55:
-File: flasky/tests/test_api.py
- > User input at line 235, trigger word "get(":
- response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 259, trigger word "url_for(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 56:
-File: flasky/tests/test_api.py
- > User input at line 250, trigger word "get(":
- response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 259, trigger word "url_for(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 57:
-File: flasky/tests/test_api.py
- > User input at line 259, trigger word "get(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-Reassigned in:
- File: flasky/tests/test_api.py
- > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat'))
-File: flasky/tests/test_api.py
- > reaches line 259, trigger word "url_for(":
- response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'))
-
-Vulnerability 58:
-File: flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 59:
-File: flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 60:
-File: flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 61:
-File: flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 62:
-File: flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 63:
-File: flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 64:
-File: flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 65:
-File: flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 66:
-File: flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 67:
-File: flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 68:
-File: flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 69:
-File: flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 70:
-File: flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 71:
-File: flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 72:
-File: flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 73:
-File: flasky/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/main/views.py
- > Line 55: posts = pagination.items
- File: flasky/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 74:
-File: flasky/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 45: show_followed = False
- File: flasky/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 75:
-File: flasky/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky/app/main/views.py
- > Line 67: posts = pagination.items
-File: flasky/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 76:
-File: flasky/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flasky/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/main/views.py
- > Line 134: comments = pagination.items
- File: flasky/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flasky/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 77:
-File: flasky/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flasky/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 78:
-File: flasky/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flasky/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 79:
-File: flasky/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky/app/main/views.py
- > Line 246: comments = pagination.items
-File: flasky/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-chipmakk/flaskproject
-https://github.com/chipmakk/flaskproject
-Entry file: flaskproject/server2.py
-Scanned: 2016-10-25 14:57:23.670682
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-githubfun/flaskr
-https://github.com/githubfun/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:57:28.208866
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/githubfun/flaskr.
-
-sachprem/flaskdemosac
-https://github.com/sachprem/flaskdemosac
-Entry file: flaskdemosac/app.py
-Scanned: 2016-10-25 14:57:30.614654
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-joe8767/flaskr
-https://github.com/joe8767/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:57:31.146534
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/joe8767/flaskr.
-
-milinbhakta/flaskmaterialdesign
-https://github.com/milinbhakta/flaskmaterialdesign
-Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-25 14:57:40.314079
-No vulnerabilities found.
-
-
-Hellemos/flaskapp
-https://github.com/Hellemos/flaskapp
-Entry file: flaskapp/routes.py
-Scanned: 2016-10-25 14:57:48.230451
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapp/flaskapp_env/lib/python2.7/sre_compile.py
-
-ssssergey/flaskengine
-https://github.com/ssssergey/flaskengine
-Entry file: flaskengine/app/__init__.py
-Scanned: 2016-10-25 14:57:49.990002
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-davidkurkov/flasktaskr
-https://github.com/davidkurkov/flasktaskr
-Entry file: flasktaskr/views.py
-Scanned: 2016-10-25 14:57:51.398339
-No vulnerabilities found.
-
-
-a1GoXplorer/flaskmodellingpractice
-https://github.com/a1GoXplorer/flaskmodellingpractice
-Entry file: flaskmodellingpractice/flaskr/flaskr.py
-Scanned: 2016-10-25 14:57:58.430752
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskmodellingpractice/flaskr/venv/lib/python2.7/sre_compile.py
-
-stepsame/flaskq
-https://github.com/stepsame/flaskq
-Entry file: flaskq/app/__init__.py
-Scanned: 2016-10-25 14:58:01.987540
-Vulnerability 1:
-File: flaskq/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 16: pagination = user.questions.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 19: questions = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_questions',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskq/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 16: pagination = user.questions.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 19: questions = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_questions',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskq/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 16: pagination = user.questions.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 19: questions = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('questions''prev''next''count'[question.to_json() for question in questions]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskq/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 38: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 41: answers = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_answers',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskq/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 38: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 41: answers = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_user_answers',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskq/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 38: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 41: answers = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('answers''prev''next''count'[answer.to_json() for answer in answers]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskq/app/api_1_0/users.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 60: pagination = user.followed_activities.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 63: activities = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 64: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 68: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 66, trigger word "url_for(":
- prev = url_for('api.get_user_followed_activities',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flaskq/app/api_1_0/users.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 60: pagination = user.followed_activities.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 63: activities = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 64: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 68: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 70, trigger word "url_for(":
- next = url_for('api.get_user_followed_activities',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskq/app/api_1_0/users.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/users.py
- > Line 60: pagination = user.followed_activities.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/users.py
- > Line 63: activities = pagination.items
- File: flaskq/app/api_1_0/users.py
- > Line 64: prev = None
- File: flaskq/app/api_1_0/users.py
- > Line 68: next = None
-File: flaskq/app/api_1_0/users.py
- > reaches line 72, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('activities''prev''next''count'[activity.object.to_json() for activity in activities]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/answers.py
- > Line 12: pagination = Answer.query.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/answers.py
- > Line 15: answers = pagination.items
- File: flaskq/app/api_1_0/answers.py
- > Line 16: prev = None
- File: flaskq/app/api_1_0/answers.py
- > Line 19: next = None
-File: flaskq/app/api_1_0/answers.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_answers',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/answers.py
- > Line 12: pagination = Answer.query.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/answers.py
- > Line 15: answers = pagination.items
- File: flaskq/app/api_1_0/answers.py
- > Line 16: prev = None
- File: flaskq/app/api_1_0/answers.py
- > Line 19: next = None
-File: flaskq/app/api_1_0/answers.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_answers',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/answers.py
- > Line 12: pagination = Answer.query.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/answers.py
- > Line 15: answers = pagination.items
- File: flaskq/app/api_1_0/answers.py
- > Line 16: prev = None
- File: flaskq/app/api_1_0/answers.py
- > Line 19: next = None
-File: flaskq/app/api_1_0/answers.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('answers''prev''next''count'[answer.to_json() for answer in answers]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 32, trigger word "get(":
- answer = Answer.query.get(id)
-File: flaskq/app/api_1_0/answers.py
- > reaches line 33, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(answer.to_json())
-
-Vulnerability 14:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/answers.py
- > Line 40: pagination = question.answers.order_by(Answer.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/answers.py
- > Line 43: answers = pagination.items
- File: flaskq/app/api_1_0/answers.py
- > Line 44: prev = None
- File: flaskq/app/api_1_0/answers.py
- > Line 47: next = None
-File: flaskq/app/api_1_0/answers.py
- > reaches line 46, trigger word "url_for(":
- prev = url_for('api.get_question_answers',page=page - 1, _external=True)
-
-Vulnerability 15:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/answers.py
- > Line 40: pagination = question.answers.order_by(Answer.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/answers.py
- > Line 43: answers = pagination.items
- File: flaskq/app/api_1_0/answers.py
- > Line 44: prev = None
- File: flaskq/app/api_1_0/answers.py
- > Line 47: next = None
-File: flaskq/app/api_1_0/answers.py
- > reaches line 49, trigger word "url_for(":
- next = url_for('api.get_question_answers',page=page + 1, _external=True)
-
-Vulnerability 16:
-File: flaskq/app/api_1_0/answers.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/answers.py
- > Line 40: pagination = question.answers.order_by(Answer.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/answers.py
- > Line 43: answers = pagination.items
- File: flaskq/app/api_1_0/answers.py
- > Line 44: prev = None
- File: flaskq/app/api_1_0/answers.py
- > Line 47: next = None
-File: flaskq/app/api_1_0/answers.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('answers''prev''next''count'[answer.to_json() for answer in answers]prevnextpagination.total)
-
-Vulnerability 17:
-File: flaskq/app/api_1_0/questions.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/questions.py
- > Line 12: pagination = Question.query.paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/questions.py
- > Line 15: questions = pagination.items
- File: flaskq/app/api_1_0/questions.py
- > Line 16: prev = None
- File: flaskq/app/api_1_0/questions.py
- > Line 19: next = None
-File: flaskq/app/api_1_0/questions.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_questions',page=page - 1, _external=True)
-
-Vulnerability 18:
-File: flaskq/app/api_1_0/questions.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/questions.py
- > Line 12: pagination = Question.query.paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/questions.py
- > Line 15: questions = pagination.items
- File: flaskq/app/api_1_0/questions.py
- > Line 16: prev = None
- File: flaskq/app/api_1_0/questions.py
- > Line 19: next = None
-File: flaskq/app/api_1_0/questions.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_questions',page=page + 1, _external=True)
-
-Vulnerability 19:
-File: flaskq/app/api_1_0/questions.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/questions.py
- > Line 12: pagination = Question.query.paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/questions.py
- > Line 15: questions = pagination.items
- File: flaskq/app/api_1_0/questions.py
- > Line 16: prev = None
- File: flaskq/app/api_1_0/questions.py
- > Line 19: next = None
-File: flaskq/app/api_1_0/questions.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('questions''prev''next''count'[question.to_json() for question in questions]prevnextpagination.total)
-
-Vulnerability 20:
-File: flaskq/app/api_1_0/questions.py
- > User input at line 32, trigger word "get(":
- question = Question.query.get(id)
-File: flaskq/app/api_1_0/questions.py
- > reaches line 33, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(question.to_json())
-
-Vulnerability 21:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 22:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 23:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 24:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 39: pagination = question.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_question_comments',page=page - 1, _external=True)
-
-Vulnerability 25:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 39: pagination = question.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_question_comments',page=page + 1, _external=True)
-
-Vulnerability 26:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 39: pagination = question.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 27:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 60, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 61: pagination = answer.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 64: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 65: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 68: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 67, trigger word "url_for(":
- prev = url_for('api.get_answer_comments',page=page - 1, _external=True)
-
-Vulnerability 28:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 60, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 61: pagination = answer.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 64: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 65: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 68: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 70, trigger word "url_for(":
- next = url_for('api.get_answer_comments',page=page + 1, _external=True)
-
-Vulnerability 29:
-File: flaskq/app/api_1_0/comments.py
- > User input at line 60, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/api_1_0/comments.py
- > Line 61: pagination = answer.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskq/app/api_1_0/comments.py
- > Line 64: comments = pagination.items
- File: flaskq/app/api_1_0/comments.py
- > Line 65: prev = None
- File: flaskq/app/api_1_0/comments.py
- > Line 68: next = None
-File: flaskq/app/api_1_0/comments.py
- > reaches line 71, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 30:
-File: flaskq/app/main/views.py
- > User input at line 52, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/main/views.py
- > Line 60: pagination = query.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False)
- File: flaskq/app/main/views.py
- > Line 63: activities = pagination.items
- File: flaskq/app/main/views.py
- > Line 51: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskq/app/main/views.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, activities=activities, show_followed=show_followed, pagination=pagination, comment_form=comment_form)
-
-Vulnerability 31:
-File: flaskq/app/main/views.py
- > User input at line 55, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskq/app/main/views.py
- > Line 53: show_followed = False
- File: flaskq/app/main/views.py
- > Line 51: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskq/app/main/views.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, activities=activities, show_followed=show_followed, pagination=pagination, comment_form=comment_form)
-
-Vulnerability 32:
-File: flaskq/app/main/views.py
- > User input at line 74, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/main/views.py
- > Line 75: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page=page, per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/main/views.py
- > Line 78: answers = pagination.items
-File: flaskq/app/main/views.py
- > reaches line 79, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, answers=answers, pagination=pagination, profile=True)
-
-Vulnerability 33:
-File: flaskq/app/main/views.py
- > User input at line 131, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/main/views.py
- > Line 132: pagination = question.answers.order_by(Answer.ranking.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/main/views.py
- > Line 135: answers = pagination.items
-File: flaskq/app/main/views.py
- > reaches line 136, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('question.html',questions=[question], answers=answers, pagination=pagination)
-
-Vulnerability 34:
-File: flaskq/app/main/views.py
- > User input at line 248, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/main/views.py
- > Line 249: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKQ_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/main/views.py
- > Line 252: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskq/app/main/views.py
- > Line 247: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskq/app/main/views.py
- > reaches line 254, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Follwers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 35:
-File: flaskq/app/main/views.py
- > User input at line 266, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskq/app/main/views.py
- > Line 267: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKQ_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskq/app/main/views.py
- > Line 270: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskq/app/main/views.py
- > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskq/app/main/views.py
- > reaches line 272, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Follwed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 36:
-File: flaskq/app/main/views.py
- > User input at line 339, trigger word "get(":
- q = request.args.get('q')
-File: flaskq/app/main/views.py
- > reaches line 340, trigger word "filter(":
- questions = Question.query.filter(Question.body.like('%' + q + '%')).all()
-
-Vulnerability 37:
-File: flaskq/app/main/views.py
- > User input at line 339, trigger word "get(":
- q = request.args.get('q')
-File: flaskq/app/main/views.py
- > reaches line 341, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('results.html',questions=questions, q=q)
-
-
-
-rschmidtz/flaskbook
-https://github.com/rschmidtz/flaskbook
-Entry file: flaskbook/book/__init__.py
-Scanned: 2016-10-25 14:58:04.887903
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-vincent-fei/flaskr
-https://github.com/vincent-fei/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:58:05.451470
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vincent-fei/flaskr.
-
-milinbhakta/flaskjinja
-https://github.com/milinbhakta/flaskjinja
-Entry file: flaskjinja/hello.py
-Scanned: 2016-10-25 14:58:15.328086
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-chouisbo/flaskdemo
-https://github.com/chouisbo/flaskdemo
-Entry file: flaskdemo/app/app.py
-Scanned: 2016-10-25 14:58:17.258596
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-saucecode/flaskcat
-https://github.com/saucecode/flaskcat
-Entry file: flaskcat/flaskcat.py
-Scanned: 2016-10-25 14:58:18.549245
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wiggitywalt/flasktaskr
-https://github.com/wiggitywalt/flasktaskr
-Entry file: flasktaskr/project/__init__.py
-Scanned: 2016-10-25 14:58:25.133556
-No vulnerabilities found.
-
-
-mcruger/flaskr
-https://github.com/mcruger/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:58:25.644123
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mcruger/flaskr.
-
-zerodaemon/flaskr
-https://github.com/zerodaemon/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:58:26.153462
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zerodaemon/flaskr.
-
-jalp/flaskscaffolding
-https://github.com/jalp/flaskscaffolding
-Entry file: None
-Scanned: 2016-10-25 14:58:27.405492
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jalp/flaskscaffolding.
-
-vbidin/flasktest
-https://github.com/vbidin/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-25 14:58:33.992939
-Vulnerability 1:
-File: flasktest/app/auth/controllers.py
- > User input at line 19, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: flasktest/app/auth/controllers.py
- > Line 21: session['user_id'] = user.id
-File: flasktest/app/auth/controllers.py
- > reaches line 22, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-xuxiaoxing/flaskweb
-https://github.com/xuxiaoxing/flaskweb
-Entry file: flaskweb/app.py
-Scanned: 2016-10-25 14:58:35.316239
-No vulnerabilities found.
-
-
-ashishkx/Flaskr
-https://github.com/ashishkx/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-25 14:58:36.581360
-No vulnerabilities found.
-
-
-jward1/flasktaskr
-https://github.com/jward1/flasktaskr
-Entry file: flasktaskr/flasktaskr_project/project/__init__.py
-Scanned: 2016-10-25 14:58:38.106621
-No vulnerabilities found.
-
-
-mediocrecheng/flaskr
-https://github.com/mediocrecheng/flaskr
-Entry file: None
-Scanned: 2016-10-25 14:58:38.619317
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mediocrecheng/flaskr.
-
-huiyaoren/Flasky
-https://github.com/huiyaoren/Flasky
-Entry file: Flasky/flasky.py
-Scanned: 2016-10-25 14:58:46.865417
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-brucepei/flasky
-https://github.com/brucepei/flasky
-Entry file: flasky/TBD.py
-Scanned: 2016-10-25 14:58:51.605520
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ihoegen/Flask-Login-App-Tutorial
-https://github.com/ihoegen/Flask-Login-App-Tutorial
-Entry file: Flask-Login-App-Tutorial/__init__.py
-Scanned: 2016-10-25 14:58:53.377568
-No vulnerabilities found.
-
-
-singingwolfboy/flask-dance-slack
-https://github.com/singingwolfboy/flask-dance-slack
-Entry file: flask-dance-slack/slack.py
-Scanned: 2016-10-25 14:58:54.711884
-No vulnerabilities found.
-
-
-schoolofcode-me/web_blog
-https://github.com/schoolofcode-me/web_blog
-Entry file: web_blog/src/app.py
-Scanned: 2016-10-25 14:58:56.093223
-No vulnerabilities found.
-
-
-ciarancourtney/flaskApp
-https://github.com/ciarancourtney/flaskApp
-Entry file: flaskApp/flaskApp/flaskApp/app.py
-Scanned: 2016-10-25 14:59:06.343598
-Vulnerability 1:
-File: flaskApp/flaskApp/flaskApp/public/views.py
- > User input at line 30, trigger word "get(":
- redirect_url = request.args.get('next') or url_for('user.members')
-Reassigned in:
- File: flaskApp/flaskApp/flaskApp/public/views.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('public/home.html',form=form)
-File: flaskApp/flaskApp/flaskApp/public/views.py
- > reaches line 30, trigger word "url_for(":
- redirect_url = request.args.get('next') or url_for('user.members')
-
-Vulnerability 2:
-File: flaskApp/flaskApp/flaskApp/public/views.py
- > User input at line 30, trigger word "get(":
- redirect_url = request.args.get('next') or url_for('user.members')
-Reassigned in:
- File: flaskApp/flaskApp/flaskApp/public/views.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('public/home.html',form=form)
-File: flaskApp/flaskApp/flaskApp/public/views.py
- > reaches line 31, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(redirect_url)
-
-
-
-SunnyYun/flaskBlog
-https://github.com/SunnyYun/flaskBlog
-Entry file: flaskBlog/src/blog.py
-Scanned: 2016-10-25 14:59:07.662769
-No vulnerabilities found.
-
-
-Schwusch/FlaskApp
-https://github.com/Schwusch/FlaskApp
-Entry file: FlaskApp/__init__.py
-Scanned: 2016-10-25 14:59:14.631096
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-JenniferSpry/FlaskVersuch
-https://github.com/JenniferSpry/FlaskVersuch
-Entry file: FlaskVersuch/hello.py
-Scanned: 2016-10-25 14:59:15.936535
-No vulnerabilities found.
-
-
-arpm/FlaskTaskr
-https://github.com/arpm/FlaskTaskr
-Entry file: None
-Scanned: 2016-10-25 14:59:17.276173
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/arpm/FlaskTaskr.
-
-ottercoder/FlaskTest
-https://github.com/ottercoder/FlaskTest
-Entry file: FlaskTest/FlaskWebApp/FlaskWebApp/FlaskWebApp/__init__.py
-Scanned: 2016-10-25 14:59:25.128446
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-amyguobunny/FlaskHeroku
-https://github.com/amyguobunny/FlaskHeroku
-Entry file: FlaskHeroku/app5.py
-Scanned: 2016-10-25 14:59:26.469946
-No vulnerabilities found.
-
-
-mwang87/FlaskTemplate
-https://github.com/mwang87/FlaskTemplate
-Entry file: FlaskTemplate/webserver.py
-Scanned: 2016-10-25 14:59:27.705664
-No vulnerabilities found.
-
-
-iKalin/flask1
-https://github.com/iKalin/flask1
-Entry file: flask1/routes.py
-Scanned: 2016-10-25 14:59:35.257730
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-graphql-python/flask-graphql
-https://github.com/graphql-python/flask-graphql
-Entry file: flask-graphql/tests/app.py
-Scanned: 2016-10-25 14:59:39.641792
-Vulnerability 1:
-File: flask-graphql/tests/test_graphiqlview.py
- > User input at line 13, trigger word "get(":
- response = client.get(url_for('graphql'),headers='Accept''text/html')
-File: flask-graphql/tests/test_graphiqlview.py
- > reaches line 13, trigger word "url_for(":
- response = client.get(url_for('graphql'),headers='Accept''text/html')
-
-
-
-hhstore/flask-annotated
-https://github.com/hhstore/flask-annotated
-Entry file: flask-annotated/flask-0.5/flask/module.py
-Scanned: 2016-10-25 14:59:42.354503
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhiliang729/flask
-https://github.com/zhiliang729/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:43.359806
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-suzf/Flask
-https://github.com/suzf/Flask
-Entry file: None
-Scanned: 2016-10-25 14:59:43.876495
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-charanjp/flask
-https://github.com/charanjp/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:44.446550
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yasskh/flask
-https://github.com/yasskh/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:44.970004
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-goodyvn/flask
-https://github.com/goodyvn/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:45.472579
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-prakxys/flask
-https://github.com/prakxys/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:46.026988
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-galacticpy/flask
-https://github.com/galacticpy/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:46.621175
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-buntyke/Flask
-https://github.com/buntyke/Flask
-Entry file: None
-Scanned: 2016-10-25 14:59:47.163521
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-poxstone/flask
-https://github.com/poxstone/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:47.671865
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-FlaskTutorial/Flask
-https://github.com/FlaskTutorial/Flask
-Entry file: None
-Scanned: 2016-10-25 14:59:48.212145
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-OnlySHI/flask
-https://github.com/OnlySHI/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:48.710578
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-iFe1er/flask
-https://github.com/iFe1er/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:49.245717
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stevebannon/flask
-https://github.com/stevebannon/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:49.750336
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-b-e/flask
-https://github.com/b-e/flask
-Entry file: None
-Scanned: 2016-10-25 14:59:52.247751
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sebkouba/dynamic-flask-form
-https://github.com/sebkouba/dynamic-flask-form
-Entry file: dynamic-flask-form/multimodel.py
-Scanned: 2016-10-25 14:59:53.468216
-No vulnerabilities found.
-
-
-psuong/FlaskWorkshop
-https://github.com/psuong/FlaskWorkshop
-Entry file: FlaskWorkshop/output-string/app.py
-Scanned: 2016-10-25 14:59:55.905495
-No vulnerabilities found.
-
-
-jvuori/flask-uwsgi-nginx-haproxy-docker
-https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker
-Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py
-Scanned: 2016-10-25 14:59:57.211760
-No vulnerabilities found.
-
-
-BLKStone/flask_image_search
-https://github.com/BLKStone/flask_image_search
-Entry file: flask_image_search/app/app.py
-Scanned: 2016-10-25 15:00:14.133536
-No vulnerabilities found.
-
-
-yj0914/flask-
-https://github.com/yj0914/flask-
-Entry file: flask-/num1.py
-Scanned: 2016-10-25 15:00:16.483889
-No vulnerabilities found.
-
-
-Bleezworld/flask_skeleton
-https://github.com/Bleezworld/flask_skeleton
-Entry file: flask_skeleton/serveur/__init__.py
-Scanned: 2016-10-25 15:00:20.280691
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-akupara/flask_inspector
-https://github.com/akupara/flask_inspector
-Entry file: flask_inspector/example/app.py
-Scanned: 2016-10-25 15:00:22.748604
-No vulnerabilities found.
-
-
-jarogers095/flask-hello-world
-https://github.com/jarogers095/flask-hello-world
-Entry file: flask-hello-world/app.py
-Scanned: 2016-10-25 15:00:33.993678
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/env/lib/python3.4/operator.py
-
-alex-paterson/Barebones-Flask-and-Caffe-Classifier
-https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier
-Entry file: Barebones-Flask-and-Caffe-Classifier/app.py
-Scanned: 2016-10-25 15:00:39.077357
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-drone-demos/drone-with-python
-https://github.com/drone-demos/drone-with-python
-Entry file: drone-with-python/dronedemo/main.py
-Scanned: 2016-10-25 15:00:40.439133
-No vulnerabilities found.
-
-
-TwilioDevEd/lead-alerts-flask
-https://github.com/TwilioDevEd/lead-alerts-flask
-Entry file: None
-Scanned: 2016-10-25 15:00:45.327763
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask.
-
-soasme/flask-personal-access-token
-https://github.com/soasme/flask-personal-access-token
-Entry file: flask-personal-access-token/example.py
-Scanned: 2016-10-25 15:00:49.474830
-Vulnerability 1:
-File: flask-personal-access-token/flask_personal_access_token/admin.py
- > User input at line 18, trigger word "get(":
- render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_API_PREFIX')current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_PREFIX')current_app.config.get('DEBUG')
-File: flask-personal-access-token/flask_personal_access_token/admin.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/personal_access_token/index.html',render_data)
-
-
-
-soasme/flask-perm
-https://github.com/soasme/flask-perm
-Entry file: flask-perm/example.py
-Scanned: 2016-10-25 15:00:54.299054
-Vulnerability 1:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 68, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 68, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'))
-
-Vulnerability 2:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 73, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}')
-File: flask-perm/tests/test_blueprint.py
- > reaches line 73, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}')
-
-Vulnerability 3:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 80, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 80, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id'])
-
-Vulnerability 4:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 87, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 87, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-
-Vulnerability 5:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 121, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 114, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.delete_permission',permission_id=permission['id']))
-
-Vulnerability 6:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 121, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 121, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-
-Vulnerability 7:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 172, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 171: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 173, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.revoke_user_permission',user_permission_id=id))
-
-Vulnerability 8:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 188, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 187: resp = add_user_group_permission(client, user_group['id'], permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 189, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.revoke_user_group_permission',user_group_permission_id=id))
-
-Vulnerability 9:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 199, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}')
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 198: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 199, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}')
-
-Vulnerability 10:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 210, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 209: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 210, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-
-Vulnerability 11:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 221, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}')
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 220: resp = add_user_group_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 221, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}')
-
-Vulnerability 12:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 232, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 231: resp = add_user_group_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 232, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-
-Vulnerability 13:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 245, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_groups'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 245, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_groups'))
-
-Vulnerability 14:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 280, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 279: resp = add_user_group_member(client, 1, user_group['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 281, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.delete_user_from_user_group',user_group_member_id=id))
-
-Vulnerability 15:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 291, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 291, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id'])
-
-Vulnerability 16:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 304, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_users'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 304, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_users'))
-
-Vulnerability 17:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 309, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user',user_id=1))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 309, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user',user_id=1))
-
-Vulnerability 18:
-File: flask-perm/flask_perm/admin.py
- > User input at line 12, trigger word "get(":
- render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERM_ADMIN_PREFIX') + '/api'current_app.config.get('PERM_ADMIN_PREFIX')current_app.config.get('DEBUG')
-Reassigned in:
- File: flask-perm/flask_perm/admin.py
- > Line 10: ret_MAYBE_FUNCTION_NAME = redirect(url_for('perm-admin.login'))
-File: flask-perm/flask_perm/admin.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/perm-admin/index.html',render_data)
-
-
-
-amirziai/sklearnflask
-https://github.com/amirziai/sklearnflask
-Entry file: sklearnflask/main.py
-Scanned: 2016-10-25 15:00:55.929335
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-willianribeiro/flaskr
-https://github.com/willianribeiro/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:00:56.471432
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr.
-
-expersso/flaskr
-https://github.com/expersso/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:00:56.990482
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/expersso/flaskr.
-
-tehasdf/flaskexample
-https://github.com/tehasdf/flaskexample
-Entry file: flaskexample/flaskexample/app.py
-Scanned: 2016-10-25 15:00:58.398896
-No vulnerabilities found.
-
-
-sanghyunjooPurdue/flaskr
-https://github.com/sanghyunjooPurdue/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:00:58.946164
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanghyunjooPurdue/flaskr.
-
-becsully/flasktest
-https://github.com/becsully/flasktest
-Entry file: flasktest/mysite/__init__.py
-Scanned: 2016-10-25 15:01:10.672556
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Duncodes/flasky
-https://github.com/Duncodes/flasky
-Entry file: flasky/flaskapp.py
-Scanned: 2016-10-25 15:01:12.538418
-Vulnerability 1:
-File: flasky/flaskapp.py
- > User input at line 97, trigger word ".data":
- question = form.question.data
-Reassigned in:
- File: flasky/flaskapp.py
- > Line 99: kamau = Questions(id, title, question, answer)
- File: flasky/flaskapp.py
- > Line 93: ret_MAYBE_FUNCTION_NAME = render_template('createquestion.html',form=form)
-File: flasky/flaskapp.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('createdquestion.html',question=question)
-
-
-
-gileez/flasker
-https://github.com/gileez/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-25 15:01:14.146909
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-fengyc/flasky
-https://github.com/fengyc/flasky
-Entry file: flasky/flasky/__init__.py
-Scanned: 2016-10-25 15:01:16.427808
-Vulnerability 1:
-File: flasky/flasky/main/views.py
- > User input at line 15, trigger word "get(":
- user_agent = request.headers.get('User-Agent')
-Reassigned in:
- File: flasky/flasky/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky/flasky/main/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.datetime.utcnow(), form=form, name=session.get('name'), known=session.get('known', False))
-
-
-
-sshimp/flasktaskr
-https://github.com/sshimp/flasktaskr
-Entry file: flasktaskr/views.py
-Scanned: 2016-10-25 15:01:18.272609
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-solutionspecialist/flaskr
-https://github.com/solutionspecialist/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:18.810093
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/solutionspecialist/flaskr.
-
-XingxinLi/flaskr
-https://github.com/XingxinLi/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:19.343448
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/XingxinLi/flaskr.
-
-rishipuri/flasktodo
-https://github.com/rishipuri/flasktodo
-Entry file: flasktodo/flasktodo.py
-Scanned: 2016-10-25 15:01:20.644102
-No vulnerabilities found.
-
-
-shinycoo/flaskmvcsample
-https://github.com/shinycoo/flaskmvcsample
-Entry file: flaskmvcsample/app.py
-Scanned: 2016-10-25 15:01:21.933672
-No vulnerabilities found.
-
-
-Hyvjan/flasktaskr
-https://github.com/Hyvjan/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:29.823044
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alexwilkerson/flasktaskr
-https://github.com/alexwilkerson/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:30.355286
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zachary-russell/Flaskr
-https://github.com/zachary-russell/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-25 15:01:31.680424
-No vulnerabilities found.
-
-
-sharma-abhi/flaskr
-https://github.com/sharma-abhi/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:32.207089
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sharma-abhi/flaskr.
-
-kwikiel/flaskr
-https://github.com/kwikiel/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:32.731716
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kwikiel/flaskr.
-
-storress/Flaskserver
-https://github.com/storress/Flaskserver
-Entry file: Flaskserver/main.py
-Scanned: 2016-10-25 15:01:34.031296
-No vulnerabilities found.
-
-
-dadasoz-cuelogic/flaskapp
-https://github.com/dadasoz-cuelogic/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:01:35.406645
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp.
-
-nickaustinlee/flasktaskr
-https://github.com/nickaustinlee/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:35.940071
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SFurnace/flaskr
-https://github.com/SFurnace/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:36.480890
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SFurnace/flaskr.
-
-diegogslomp/flaskr
-https://github.com/diegogslomp/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:36.997678
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/diegogslomp/flaskr.
-
-wiggitywalt/flasktaskr
-https://github.com/wiggitywalt/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:37.501945
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-apeete/flasktaskr
-https://github.com/apeete/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:38.036602
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sindhus/flaskr
-https://github.com/sindhus/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:40.548440
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flaskr.
-
-mg6/flaskr
-https://github.com/mg6/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:41.068460
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mg6/flaskr.
-
-sourHobbes/flaskdemo
-https://github.com/sourHobbes/flaskdemo
-Entry file: flaskdemo/main.py
-Scanned: 2016-10-25 15:01:54.217040
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Bayaz/flasktaskr
-https://github.com/Bayaz/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:54.786796
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-noamoss/flasktaskr
-https://github.com/noamoss/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:55.308322
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-xavinso/flasktaskr
-https://github.com/xavinso/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:01:56.832366
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CharlieWinters/flaskapi
-https://github.com/CharlieWinters/flaskapi
-Entry file: flaskapi/aydaapi4.py
-Scanned: 2016-10-25 15:02:05.766967
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/sre_compile.py
-
-kewsie/flasky
-https://github.com/kewsie/flasky
-Entry file: flasky/venv/Lib/site-packages/flask_sqlalchemy/__init__.py
-Scanned: 2016-10-25 15:02:14.452846
-No vulnerabilities found.
-
-
-slippers/flasksec
-https://github.com/slippers/flasksec
-Entry file: flasksec/main/__init__.py
-Scanned: 2016-10-25 15:02:15.854989
-No vulnerabilities found.
-
-
-metakermit/resin-home-automator
-https://github.com/metakermit/resin-home-automator
-Entry file: resin-home-automator/src/main.py
-Scanned: 2016-10-25 15:02:18.503433
-No vulnerabilities found.
-
-
-AxoSal/GAE-Flask-React-skeleton
-https://github.com/AxoSal/GAE-Flask-React-skeleton
-Entry file: GAE-Flask-React-skeleton/main.py
-Scanned: 2016-10-25 15:02:22.963866
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-rui7157/Flask-NvRay-Blog
-https://github.com/rui7157/Flask-NvRay-Blog
-Entry file: Flask-NvRay-Blog/app/__init__.py
-Scanned: 2016-10-25 15:02:30.859244
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Ineeza/FlaskAppBuilder
-https://github.com/Ineeza/FlaskAppBuilder
-Entry file: FlaskAppBuilder/src/classes/__init__.py
-Scanned: 2016-10-25 15:02:32.307551
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-arose13/HerokuCondaScipyFlaskApp
-https://github.com/arose13/HerokuCondaScipyFlaskApp
-Entry file: HerokuCondaScipyFlaskApp/Web/app.py
-Scanned: 2016-10-25 15:02:33.570419
-No vulnerabilities found.
-
-
-junniepat/FlaskApp
-https://github.com/junniepat/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-25 15:02:34.837023
-No vulnerabilities found.
-
-
-YoungGer/FlaskApps
-https://github.com/YoungGer/FlaskApps
-Entry file: FlaskApps/helloWorld/hello.py
-Scanned: 2016-10-25 15:02:37.024130
-No vulnerabilities found.
-
-
-jrballot/FlaskTaskr
-https://github.com/jrballot/FlaskTaskr
-Entry file: None
-Scanned: 2016-10-25 15:02:37.535642
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrballot/FlaskTaskr.
-
-AnshuOnGit/FlaskServices
-https://github.com/AnshuOnGit/FlaskServices
-Entry file: FlaskServices/read_file.py
-Scanned: 2016-10-25 15:02:44.163462
-Vulnerability 1:
-File: FlaskServices/read_file.py
- > User input at line 40, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/read_file.py
- > Line 44: filename = secure_filename(file.filename)
-File: FlaskServices/read_file.py
- > reaches line 50, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: FlaskServices/read_file.py
- > User input at line 40, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/read_file.py
- > Line 44: filename = secure_filename(file.filename)
-File: FlaskServices/read_file.py
- > reaches line 50, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 3:
-File: FlaskServices/uploads/read_file.py
- > User input at line 50, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/uploads/read_file.py
- > Line 54: filename = secure_filename(file.filename)
-File: FlaskServices/uploads/read_file.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 4:
-File: FlaskServices/uploads/read_file.py
- > User input at line 50, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/uploads/read_file.py
- > Line 54: filename = secure_filename(file.filename)
-File: FlaskServices/uploads/read_file.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-ftanevski4/FlaskPycharm
-https://github.com/ftanevski4/FlaskPycharm
-Entry file: FlaskPycharm/FlaskPycharm.py
-Scanned: 2016-10-25 15:02:45.482755
-No vulnerabilities found.
-
-
-guiti1/FlaskAp
-https://github.com/guiti1/FlaskAp
-Entry file: FlaskAp/FlaskApp/__init__.py
-Scanned: 2016-10-25 15:02:52.444175
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/sre_compile.py
-
-yasskh/FlaskProject
-https://github.com/yasskh/FlaskProject
-Entry file: FlaskProject/views.py
-Scanned: 2016-10-25 15:03:02.744268
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zerodaemon/flask1
-https://github.com/zerodaemon/flask1
-Entry file: flask1/flaskr.py
-Scanned: 2016-10-25 15:03:04.084414
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-DamithaPerera/FlaskApp
-https://github.com/DamithaPerera/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-25 15:03:05.386139
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-dreammis/Flask02
-https://github.com/dreammis/Flask02
-Entry file: Flask02/app/__init__.py
-Scanned: 2016-10-25 15:03:06.665386
-No vulnerabilities found.
-
-
-JoshLandry/FlaskBlog
-https://github.com/JoshLandry/FlaskBlog
-Entry file: FlaskBlog/Flask_Blog/__init__.py
-Scanned: 2016-10-25 15:03:10.685240
-Vulnerability 1:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 187, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 190: newEntry = BlogEntry(user=current_user, title=title, entry=entry, rating=rating, artist=artist, tags=tags)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 193, trigger word "flash(":
- flash('Stored entry: '{}''.format(title))
-
-Vulnerability 2:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 221, trigger word ".data":
- user = User.get_by_username(form.username.data)
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 224, trigger word "flash(":
- flash('Logged in successfully as {}.'.format(user.username))
-
-Vulnerability 3:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 221, trigger word ".data":
- user = User.get_by_username(form.username.data)
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 225, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username))
-
-Vulnerability 4:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 221, trigger word ".data":
- user = User.get_by_username(form.username.data)
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 225, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username))
-
-Vulnerability 5:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 238, trigger word ".data":
- user = User(email=form.email.data, username=form.username.data, password=form.password.data)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 243, trigger word "flash(":
- flash('Welcome, {}! Please login.'.format(user.username))
-
-
-
-Bayaz/FlaskBlog
-https://github.com/Bayaz/FlaskBlog
-Entry file: FlaskBlog/blog.py
-Scanned: 2016-10-25 15:03:11.984607
-No vulnerabilities found.
-
-
-apeete/flaskBlog
-https://github.com/apeete/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-25 15:03:19.060499
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/sre_compile.py
-
-land-pack/flaskBlog
-https://github.com/land-pack/flaskBlog
-Entry file: flaskBlog/flaskr.py
-Scanned: 2016-10-25 15:03:20.354814
-No vulnerabilities found.
-
-
-colindjk/flaskTest
-https://github.com/colindjk/flaskTest
-Entry file: flaskTest/app.py
-Scanned: 2016-10-25 15:03:21.826485
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yukoga/flasksample1
-https://github.com/yukoga/flasksample1
-Entry file: flasksample1/hello.py
-Scanned: 2016-10-25 15:03:23.096972
-No vulnerabilities found.
-
-
-deyoppe/FlaskFire
-https://github.com/deyoppe/FlaskFire
-Entry file: FlaskFire/core/system/app.py
-Scanned: 2016-10-25 15:03:24.448058
-No vulnerabilities found.
-
-
-Njsao/FlaskServer
-https://github.com/Njsao/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-25 15:03:25.833325
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Arsh23/random-crossword-generater
-https://github.com/Arsh23/random-crossword-generater
-Entry file: random-crossword-generater/app.py
-Scanned: 2016-10-25 15:03:29.583995
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-OscarMelin/learning-flask-bootstrap
-https://github.com/OscarMelin/learning-flask-bootstrap
-Entry file: learning-flask-bootstrap/__init__.py
-Scanned: 2016-10-25 15:03:38.004615
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/sre_compile.py
-
-allianRoman/flask-intro
-https://github.com/allianRoman/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 15:03:39.810410
-No vulnerabilities found.
-
-
-hunt3ri/temp-flask
-https://github.com/hunt3ri/temp-flask
-Entry file: temp-flask/app/__init__.py
-Scanned: 2016-10-25 15:03:41.299112
-No vulnerabilities found.
-
-
-noamoss/flask-blog
-https://github.com/noamoss/flask-blog
-Entry file: flask-blog/blog.py
-Scanned: 2016-10-25 15:03:42.596054
-No vulnerabilities found.
-
-
-hnb2/flask-customers
-https://github.com/hnb2/flask-customers
-Entry file: flask-customers/customers/__init__.py
-Scanned: 2016-10-25 15:03:44.051128
-Vulnerability 1:
-File: flask-customers/customers/back/view.py
- > User input at line 71, trigger word ".data":
- customer = Customer(email=form.email.data, password=AdminCustomer._generate_password())
-Reassigned in:
- File: flask-customers/customers/back/view.py
- > Line 69: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/back/view.py
- > reaches line 82, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(customer=customer.json)
-
-Vulnerability 2:
-File: flask-customers/customers/back/view.py
- > User input at line 147, trigger word ".data":
- page = form.page.data
-Reassigned in:
- File: flask-customers/customers/back/view.py
- > Line 151: start = page * CustomerService.RESULTS_PER_PAGE
- File: flask-customers/customers/back/view.py
- > Line 152: stop = start + CustomerService.RESULTS_PER_PAGE
- File: flask-customers/customers/back/view.py
- > Line 154: raw_customers = CustomerService.get_customers(start=start, stop=stop)
- File: flask-customers/customers/back/view.py
- > Line 145: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/back/view.py
- > reaches line 159, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(current_page=page, total_pages=int(total_pages), customers=[customer.json for customer in raw_customers])
-
-Vulnerability 3:
-File: flask-customers/customers/front/view.py
- > User input at line 32, trigger word ".data":
- customer = Customer(email=form.email.data, password=form.password.data)
-Reassigned in:
- File: flask-customers/customers/front/view.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/front/view.py
- > reaches line 39, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(id=customer.id)
-
-
-
-raindrop4steven/tornadoFlask
-https://github.com/raindrop4steven/tornadoFlask
-Entry file: tornadoFlask/hello.py
-Scanned: 2016-10-25 15:03:45.351303
-No vulnerabilities found.
-
-
-samwuu/flask_demo
-https://github.com/samwuu/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-25 15:03:46.805619
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Jiezhi/HelloFlask
-https://github.com/Jiezhi/HelloFlask
-Entry file: HelloFlask/my_app/__init__.py
-Scanned: 2016-10-25 15:03:48.338960
-Vulnerability 1:
-File: HelloFlask/my_app/product/views.py
- > User input at line 16, trigger word "get(":
- product = PRODUCTS.get(key)
-File: HelloFlask/my_app/product/views.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('product.html',product=product)
-
-
-
-tiangolo/uwsgi-nginx-flask-docker
-https://github.com/tiangolo/uwsgi-nginx-flask-docker
-Entry file: uwsgi-nginx-flask-docker/example-flask-index-upload/app/main.py
-Scanned: 2016-10-25 15:03:51.575502
-No vulnerabilities found.
-
-
-MoodyLyrics/flask
-https://github.com/MoodyLyrics/flask
-Entry file: None
-Scanned: 2016-10-25 15:03:52.604289
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-unikatsieben/flask
-https://github.com/unikatsieben/flask
-Entry file: None
-Scanned: 2016-10-25 15:03:53.129109
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Mei-Lin-Chen/Flask
-https://github.com/Mei-Lin-Chen/Flask
-Entry file: None
-Scanned: 2016-10-25 15:03:53.642609
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rakeshhegishte/Flask
-https://github.com/rakeshhegishte/Flask
-Entry file: None
-Scanned: 2016-10-25 15:03:54.178315
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-billdwalters/Flask
-https://github.com/billdwalters/Flask
-Entry file: None
-Scanned: 2016-10-25 15:03:54.726452
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-damionlowers/flask
-https://github.com/damionlowers/flask
-Entry file: None
-Scanned: 2016-10-25 15:03:55.261052
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bobdorff/flask
-https://github.com/bobdorff/flask
-Entry file: None
-Scanned: 2016-10-25 15:04:03.781978
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chrisvasey/flask
-https://github.com/chrisvasey/flask
-Entry file: None
-Scanned: 2016-10-25 15:04:05.312989
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wildjan/Flask
-https://github.com/wildjan/Flask
-Entry file: None
-Scanned: 2016-10-25 15:04:06.931903
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-smltc/Flask
-https://github.com/smltc/Flask
-Entry file: None
-Scanned: 2016-10-25 15:04:07.458563
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rlsharpton/flask
-https://github.com/rlsharpton/flask
-Entry file: None
-Scanned: 2016-10-25 15:04:11.975008
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-embasa/FLASK
-https://github.com/embasa/FLASK
-Entry file: FLASK/app.py
-Scanned: 2016-10-25 15:04:14.307028
-No vulnerabilities found.
-
-
-ccapudev/flask
-https://github.com/ccapudev/flask
-Entry file: None
-Scanned: 2016-10-25 15:04:21.334490
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hezx/flask
-https://github.com/hezx/flask
-Entry file: None
-Scanned: 2016-10-25 15:04:22.887263
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-RayneHwang/Flask
-https://github.com/RayneHwang/Flask
-Entry file: None
-Scanned: 2016-10-25 15:04:24.414269
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kakshi3242/Flask
-https://github.com/kakshi3242/Flask
-Entry file: None
-Scanned: 2016-10-25 15:04:25.928049
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Abirdcfly/flask-blog
-https://github.com/Abirdcfly/flask-blog
-Entry file: flask-blog/app/__init__.py
-Scanned: 2016-10-25 15:04:38.039321
-Vulnerability 1:
-File: flask-blog/app/main/views.py
- > User input at line 52, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 53: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['AWOTER_DOC_PER_PAGE'], error_out=False)
- File: flask-blog/app/main/views.py
- > Line 56: posts = pagination.items
-File: flask-blog/app/main/views.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, title=title, posts=posts, pagination=pagination, detail_show=detail_show)
-
-Vulnerability 2:
-File: flask-blog/app/main/views.py
- > User input at line 128, trigger word "get(":
- show_follwed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 126: show_follwed = False
-File: flask-blog/app/main/views.py
- > reaches line 138, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('doc.html',title=title, posts=posts, pagination=pagination, detail_show=detail_show, show_follwed=show_follwed)
-
-Vulnerability 3:
-File: flask-blog/app/main/views.py
- > User input at line 133, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 134: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['AWOTER_DOC_PER_PAGE'], error_out=False)
- File: flask-blog/app/main/views.py
- > Line 137: posts = pagination.items
-File: flask-blog/app/main/views.py
- > reaches line 138, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('doc.html',title=title, posts=posts, pagination=pagination, detail_show=detail_show, show_follwed=show_follwed)
-
-Vulnerability 4:
-File: flask-blog/app/main/views.py
- > User input at line 171, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 173: page = post.comments.count() - 1 / current_app.config['AWOTER_COMMENTS_PER_PAGE'] + 1
- File: flask-blog/app/main/views.py
- > Line 175: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['AWOTER_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blog/app/main/views.py
- > Line 178: comments = pagination.items
- File: flask-blog/app/main/views.py
- > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.doc_detail',id=post.id, page=-1))
-File: flask-blog/app/main/views.py
- > reaches line 179, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('doc.html',title=title, posts=[post], detail_show=detail_show, form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask-blog/app/main/views.py
- > User input at line 241, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 242: pagination = user.followers.paginate(page,per_page=current_app.config['AWOTER_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blog/app/main/views.py
- > Line 245: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-blog/app/main/views.py
- > Line 240: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-blog/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注者列表', endpoint='main.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask-blog/app/main/views.py
- > User input at line 258, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 259: pagination = user.followed.paginate(page,per_page=current_app.config['AWOTER_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blog/app/main/views.py
- > Line 262: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-blog/app/main/views.py
- > Line 257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-blog/app/main/views.py
- > reaches line 264, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='他关注的人', endpoint='main.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask-blog/app/main/views.py
- > User input at line 290, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/app/main/views.py
- > Line 291: pagination = Comment.query.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['AWOTER_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blog/app/main/views.py
- > Line 294: comments = pagination.items
-File: flask-blog/app/main/views.py
- > reaches line 295, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, title=title, page=page, pagination=pagination)
-
-
-
-RoseOu/flasky
-https://github.com/RoseOu/flasky
-Entry file: None
-Scanned: 2016-10-25 15:05:48.520341
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-its-dirg/Flask-pyoidc
-https://github.com/its-dirg/Flask-pyoidc
-Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py
-Scanned: 2016-10-25 15:05:49.989935
-No vulnerabilities found.
-
-
-materialsvirtuallab/flamyngo
-https://github.com/materialsvirtuallab/flamyngo
-Entry file: flamyngo/flamyngo/app.py
-Scanned: 2016-10-25 15:05:53.428388
-Vulnerability 1:
-File: flamyngo/flamyngo/views.py
- > User input at line 95, trigger word "get(":
- cname = request.args.get('collection')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 96: settings = CSETTINGS[cname]
- File: flamyngo/flamyngo/views.py
- > Line 98: projection = [t[0] for t in settings['summary']]
- File: flamyngo/flamyngo/views.py
- > Line 105: criteria = process_search_string(search_string, settings)
-File: flamyngo/flamyngo/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message))
-
-Vulnerability 2:
-File: flamyngo/flamyngo/views.py
- > User input at line 97, trigger word "get(":
- search_string = request.args.get('search_string')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 105: criteria = process_search_string(search_string, settings)
-File: flamyngo/flamyngo/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message))
-
-Vulnerability 3:
-File: flamyngo/flamyngo/views.py
- > User input at line 142, trigger word "get(":
- cname = request.args.get('collection')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 4:
-File: flamyngo/flamyngo/views.py
- > User input at line 145, trigger word "get(":
- plot_type = request.args.get('plot_type') or 'scatter'
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 5:
-File: flamyngo/flamyngo/views.py
- > User input at line 146, trigger word "get(":
- search_string = request.args.get('search_string')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 6:
-File: flamyngo/flamyngo/views.py
- > User input at line 147, trigger word "get(":
- xaxis = request.args.get('xaxis')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 7:
-File: flamyngo/flamyngo/views.py
- > User input at line 148, trigger word "get(":
- yaxis = request.args.get('yaxis')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-
-
-mikelkl/flasky
-https://github.com/mikelkl/flasky
-Entry file: None
-Scanned: 2016-10-25 15:05:53.949984
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-OneBitSoftware/Office365-SharePoint-Python-Flask-Sample
-https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample
-Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py
-Scanned: 2016-10-25 15:05:55.881889
-No vulnerabilities found.
-
-
-jonafato/Flask-Copilot
-https://github.com/jonafato/Flask-Copilot
-Entry file: Flask-Copilot/example/app.py
-Scanned: 2016-10-25 15:05:57.410130
-No vulnerabilities found.
-
-
-besimaltnok/Flask-Examples
-https://github.com/besimaltnok/Flask-Examples
-Entry file: Flask-Examples/fileupload.py
-Scanned: 2016-10-25 15:05:59.276490
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-luo-jialin/flask-
-https://github.com/luo-jialin/flask-
-Entry file: flask-/flaskr.py
-Scanned: 2016-10-25 15:06:00.665404
-No vulnerabilities found.
-
-
-NJIT-SIG-WEBDEV/flask-intro
-https://github.com/NJIT-SIG-WEBDEV/flask-intro
-Entry file: flask-intro/Session1/app.py
-Scanned: 2016-10-25 15:06:02.524588
-No vulnerabilities found.
-
-
-imperio-wxm/flask-learn
-https://github.com/imperio-wxm/flask-learn
-Entry file: flask-learn/app/demo/flask_learn.py
-Scanned: 2016-10-25 15:06:04.783851
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ptrierweiler/myblog
-https://github.com/ptrierweiler/myblog
-Entry file: myblog/app/hello.py
-Scanned: 2016-10-25 15:06:12.903888
-No vulnerabilities found.
-
-
-Upflask/Upflask
-https://github.com/Upflask/Upflask
-Entry file: Upflask/server.py
-Scanned: 2016-10-25 15:06:15.359714
-Vulnerability 1:
-File: Upflask/server.py
- > User input at line 161, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Upflask/server.py
- > Line 165: filename = secure_filename(file.filename)
-File: Upflask/server.py
- > reaches line 171, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: Upflask/server.py
- > User input at line 161, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Upflask/server.py
- > Line 165: filename = secure_filename(file.filename)
-File: Upflask/server.py
- > reaches line 171, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-PrettyPrinted/flask-wtforms
-https://github.com/PrettyPrinted/flask-wtforms
-Entry file: flask-wtforms/main.py
-Scanned: 2016-10-25 15:06:16.675952
-No vulnerabilities found.
-
-
-rainyear/MathModeBot
-https://github.com/rainyear/MathModeBot
-Entry file: MathModeBot/main.py
-Scanned: 2016-10-25 15:06:18.035895
-No vulnerabilities found.
-
-
-MLH/my-mlh-flask-example
-https://github.com/MLH/my-mlh-flask-example
-Entry file: my-mlh-flask-example/app.py
-Scanned: 2016-10-25 15:06:19.327117
-No vulnerabilities found.
-
-
-ubbochum/hb2_flask
-https://github.com/ubbochum/hb2_flask
-Entry file: hb2_flask/hb2_flask.py
-Scanned: 2016-10-25 15:06:24.171884
-Vulnerability 1:
-File: hb2_flask/hb2_flask.py
- > User input at line 362, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 369: index_solr = Solr(start=page - 1 * 10, query=current_user.email, facet='false')
- File: hb2_flask/hb2_flask.py
- > Line 372: records = index_solr.results
- File: hb2_flask/hb2_flask.py
- > Line 376: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 379: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 361: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 363: records = []
- File: hb2_flask/hb2_flask.py
- > Line 365: index_solr = ''
- File: hb2_flask/hb2_flask.py
- > Line 366: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 380, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',header=lazy_gettext('Home'), site=theme(request.access_route), numFound=num_found, records=records, pagination=pagination, offset=mystart - 1)
-
-Vulnerability 2:
-File: hb2_flask/hb2_flask.py
- > User input at line 416, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 417: duplicates_solr = Solr(start=page - 1 * 10, fquery=['dedupid:[* TO *]'], group='true', group_field='dedupid', group_limit=100, facet='false')
- File: hb2_flask/hb2_flask.py
- > Line 424: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('duplicate groups'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 427: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 415: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 423: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 428, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('duplicates.html',groups=duplicates_solr.results, pagination=pagination, header=lazy_gettext('Duplicates'), site=theme(request.access_route), offset=mystart - 1)
-
-Vulnerability 3:
-File: hb2_flask/hb2_flask.py
- > User input at line 433, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons'))
- File: hb2_flask/hb2_flask.py
- > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 434: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 446, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now())
-
-Vulnerability 4:
-File: hb2_flask/hb2_flask.py
- > User input at line 433, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons'))
- File: hb2_flask/hb2_flask.py
- > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 434: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 455, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), del_redirect='persons')
-
-Vulnerability 5:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 6:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 7:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 8:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 9:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 10:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 11:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 12:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 13:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 14:
-File: hb2_flask/hb2_flask.py
- > User input at line 742, trigger word "get(":
- bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json()
-File: hb2_flask/hb2_flask.py
- > reaches line 744, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value')))
-
-Vulnerability 15:
-File: hb2_flask/hb2_flask.py
- > User input at line 749, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 787: dashboard_solr = Solr(start=page - 1 * 10, query=query, sort='recordCreationDate asc', json_facet=DASHBOARD_FACETS, fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 795: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 798: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 750: mystart = 0
- File: hb2_flask/hb2_flask.py
- > Line 791: pagination = ''
-File: hb2_flask/hb2_flask.py
- > reaches line 801, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('dashboard.html',records=dashboard_solr.results, facet_data=dashboard_solr.facets, header=lazy_gettext('Dashboard'), site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), target='dashboard', del_redirect='dashboard')
-
-Vulnerability 16:
-File: hb2_flask/hb2_flask.py
- > User input at line 826, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 827: locked_solr = Solr(core='hb2', fquery=['locked:true', 'recordChangeDate:[* TO NOW-1HOUR]'], sort='recordChangeDate asc', start=page - 1 * 10)
- File: hb2_flask/hb2_flask.py
- > Line 831: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('records'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 834: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 824: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 841, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('superadmin.html',locked_records=locked_solr.results, header=lazy_gettext('Superadmin Board'), import_records=solr_dumps.results, offset=mystart - 1, pagination=pagination, del_redirect='superadmin', form=form, site=theme(request.access_route))
-
-Vulnerability 17:
-File: hb2_flask/hb2_flask.py
- > User input at line 912, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units'))
- File: hb2_flask/hb2_flask.py
- > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 913: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 925, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now())
-
-Vulnerability 18:
-File: hb2_flask/hb2_flask.py
- > User input at line 912, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units'))
- File: hb2_flask/hb2_flask.py
- > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 913: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 933, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now())
-
-Vulnerability 19:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1110, trigger word "replace(":
- solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z')
-
-Vulnerability 20:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1112, trigger word "replace(":
- solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z')
-
-Vulnerability 21:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype)
-
-Vulnerability 22:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1160, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data)
-
-Vulnerability 23:
-File: hb2_flask/hb2_flask.py
- > User input at line 1167, trigger word "get(":
- is_part_of = show_record_solr.results[0].get('is_part_of')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 24:
-File: hb2_flask/hb2_flask.py
- > User input at line 1168, trigger word "get(":
- has_part = show_record_solr.results[0].get('has_part')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 25:
-File: hb2_flask/hb2_flask.py
- > User input at line 1169, trigger word "get(":
- other_version = show_record_solr.results[0].get('other_version')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 26:
-File: hb2_flask/hb2_flask.py
- > User input at line 1171, trigger word "get(":
- thedata = json.loads(show_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1173: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 27:
-File: hb2_flask/hb2_flask.py
- > User input at line 1172, trigger word "get(":
- locked = show_record_solr.results[0].get('locked')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 28:
-File: hb2_flask/hb2_flask.py
- > User input at line 1173, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 29:
-File: hb2_flask/hb2_flask.py
- > User input at line 1189, trigger word "get(":
- thedata = json.loads(show_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1190: form = PersonAdminForm.from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1192, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('name'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=person_id, pubtype='person', del_redirect='persons')
-
-Vulnerability 30:
-File: hb2_flask/hb2_flask.py
- > User input at line 1200, trigger word "get(":
- thedata = json.loads(show_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1201: form = OrgaAdminForm.from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1203, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('pref_label'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=orga_id, pubtype='organisation', del_redirect='organisations')
-
-Vulnerability 31:
-File: hb2_flask/hb2_flask.py
- > User input at line 1213, trigger word "get(":
- thedata = json.loads(edit_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1218: form = OrgaAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas'))
- File: hb2_flask/hb2_flask.py
- > Line 1216: form = OrgaAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1223, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update')
-
-Vulnerability 32:
-File: hb2_flask/hb2_flask.py
- > User input at line 1213, trigger word "get(":
- thedata = json.loads(edit_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1218: form = OrgaAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas'))
- File: hb2_flask/hb2_flask.py
- > Line 1216: form = OrgaAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1231, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(orga)s',orga=form.data.get('pref_label')), site=theme(request.access_route), action='https://github.com/update', pubtype='organisation')
-
-Vulnerability 33:
-File: hb2_flask/hb2_flask.py
- > User input at line 1242, trigger word "get(":
- thedata = json.loads(edit_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1247: form = PersonAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons'))
- File: hb2_flask/hb2_flask.py
- > Line 1245: form = PersonAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1253, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update')
-
-Vulnerability 34:
-File: hb2_flask/hb2_flask.py
- > User input at line 1242, trigger word "get(":
- thedata = json.loads(edit_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1247: form = PersonAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons'))
- File: hb2_flask/hb2_flask.py
- > Line 1245: form = PersonAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1261, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(person)s',person=form.data.get('name')), site=theme(request.access_route), action='https://github.com/update', pubtype='person')
-
-Vulnerability 35:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 36:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 37:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 38:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 39:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 40:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 41:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 42:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 43:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 44:
-File: hb2_flask/hb2_flask.py
- > User input at line 1491, trigger word "form[":
- target = request.form['next']
-File: hb2_flask/hb2_flask.py
- > reaches line 1493, trigger word "url_for(":
- target = url_for(endpoint,values)
-
-Vulnerability 45:
-File: hb2_flask/hb2_flask.py
- > User input at line 1491, trigger word "form[":
- target = request.form['next']
-File: hb2_flask/hb2_flask.py
- > reaches line 1494, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(target)
-
-Vulnerability 46:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 47:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 48:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 49:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 50:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 51:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 52:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 53:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 54:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1573, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route))
-
-Vulnerability 55:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1573, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route))
-
-Vulnerability 56:
-File: hb2_flask/hb2_flask.py
- > User input at line 1627, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1628: solr_dumps = Solr(core='hb2_users', query='id:*.json', facet='false', start=page - 1 * 10)
- File: hb2_flask/hb2_flask.py
- > Line 1631: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('dumps'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 1634: mystart = 1 + pagination.page - 1 * pagination.per_page
-File: hb2_flask/hb2_flask.py
- > reaches line 1636, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('solr_dumps.html',records=solr_dumps.results, offset=mystart - 1, pagination=pagination, header=lazy_gettext('Import Dump'), del_redirect='import/solr_dumps', form=form)
-
-Vulnerability 57:
-File: hb2_flask/hb2_flask.py
- > User input at line 1652, trigger word "get(":
- thedata = json.loads(import_solr.results[0].get('dump')[0])
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1645: thedata = ''
- File: hb2_flask/hb2_flask.py
- > Line 1656: thedata = json.loads(form.file.data.stream.read())
-File: hb2_flask/hb2_flask.py
- > reaches line 1665, trigger word "flash(":
- flash('%s records imported!' % len(thedata), 'success')
-
-Vulnerability 58:
-File: hb2_flask/hb2_flask.py
- > User input at line 1656, trigger word ".data":
- thedata = json.loads(form.file.data.stream.read())
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1645: thedata = ''
- File: hb2_flask/hb2_flask.py
- > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0])
-File: hb2_flask/hb2_flask.py
- > reaches line 1665, trigger word "flash(":
- flash('%s records imported!' % len(thedata), 'success')
-
-Vulnerability 59:
-File: hb2_flask/processors/mods_parser.py
- > User input at line 123, trigger word "get(":
- pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '')
-Reassigned in:
- File: hb2_flask/processors/mods_parser.py
- > Line 120: pnd = ''
-File: hb2_flask/processors/mods_parser.py
- > reaches line 123, trigger word "replace(":
- pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '')
-
-
-
-Vertabelo/flask-oauth-demo-app
-https://github.com/Vertabelo/flask-oauth-demo-app
-Entry file: flask-oauth-demo-app/models.py
-Scanned: 2016-10-25 15:06:28.705497
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-msopentechcn/aad-graphapi-flask-demo
-https://github.com/msopentechcn/aad-graphapi-flask-demo
-Entry file: aad-graphapi-flask-demo/app.py
-Scanned: 2016-10-25 15:06:29.991011
-Vulnerability 1:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 100, trigger word "get(":
- error_code = messages.get('error_code')
-File: aad-graphapi-flask-demo/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message)
-
-Vulnerability 2:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 101, trigger word "get(":
- error_message = messages.get('error_message')
-File: aad-graphapi-flask-demo/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message)
-
-Vulnerability 3:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 108, trigger word "get(":
- error_code = errors.get('code')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 4:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 109, trigger word "get(":
- error_message = errors.get('message').get('value')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 5:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 108, trigger word "get(":
- error_code = errors.get('code')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 6:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 109, trigger word "get(":
- error_message = errors.get('message').get('value')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-
-
-waharnum/inlibraries.com
-https://github.com/waharnum/inlibraries.com
-Entry file: None
-Scanned: 2016-10-25 15:06:35.203103
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/waharnum/inlibraries.com.
-
-billyfung/flask_shortener
-https://github.com/billyfung/flask_shortener
-Entry file: flask_shortener/app.py
-Scanned: 2016-10-25 15:06:36.503563
-Vulnerability 1:
-File: flask_shortener/app.py
- > User input at line 41, trigger word "form[":
- url_to_parse = request.form['input-url']
-Reassigned in:
- File: flask_shortener/app.py
- > Line 42: parts = urlparse.urlparse(url_to_parse)
- File: flask_shortener/app.py
- > Line 47: short_id = shorten(url_to_parse)
-File: flask_shortener/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id)
-
-Vulnerability 2:
-File: flask_shortener/app.py
- > User input at line 52, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(link_target)
-
-Vulnerability 3:
-File: flask_shortener/app.py
- > User input at line 60, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-Vulnerability 4:
-File: flask_shortener/app.py
- > User input at line 63, trigger word "get(":
- click_count = int(redis.get('click-count:' + short_id) or 0)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-
-
-jrhuerta/flask-api
-https://github.com/jrhuerta/flask-api
-Entry file: None
-Scanned: 2016-10-25 15:06:37.851467
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrhuerta/flask-api.
-
-SticksInHand/flaskr
-https://github.com/SticksInHand/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:38.893222
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SticksInHand/flaskr.
-
-jayShepard/Flasky
-https://github.com/jayShepard/Flasky
-Entry file: Flasky/Vagrant/hello.py
-Scanned: 2016-10-25 15:06:40.182696
-No vulnerabilities found.
-
-
-vineethtw/flaskexamples
-https://github.com/vineethtw/flaskexamples
-Entry file: flaskexamples/api/simulations.py
-Scanned: 2016-10-25 15:06:41.558204
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kmosho/flaskr
-https://github.com/kmosho/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:42.078069
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kmosho/flaskr.
-
-KDmytro/flasktaskr
-https://github.com/KDmytro/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:42.596360
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dreamtiger2016/flaskr
-https://github.com/dreamtiger2016/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:43.096718
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dreamtiger2016/flaskr.
-
-jarogers095/flasktaskr
-https://github.com/jarogers095/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:43.664523
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-msapkota/flasktaskr
-https://github.com/msapkota/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:49.184843
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Narcissist1/flasktest
-https://github.com/Narcissist1/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 15:06:51.689863
-No vulnerabilities found.
-
-
-super452/flasky
-https://github.com/super452/flasky
-Entry file: None
-Scanned: 2016-10-25 15:06:54.214288
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-srbhtest/flaskwebsite
-https://github.com/srbhtest/flaskwebsite
-Entry file: flaskwebsite/__init__.py
-Scanned: 2016-10-25 15:06:55.476069
-No vulnerabilities found.
-
-
-Anddor/flaskr
-https://github.com/Anddor/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:06:58.502902
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Anddor/flaskr.
-
-hammygoonan/Flaskify
-https://github.com/hammygoonan/Flaskify
-Entry file: Flaskify/project/__init__.py
-Scanned: 2016-10-25 15:07:00.120926
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-anujspatel/flaskr
-https://github.com/anujspatel/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:00.668079
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/anujspatel/flaskr.
-
-williamcaban/flaskrcloud
-https://github.com/williamcaban/flaskrcloud
-Entry file: flaskrcloud/flaskr.py
-Scanned: 2016-10-25 15:07:03.327019
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-boydjohnson/flasktwilio
-https://github.com/boydjohnson/flasktwilio
-Entry file: flasktwilio/app.py
-Scanned: 2016-10-25 15:07:04.632911
-Vulnerability 1:
-File: flasktwilio/app.py
- > User input at line 14, trigger word "form[":
- number = request.form['number']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-Vulnerability 2:
-File: flasktwilio/app.py
- > User input at line 15, trigger word "form[":
- lat = request.form['latitude']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-Vulnerability 3:
-File: flasktwilio/app.py
- > User input at line 16, trigger word "form[":
- lon = request.form['longitude']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-
-
-yizhianiu/flasky
-https://github.com/yizhianiu/flasky
-Entry file: None
-Scanned: 2016-10-25 15:07:06.170378
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-huachen0216/flaskdemo
-https://github.com/huachen0216/flaskdemo
-Entry file: flaskdemo/app/__init__.py
-Scanned: 2016-10-25 15:07:15.108101
-Vulnerability 1:
-File: flaskdemo/app/main/views.py
- > User input at line 20, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdemo/app/main/views.py
- > Line 21: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskdemo/app/main/views.py
- > Line 24: posts = pagination.items
- File: flaskdemo/app/main/views.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskdemo/app/main/views.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flaskdemo/app/main/views.py
- > User input at line 32, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskdemo/app/main/views.py
- > Line 33: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskdemo/app/main/views.py
- > Line 36: posts = pagination.items
-File: flaskdemo/app/main/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-MrLokans/flaskr
-https://github.com/MrLokans/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:15.641128
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MrLokans/flaskr.
-
-citizen-stig/flaskone
-https://github.com/citizen-stig/flaskone
-Entry file: flaskone/flask_one.py
-Scanned: 2016-10-25 15:07:16.943261
-No vulnerabilities found.
-
-
-ifcheung2012/flaskanalysis
-https://github.com/ifcheung2012/flaskanalysis
-Entry file: flaskanalysis/manage.py
-Scanned: 2016-10-25 15:07:18.362004
-No vulnerabilities found.
-
-
-Robotwing/flaskweb
-https://github.com/Robotwing/flaskweb
-Entry file: flaskweb/app/__init__.py
-Scanned: 2016-10-25 15:07:21.584764
-No vulnerabilities found.
-
-
-menglong81/flaskr
-https://github.com/menglong81/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:22.111203
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/menglong81/flaskr.
-
-karanj112294/flasktutorial
-https://github.com/karanj112294/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 15:07:26.448894
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/karanj112294/flasktutorial.
-
-crazyqipython/flaskdemo
-https://github.com/crazyqipython/flaskdemo
-Entry file: flaskdemo/hello.py
-Scanned: 2016-10-25 15:07:31.089006
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pythondude325/flaskr
-https://github.com/pythondude325/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:31.610833
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pythondude325/flaskr.
-
-chadelder/flasktaskr
-https://github.com/chadelder/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:36.137146
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jocelynaladin/flaskworkspace
-https://github.com/jocelynaladin/flaskworkspace
-Entry file: flaskworkspace/__init__.py
-Scanned: 2016-10-25 15:07:44.444618
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-fenske/flasky
-https://github.com/fenske/flasky
-Entry file: None
-Scanned: 2016-10-25 15:07:45.017029
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fakegit/flasky
-https://github.com/fakegit/flasky
-Entry file: None
-Scanned: 2016-10-25 15:07:45.531643
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wdxfairy/flaskblog
-https://github.com/wdxfairy/flaskblog
-Entry file: flaskblog/blog.py
-Scanned: 2016-10-25 15:07:46.833657
-No vulnerabilities found.
-
-
-davetromp/flasksqlapi
-https://github.com/davetromp/flasksqlapi
-Entry file: flasksqlapi/runapi.py
-Scanned: 2016-10-25 15:07:49.456441
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Lazyppl/Flaskblog
-https://github.com/Lazyppl/Flaskblog
-Entry file: Flaskblog/app/__init__.py
-Scanned: 2016-10-25 15:07:50.710340
-No vulnerabilities found.
-
-
-playgrdstar/flasktaskr
-https://github.com/playgrdstar/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:51.250056
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-toricor/flaskr
-https://github.com/toricor/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:51.768683
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/toricor/flaskr.
-
-xu00wei/flasky
-https://github.com/xu00wei/flasky
-Entry file: None
-Scanned: 2016-10-25 15:07:52.279436
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zzclynn/flaskr
-https://github.com/zzclynn/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:07:54.793600
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zzclynn/flaskr.
-
-wish007/flasktest
-https://github.com/wish007/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 15:07:56.185731
-No vulnerabilities found.
-
-
-wildjan/Flaskr
-https://github.com/wildjan/Flaskr
-Entry file: Flaskr/Flaskr/Flaskr/flaskr.py
-Scanned: 2016-10-25 15:07:58.606488
-No vulnerabilities found.
-
-
-fhamami/flaskone
-https://github.com/fhamami/flaskone
-Entry file: flaskone/app/__init__.py
-Scanned: 2016-10-25 15:08:00.141795
-No vulnerabilities found.
-
-
-windery/flasky
-https://github.com/windery/flasky
-Entry file: None
-Scanned: 2016-10-25 15:08:00.664802
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pnilan/flaskr
-https://github.com/pnilan/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:08:01.195719
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pnilan/flaskr.
-
-psykos/flaskloginskeleton
-https://github.com/psykos/flaskloginskeleton
-Entry file: flaskloginskeleton/app/__init__.py
-Scanned: 2016-10-25 15:08:03.542603
-No vulnerabilities found.
-
-
-AndrewGoldstein/flaskapp
-https://github.com/AndrewGoldstein/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:08:04.060021
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp.
-
-zeratullich/flaskr
-https://github.com/zeratullich/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:08:06.575243
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeratullich/flaskr.
-
-johnpwillman/flasktest
-https://github.com/johnpwillman/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 15:08:14.794827
-No vulnerabilities found.
-
-
-scottmarinoff/Flasky
-https://github.com/scottmarinoff/Flasky
-Entry file: Flasky/Projects/Flasky/app/__init__.py
-Scanned: 2016-10-25 15:08:17.167763
-No vulnerabilities found.
-
-
-JamesMilnerUK/Loxo
-https://github.com/JamesMilnerUK/Loxo
-Entry file: Loxo/loxoapi.py
-Scanned: 2016-10-25 15:08:24.627598
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kcunning/flask-class-c9
-https://github.com/kcunning/flask-class-c9
-Entry file: flask-class-c9/flaskclass/app/__init__.py
-Scanned: 2016-10-25 15:08:26.179944
-Vulnerability 1:
-File: flask-class-c9/flaskclass/app/views.py
- > User input at line 38, trigger word ".data":
- numbers = form.numbers.data
-Reassigned in:
- File: flask-class-c9/flaskclass/app/views.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
- File: flask-class-c9/flaskclass/app/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
-File: flask-class-c9/flaskclass/app/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins)
-
-
-
-cutedogspark/Flask-SocketIO
-https://github.com/cutedogspark/Flask-SocketIO
-Entry file: Flask-SocketIO/server/app/__init__.py
-Scanned: 2016-10-25 15:08:33.739606
-No vulnerabilities found.
-
-
-nescode/punchstarter
-https://github.com/nescode/punchstarter
-Entry file: punchstarter/punchstarter/__init__.py
-Scanned: 2016-10-25 15:08:35.210807
-Vulnerability 1:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 31, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 36, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550)
- File: punchstarter/punchstarter/__init__.py
- > Line 43: image_filename = uploaded_image['public_id']
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 45, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 31, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 36, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550)
- File: punchstarter/punchstarter/__init__.py
- > Line 43: image_filename = uploaded_image['public_id']
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 6:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 45, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 7:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 64, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 8:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 9:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 93, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 10:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 93, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 11:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 97, trigger word "get(":
- query = request.args.get('q') or ''
-File: punchstarter/punchstarter/__init__.py
- > reaches line 98, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 12:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 97, trigger word "get(":
- query = request.args.get('q') or ''
-File: punchstarter/punchstarter/__init__.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count)
-
-
-
-arose13/HerokuCondaScipyFlaskApp
-https://github.com/arose13/HerokuCondaScipyFlaskApp
-Entry file: HerokuCondaScipyFlaskApp/Web/app.py
-Scanned: 2016-10-25 15:08:36.486579
-No vulnerabilities found.
-
-
-sd16spring/Toolbox-Flask
-https://github.com/sd16spring/Toolbox-Flask
-Entry file: Toolbox-Flask/hello.py
-Scanned: 2016-10-25 15:08:39.107480
-No vulnerabilities found.
-
-
-zbc/Flask
-https://github.com/zbc/Flask
-Entry file: None
-Scanned: 2016-10-25 15:08:39.630475
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-JadyLiu/flask
-https://github.com/JadyLiu/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:40.247344
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ZhenghaoZhu/Flask
-https://github.com/ZhenghaoZhu/Flask
-Entry file: None
-Scanned: 2016-10-25 15:08:45.792464
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cobra0914/flask
-https://github.com/cobra0914/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:46.345210
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sunshine-sjd/Flask
-https://github.com/sunshine-sjd/Flask
-Entry file: None
-Scanned: 2016-10-25 15:08:46.859391
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-octt/flask
-https://github.com/octt/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:47.421035
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SunchunZhou/flask
-https://github.com/SunchunZhou/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:47.970358
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Bwooklyn/flask
-https://github.com/Bwooklyn/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:48.478702
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HRKpython/flask
-https://github.com/HRKpython/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:50.021693
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-candyer/Flask
-https://github.com/candyer/Flask
-Entry file: None
-Scanned: 2016-10-25 15:08:51.553342
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bsteinberg/flask
-https://github.com/bsteinberg/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:52.066301
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-susantshrestha/flask
-https://github.com/susantshrestha/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:52.606533
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pavelrib/flask
-https://github.com/pavelrib/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:55.125392
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-scripterkaran/flask
-https://github.com/scripterkaran/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:55.634776
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SeanVaysburd/flask
-https://github.com/SeanVaysburd/flask
-Entry file: None
-Scanned: 2016-10-25 15:08:58.145829
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kartheek3011/Flask
-https://github.com/kartheek3011/Flask
-Entry file: None
-Scanned: 2016-10-25 15:08:59.666260
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dannyec/flask
-https://github.com/dannyec/flask
-Entry file: None
-Scanned: 2016-10-25 15:09:01.210090
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-itsrifat/flask-celery-docker-scale
-https://github.com/itsrifat/flask-celery-docker-scale
-Entry file: flask-celery-docker-scale/flask-app/app.py
-Scanned: 2016-10-25 15:09:02.637569
-No vulnerabilities found.
-
-
-ninadmhatre/zual
-https://github.com/ninadmhatre/zual
-Entry file: zual/local_mods/flask-blogging/flask_blogging/engine.py
-Scanned: 2016-10-25 15:09:08.947290
-Vulnerability 1:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 104, trigger word "get(":
- count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 106: meta = _get_meta(storage, count, page)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 107: offset = meta['offset']
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 111: posts = storage.get_posts(count=count, offset=offset, include_draft=False, tag=None, user_id=None, recent=True)
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 115, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config)
-
-Vulnerability 2:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 141, trigger word "get(":
- count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 142: meta = _get_meta(storage, count, page,tag=tag)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 143: offset = meta['offset']
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 147: posts = storage.get_posts(count=count, offset=offset, tag=tag, include_draft=False, user_id=None, recent=True)
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config)
-
-Vulnerability 3:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 159, trigger word "get(":
- count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 160: meta = _get_meta(storage, count, page,user_id=user_id)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 161: offset = meta['offset']
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 164: posts = storage.get_posts(count=count, offset=offset, user_id=user_id, include_draft=False, tag=None, recent=True)
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 172, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config)
-
-Vulnerability 4:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 199, trigger word ".data":
- slug = post_processor.create_slug(form.title.data)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 200, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug))
-
-Vulnerability 5:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 199, trigger word ".data":
- slug = post_processor.create_slug(form.title.data)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 200, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug))
-
-
-
-TerbiumLabs/flask-developer-challenge
-https://github.com/TerbiumLabs/flask-developer-challenge
-Entry file: flask-developer-challenge/gistapi/gistapi.py
-Scanned: 2016-10-25 15:09:10.363400
-No vulnerabilities found.
-
-
-w84miracle/flask-sb-admin2
-https://github.com/w84miracle/flask-sb-admin2
-Entry file: flask-sb-admin2/sbadmin.py
-Scanned: 2016-10-25 15:09:17.414611
-No vulnerabilities found.
-
-
-k-hung/FlaskApp
-https://github.com/k-hung/FlaskApp
-Entry file: FlaskApp/FeelsApp/__init__.py
-Scanned: 2016-10-25 15:09:24.871370
-No vulnerabilities found.
-
-
-taogeT/flask-celery
-https://github.com/taogeT/flask-celery
-Entry file: flask-celery/example/app/__init__.py
-Scanned: 2016-10-25 15:09:26.306217
-No vulnerabilities found.
-
-
-frankV/flask-sendgrid
-https://github.com/frankV/flask-sendgrid
-Entry file: flask-sendgrid/setup.py
-Scanned: 2016-10-25 15:09:27.603250
-No vulnerabilities found.
-
-
-sunscrapers/flask-boilerplate
-https://github.com/sunscrapers/flask-boilerplate
-Entry file: flask-boilerplate/app.py
-Scanned: 2016-10-25 15:09:35.969922
-No vulnerabilities found.
-
-
-jabbalaci/DigitalOceanFlask
-https://github.com/jabbalaci/DigitalOceanFlask
-Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py
-Scanned: 2016-10-25 15:09:37.437445
-No vulnerabilities found.
-
-
-pyx/flask-diced
-https://github.com/pyx/flask-diced
-Entry file: flask-diced/examples/simple/app.py
-Scanned: 2016-10-25 15:09:38.852743
-No vulnerabilities found.
-
-
-basco-johnkevin/note-taking-app
-https://github.com/basco-johnkevin/note-taking-app
-Entry file: note-taking-app/part2/main.py
-Scanned: 2016-10-25 15:09:40.147830
-No vulnerabilities found.
-
-
-yoshiya0503/Flask-Best-Practices
-https://github.com/yoshiya0503/Flask-Best-Practices
-Entry file: Flask-Best-Practices/methodview.py
-Scanned: 2016-10-25 15:09:41.433885
-No vulnerabilities found.
-
-
-ThunderousFigs/Genomes
-https://github.com/ThunderousFigs/Genomes
-Entry file: Genomes/server.py
-Scanned: 2016-10-25 15:09:57.486889
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sinscary/Flask-Social-Networking
-https://github.com/sinscary/Flask-Social-Networking
-Entry file: Flask-Social-Networking/app.py
-Scanned: 2016-10-25 15:09:59.865883
-Vulnerability 1:
-File: Flask-Social-Networking/app.py
- > User input at line 111, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: Flask-Social-Networking/app.py
- > Line 118: user = current_user
-File: Flask-Social-Networking/app.py
- > reaches line 121, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 146, trigger word "flash(":
- flash('You are now following {}'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 147, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 147, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 165, trigger word "flash(":
- flash('You have unfollowed {}'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 166, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 166, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-osuosl/timesync-frontend-flask
-https://github.com/osuosl/timesync-frontend-flask
-Entry file: None
-Scanned: 2016-10-25 15:10:05.045291
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask.
-
-Miserlou/serverless-imagehost
-https://github.com/Miserlou/serverless-imagehost
-Entry file: serverless-imagehost/my_app.py
-Scanned: 2016-10-25 15:10:06.361106
-No vulnerabilities found.
-
-
-Python-Project-Simple/flask-blog
-https://github.com/Python-Project-Simple/flask-blog
-Entry file: flask-blog/app/__init__.py
-Scanned: 2016-10-25 15:10:07.814695
-No vulnerabilities found.
-
-
-narakai/flaskblog
-https://github.com/narakai/flaskblog
-Entry file: flaskblog/app/app.py
-Scanned: 2016-10-25 15:10:14.884021
-Vulnerability 1:
-File: flaskblog/app/helpers.py
- > User input at line 5, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: flaskblog/app/helpers.py
- > Line 7: page = int(page)
- File: flaskblog/app/helpers.py
- > Line 9: page = 1
- File: flaskblog/app/helpers.py
- > Line 10: object_list = query.paginate(page, paginate_by)
-File: flaskblog/app/helpers.py
- > reaches line 11, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context)
-
-Vulnerability 2:
-File: flaskblog/app/entries/blueprint.py
- > User input at line 52, trigger word "files[":
- image_file = request.files['file']
-Reassigned in:
- File: flaskblog/app/entries/blueprint.py
- > Line 53: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename))
-File: flaskblog/app/entries/blueprint.py
- > reaches line 55, trigger word "flash(":
- flash('Saved %s' % os.path.basename(filename), 'success')
-
-Vulnerability 3:
-File: flaskblog/app/entries/forms.py
- > User input at line 71, trigger word ".data":
- entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first()
-File: flaskblog/app/entries/forms.py
- > reaches line 71, trigger word "filter(":
- entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first()
-
-
-
-josepablob/flasktaskr
-https://github.com/josepablob/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:15.424882
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-adrianneperedo/flaskr
-https://github.com/adrianneperedo/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:16.450296
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/adrianneperedo/flaskr.
-
-mirukushake/flaskr
-https://github.com/mirukushake/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:16.946740
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mirukushake/flaskr.
-
-wangduanyang/flasky
-https://github.com/wangduanyang/flasky
-Entry file: None
-Scanned: 2016-10-25 15:10:17.462103
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-darrenhankins/flaskr
-https://github.com/darrenhankins/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:17.958546
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/darrenhankins/flaskr.
-
-tim1978/flasktaskr
-https://github.com/tim1978/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:18.465595
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DXZ/flaskr
-https://github.com/DXZ/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:18.999248
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/DXZ/flaskr.
-
-zhangyuhaomei/flasky
-https://github.com/zhangyuhaomei/flasky
-Entry file: None
-Scanned: 2016-10-25 15:10:19.509317
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hellohuangjin/flaskblog
-https://github.com/hellohuangjin/flaskblog
-Entry file: flaskblog/app/__init__.py
-Scanned: 2016-10-25 15:10:20.979061
-No vulnerabilities found.
-
-
-Looncall/Flaskr
-https://github.com/Looncall/Flaskr
-Entry file: Flaskr/flaskr/app.py
-Scanned: 2016-10-25 15:10:22.261695
-No vulnerabilities found.
-
-
-schen2011/flaskandazure
-https://github.com/schen2011/flaskandazure
-Entry file: flaskandazure/FlaskWebProject3/FlaskWebProject3/__init__.py
-Scanned: 2016-10-25 15:10:26.248977
-No vulnerabilities found.
-
-
-gyonghua/flasktaskr
-https://github.com/gyonghua/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:26.761280
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-coolmile23/flaskr
-https://github.com/coolmile23/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:27.267046
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/coolmile23/flaskr.
-
-Rothschild0120/flaskyblog
-https://github.com/Rothschild0120/flaskyblog
-Entry file: flaskyblog/app/__init__.py
-Scanned: 2016-10-25 15:10:30.170181
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-keer2345/flasky
-https://github.com/keer2345/flasky
-Entry file: None
-Scanned: 2016-10-25 15:10:30.697350
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MRamakri/flaskworkshop
-https://github.com/MRamakri/flaskworkshop
-Entry file: flaskworkshop/app.py
-Scanned: 2016-10-25 15:10:32.095352
-No vulnerabilities found.
-
-
-islandev/flaskweb
-https://github.com/islandev/flaskweb
-Entry file: flaskweb/hello.py
-Scanned: 2016-10-25 15:10:42.120015
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-PansFortress/flasktasker
-https://github.com/PansFortress/flasktasker
-Entry file: flasktasker/views.py
-Scanned: 2016-10-25 15:10:43.567514
-No vulnerabilities found.
-
-
-olegzhoglo/flasktaskr
-https://github.com/olegzhoglo/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:10:44.079967
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-imhuwq/flasky
-https://github.com/imhuwq/flasky
-Entry file: None
-Scanned: 2016-10-25 15:10:44.594212
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Robotwing/flaskweb
-https://github.com/Robotwing/flaskweb
-Entry file: flaskweb/app/__init__.py
-Scanned: 2016-10-25 15:10:47.766788
-No vulnerabilities found.
-
-
-CBR09/flaskapp
-https://github.com/CBR09/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:10:48.277927
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp.
-
-neo1218/m2m
-https://github.com/neo1218/m2m
-Entry file: m2m/m2m/app/__init__.py
-Scanned: 2016-10-25 15:10:59.738034
-No vulnerabilities found.
-
-
-Kriordan/flasktaskr
-https://github.com/Kriordan/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:00.248609
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-antonsoroko/flaskapimongo
-https://github.com/antonsoroko/flaskapimongo
-Entry file: flaskapimongo/flaskapimongo/__init__.py
-Scanned: 2016-10-25 15:11:01.839424
-No vulnerabilities found.
-
-
-haoweibo1987/flasker
-https://github.com/haoweibo1987/flasker
-Entry file: flasker/app/__init__.py
-Scanned: 2016-10-25 15:11:12.921409
-No vulnerabilities found.
-
-
-egonvb/flaskplayground
-https://github.com/egonvb/flaskplayground
-Entry file: flaskplayground/api.py
-Scanned: 2016-10-25 15:11:20.094208
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jeffreybergman/flasktaskr
-https://github.com/jeffreybergman/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:20.670438
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhkmxx9302013/flaskmysql
-https://github.com/zhkmxx9302013/flaskmysql
-Entry file: flaskmysql/flaskmysql.py
-Scanned: 2016-10-25 15:11:22.000004
-No vulnerabilities found.
-
-
-xiaomao361/flaskr
-https://github.com/xiaomao361/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:22.521304
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiaomao361/flaskr.
-
-zixuzhang/flasky
-https://github.com/zixuzhang/flasky
-Entry file: None
-Scanned: 2016-10-25 15:11:23.077553
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stalwart201/flaskimgupload
-https://github.com/stalwart201/flaskimgupload
-Entry file: flaskimgupload/upload.py
-Scanned: 2016-10-25 15:11:24.357102
-Vulnerability 1:
-File: flaskimgupload/upload.py
- > User input at line 19, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flaskimgupload/upload.py
- > Line 21: filename = secure_filename(file.filename)
- File: flaskimgupload/upload.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flaskimgupload/upload.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: flaskimgupload/upload.py
- > User input at line 19, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flaskimgupload/upload.py
- > Line 21: filename = secure_filename(file.filename)
- File: flaskimgupload/upload.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flaskimgupload/upload.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-marcabomb/flasktaskr
-https://github.com/marcabomb/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:24.870435
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alvaro893/flaskcinemaapp
-https://github.com/alvaro893/flaskcinemaapp
-Entry file: flaskcinemaapp/FlaskWebProject/__init__.py
-Scanned: 2016-10-25 15:11:27.712105
-No vulnerabilities found.
-
-
-yuyiwei305/flaskr
-https://github.com/yuyiwei305/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:28.232010
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyiwei305/flaskr.
-
-czy1238677/flasky
-https://github.com/czy1238677/flasky
-Entry file: None
-Scanned: 2016-10-25 15:11:28.741467
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-liteng123/flaskr
-https://github.com/liteng123/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:29.746096
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/liteng123/flaskr.
-
-Pink-Moon/flaskr
-https://github.com/Pink-Moon/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:11:30.767584
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pink-Moon/flaskr.
-
-mcmcgonagle/flasktaskr2
-https://github.com/mcmcgonagle/flasktaskr2
-Entry file: flasktaskr2/project/views.py
-Scanned: 2016-10-25 15:11:32.578127
-No vulnerabilities found.
-
-
-pchartrand/FlaskTemp
-https://github.com/pchartrand/FlaskTemp
-Entry file: FlaskTemp/tempreport.py
-Scanned: 2016-10-25 15:11:35.175848
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-salazar35/FlaskWeb
-https://github.com/salazar35/FlaskWeb
-Entry file: FlaskWeb/Flask Web Development.py
-Scanned: 2016-10-25 15:11:36.485402
-No vulnerabilities found.
-
-
-uklineale/flaskTut
-https://github.com/uklineale/flaskTut
-Entry file: None
-Scanned: 2016-10-25 15:11:47.164902
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MarHelen/FlaskLogin
-https://github.com/MarHelen/FlaskLogin
-Entry file: FlaskLogin/sql_declarative.py
-Scanned: 2016-10-25 15:11:55.025510
-Vulnerability 1:
-File: FlaskLogin/first.py
- > User input at line 63, trigger word "get(":
- email = request.form.get('email')
-Reassigned in:
- File: FlaskLogin/first.py
- > Line 70: user = User(email, request.form.get('pw'))
-File: FlaskLogin/first.py
- > reaches line 65, trigger word "filter(":
- temp_user_set = User.query.filter(User.email == email).first()
-
-
-
-AlexFransis/FlaskyProject
-https://github.com/AlexFransis/FlaskyProject
-Entry file: FlaskyProject/app/__init__.py
-Scanned: 2016-10-25 15:11:56.747366
-No vulnerabilities found.
-
-
-azureappserviceoss/FlaskAzure
-https://github.com/azureappserviceoss/FlaskAzure
-Entry file: FlaskAzure/FlaskWebProject1/__init__.py
-Scanned: 2016-10-25 15:12:03.320710
-No vulnerabilities found.
-
-
-yhappy/FlaskProjects
-https://github.com/yhappy/FlaskProjects
-Entry file: FlaskProjects/FlaskProjects.py
-Scanned: 2016-10-25 15:12:04.628926
-No vulnerabilities found.
-
-
-saurabh1e/FlaskStructure
-https://github.com/saurabh1e/FlaskStructure
-Entry file: FlaskStructure/src/utils/__init__.py
-Scanned: 2016-10-25 15:12:05.973449
-No vulnerabilities found.
-
-
-tangza/FlaskAPP
-https://github.com/tangza/FlaskAPP
-Entry file: None
-Scanned: 2016-10-25 15:12:13.645015
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AlexGrek/FlaskLib
-https://github.com/AlexGrek/FlaskLib
-Entry file: FlaskLib/FlaskLib/FlaskLib/__init__.py
-Scanned: 2016-10-25 15:12:17.614196
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-daveweber/FlaskBar
-https://github.com/daveweber/FlaskBar
-Entry file: FlaskBar/index.py
-Scanned: 2016-10-25 15:12:18.925182
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-retozero/FlaskDemo
-https://github.com/retozero/FlaskDemo
-Entry file: FlaskDemo/flaskr/flaskr.py
-Scanned: 2016-10-25 15:12:20.778896
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-danleyb2/flaskMe
-https://github.com/danleyb2/flaskMe
-Entry file: flaskMe/flaskREST.py
-Scanned: 2016-10-25 15:12:22.165787
-Vulnerability 1:
-File: flaskMe/flaskREST.py
- > User input at line 73, trigger word "get(":
- name = data.get('name')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 76, trigger word "execute(":
- db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color])
-
-Vulnerability 2:
-File: flaskMe/flaskREST.py
- > User input at line 74, trigger word "get(":
- color = data.get('color')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 76, trigger word "execute(":
- db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color])
-
-Vulnerability 3:
-File: flaskMe/flaskREST.py
- > User input at line 73, trigger word "get(":
- name = data.get('name')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 78, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color))
-
-Vulnerability 4:
-File: flaskMe/flaskREST.py
- > User input at line 74, trigger word "get(":
- color = data.get('color')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 78, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color))
-
-
-
-Rikka-chan/flaskCharts
-https://github.com/Rikka-chan/flaskCharts
-Entry file: None
-Scanned: 2016-10-25 15:12:29.492061
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hattwick/flask2
-https://github.com/hattwick/flask2
-Entry file: flask2/flask2mod-template.py
-Scanned: 2016-10-25 15:12:30.817198
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-narakai/FlaskServer
-https://github.com/narakai/FlaskServer
-Entry file: FlaskServer/flaskServer.py
-Scanned: 2016-10-25 15:12:32.192505
-No vulnerabilities found.
-
-
-ljxxcaijing/flask
-https://github.com/ljxxcaijing/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:33.920222
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-PacktPublishing/Mastering-Flask
-https://github.com/PacktPublishing/Mastering-Flask
-Entry file: Mastering-Flask/Chapter 13_Code/Chapter 13/webapp/__init__.py
-Scanned: 2016-10-25 15:12:37.089923
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-migrateup/flaskr
-https://github.com/migrateup/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:12:37.625157
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/migrateup/flaskr.
-
-reparadocs/Flask-HelloWorldBot
-https://github.com/reparadocs/Flask-HelloWorldBot
-Entry file: Flask-HelloWorldBot/HelloWorldBot.py
-Scanned: 2016-10-25 15:12:39.013549
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-singingwolfboy/flask-sse
-https://github.com/singingwolfboy/flask-sse
-Entry file: flask-sse/tests/conftest.py
-Scanned: 2016-10-25 15:12:40.385259
-No vulnerabilities found.
-
-
-amateurPotato/flask
-https://github.com/amateurPotato/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:40.938186
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ahdrage/flask
-https://github.com/ahdrage/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:41.482897
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-acouderc/flask
-https://github.com/acouderc/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:41.979117
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Goomah/flask
-https://github.com/Goomah/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:42.515962
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pankajpant22/flask
-https://github.com/pankajpant22/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:43.081567
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ultramarine7/flask
-https://github.com/ultramarine7/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:43.598071
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-od210291jpv/flask
-https://github.com/od210291jpv/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:44.104147
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aintmetho/flask
-https://github.com/aintmetho/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:44.610892
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MonPower/Flask
-https://github.com/MonPower/Flask
-Entry file: None
-Scanned: 2016-10-25 15:12:45.159795
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-josephmuli/Flask
-https://github.com/josephmuli/Flask
-Entry file: None
-Scanned: 2016-10-25 15:12:45.674719
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MapEntryManagement/flask
-https://github.com/MapEntryManagement/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:48.204193
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wenzi0595/flask
-https://github.com/wenzi0595/flask
-Entry file: None
-Scanned: 2016-10-25 15:12:55.729481
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-singingwolfboy/build-a-flask-api
-https://github.com/singingwolfboy/build-a-flask-api
-Entry file: build-a-flask-api/step08/puppy.py
-Scanned: 2016-10-25 15:13:01.708826
-Vulnerability 1:
-File: build-a-flask-api/step08/puppy.py
- > User input at line 25, trigger word "get(":
- name = request.form.get('name')
-Reassigned in:
- File: build-a-flask-api/step08/puppy.py
- > Line 31: slug = slugify(name)
- File: build-a-flask-api/step08/puppy.py
- > Line 34: puppy = Puppy(slug=slug, name=name, image_url=image_url)
- File: build-a-flask-api/step08/puppy.py
- > Line 43: resp.headers['Location'] = location
-File: build-a-flask-api/step08/puppy.py
- > reaches line 40, trigger word "url_for(":
- location = url_for('get_puppy',slug=slug)
-
-
-
-sunary/flask-optimize
-https://github.com/sunary/flask-optimize
-Entry file: flask-optimize/tests/flask_app.py
-Scanned: 2016-10-25 15:13:05.115100
-No vulnerabilities found.
-
-
-klen/flask-pw
-https://github.com/klen/flask-pw
-Entry file: flask-pw/tests.py
-Scanned: 2016-10-25 15:13:08.086750
-No vulnerabilities found.
-
-
-janukobytsch/flask-autofixture
-https://github.com/janukobytsch/flask-autofixture
-Entry file: flask-autofixture/tests/conftest.py
-Scanned: 2016-10-25 15:13:15.651640
-No vulnerabilities found.
-
-
-underdogio/flask-graylog
-https://github.com/underdogio/flask-graylog
-Entry file: flask-graylog/example/app.py
-Scanned: 2016-10-25 15:13:18.977445
-No vulnerabilities found.
-
-
-adyouri/flask-basics
-https://github.com/adyouri/flask-basics
-Entry file: flask-basics/lesson5/app.py
-Scanned: 2016-10-25 15:13:20.364140
-No vulnerabilities found.
-
-
-KujiraProject/Flask-PAM
-https://github.com/KujiraProject/Flask-PAM
-Entry file: Flask-PAM/example/www.py
-Scanned: 2016-10-25 15:13:21.760850
-No vulnerabilities found.
-
-
-colingorrie/flask-boilerplate
-https://github.com/colingorrie/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-25 15:13:23.441057
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate.
-
-TwilioDevEd/automated-survey-flask
-https://github.com/TwilioDevEd/automated-survey-flask
-Entry file: automated-survey-flask/automated_survey_flask/__init__.py
-Scanned: 2016-10-25 15:13:34.999744
-No vulnerabilities found.
-
-
-gucxufangling/flask--
-https://github.com/gucxufangling/flask--
-Entry file: flask--/app/__init__.py
-Scanned: 2016-10-25 15:13:43.956247
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-paceko/shopping-site
-https://github.com/paceko/shopping-site
-Entry file: shopping-site/shoppingsite.py
-Scanned: 2016-10-25 15:13:46.204937
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kashyap32/flask-REST
-https://github.com/kashyap32/flask-REST
-Entry file: None
-Scanned: 2016-10-25 15:13:47.468808
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kashyap32/flask-REST.
-
-pragmaticcoders/flask-react-seed
-https://github.com/pragmaticcoders/flask-react-seed
-Entry file: None
-Scanned: 2016-10-25 15:13:48.845032
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed.
-
-danil3d/flaskblog
-https://github.com/danil3d/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:13:50.761152
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danil3d/flaskblog.
-
-rahulballal/flasktemplate
-https://github.com/rahulballal/flasktemplate
-Entry file: flasktemplate/app.py
-Scanned: 2016-10-25 15:13:52.038478
-No vulnerabilities found.
-
-
-rsk7/flaskapp
-https://github.com/rsk7/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:13:52.551127
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rsk7/flaskapp.
-
-ailtoncsf/flasklearn
-https://github.com/ailtoncsf/flasklearn
-Entry file: flasklearn/flask-basics/app.py
-Scanned: 2016-10-25 15:14:02.704870
-No vulnerabilities found.
-
-
-VimDong/flaskme
-https://github.com/VimDong/flaskme
-Entry file: flaskme/app/__init__.py
-Scanned: 2016-10-25 15:14:04.316346
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-dimdal/flasktutorial
-https://github.com/dimdal/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 15:14:04.837866
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dimdal/flasktutorial.
-
-axavio/flasky
-https://github.com/axavio/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:05.340839
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bspaans/flaskal
-https://github.com/bspaans/flaskal
-Entry file: flaskal/flaskal/imports.py
-Scanned: 2016-10-25 15:14:06.917488
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-stoodsteal/flasky
-https://github.com/stoodsteal/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:07.428651
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-annoys-parrot/flaskbook
-https://github.com/annoys-parrot/flaskbook
-Entry file: flaskbook/application.py
-Scanned: 2016-10-25 15:14:09.098722
-Vulnerability 1:
-File: flaskbook/user/views.py
- > User input at line 24, trigger word ".data":
- user = User.objects.filter(username=form.username.data).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 37: user = None
-File: flaskbook/user/views.py
- > reaches line 24, trigger word "filter(":
- user = User.objects.filter(username=form.username.data).first()
-
-Vulnerability 2:
-File: flaskbook/user/views.py
- > User input at line 31, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = 'User logged in'
- File: flaskbook/user/views.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error)
-File: flaskbook/user/views.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 3:
-File: flaskbook/user/views.py
- > User input at line 47, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 62, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 4:
-File: flaskbook/user/views.py
- > User input at line 49, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 62, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 5:
-File: flaskbook/user/views.py
- > User input at line 47, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 63, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 6:
-File: flaskbook/user/views.py
- > User input at line 49, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 63, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 7:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 90, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 8:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 106, trigger word "filter(":
- if User.objects.filter(username=form.username.data.lower()).first():
-
-Vulnerability 9:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 113, trigger word "filter(":
- if User.objects.filter(email=form.email.data.lower()).first():
-
-Vulnerability 10:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 126, trigger word "render_template(":
- body_html = render_template('mail/user/change_email.html',user=user)
-
-Vulnerability 11:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 127, trigger word "render_template(":
- body_text = render_template('mail/user/change_email.txt',user=user)
-
-Vulnerability 12:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 137, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user)
-
-Vulnerability 13:
-File: flaskbook/user/views.py
- > User input at line 160, trigger word ".data":
- user = User.objects.filter(email=form.email.data).first()
-File: flaskbook/user/views.py
- > reaches line 160, trigger word "filter(":
- user = User.objects.filter(email=form.email.data).first()
-
-Vulnerability 14:
-File: flaskbook/user/views.py
- > User input at line 160, trigger word ".data":
- user = User.objects.filter(email=form.email.data).first()
-File: flaskbook/user/views.py
- > reaches line 168, trigger word "render_template(":
- body_html = render_template('mail/user/password_reset.html',user=user)
-
-Vulnerability 15:
-File: flaskbook/user/views.py
- > User input at line 160, trigger word ".data":
- user = User.objects.filter(email=form.email.data).first()
-File: flaskbook/user/views.py
- > reaches line 169, trigger word "render_template(":
- body_text = render_template('mail/user/password_reset.txt',user=user)
-
-Vulnerability 16:
-File: flaskbook/user/views.py
- > User input at line 215, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-File: flaskbook/user/views.py
- > reaches line 215, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-
-
-gene1wood/flaskoktaapp
-https://github.com/gene1wood/flaskoktaapp
-Entry file: flaskoktaapp/flaskoktaapp/__init__.py
-Scanned: 2016-10-25 15:14:10.543313
-Vulnerability 1:
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > User input at line 201, trigger word "form[":
- url = request.form['RelayState']
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > reaches line 196, trigger word "url_for(":
- url = url_for('user')
-
-Vulnerability 2:
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > User input at line 201, trigger word "form[":
- url = request.form['RelayState']
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > reaches line 204, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url)
-
-
-
-yu66s/flaskr
-https://github.com/yu66s/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:11.051317
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yu66s/flaskr.
-
-xiaohu2015/Flasky
-https://github.com/xiaohu2015/Flasky
-Entry file: Flasky/Flasky.py
-Scanned: 2016-10-25 15:14:15.593562
-Vulnerability 1:
-File: Flasky/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 31: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flasky/app/main/views.py
- > Line 34: posts = pagination.items
- File: Flasky/app/main/views.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flasky/app/main/views.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Flasky/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 23: show_followed = False
- File: Flasky/app/main/views.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flasky/app/main/views.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Flasky/app/main/views.py
- > User input at line 60, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 61: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flasky/app/main/views.py
- > Line 64: posts = pagination.items
-File: Flasky/app/main/views.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Flasky/app/main/views.py
- > User input at line 121, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 123: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Flasky/app/main/views.py
- > Line 124: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flasky/app/main/views.py
- > Line 126: comments = pagination.items
- File: Flasky/app/main/views.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Flasky/app/main/views.py
- > reaches line 127, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Flasky/app/main/views.py
- > User input at line 186, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 187: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flasky/app/main/views.py
- > Line 189: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Flasky/app/main/views.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flasky/app/main/views.py
- > reaches line 190, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Flasky/app/main/views.py
- > User input at line 200, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 201: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flasky/app/main/views.py
- > Line 204: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Flasky/app/main/views.py
- > Line 199: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flasky/app/main/views.py
- > reaches line 206, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Flasky/app/main/views.py
- > User input at line 215, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flasky/app/main/views.py
- > Line 216: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flasky/app/main/views.py
- > Line 218: comments = pagination.items
-File: Flasky/app/main/views.py
- > reaches line 219, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-cwywang/flasky
-https://github.com/cwywang/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:16.133263
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Sarmacid/flaskr
-https://github.com/Sarmacid/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:16.639251
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Sarmacid/flaskr.
-
-Julzmbugua/flasky
-https://github.com/Julzmbugua/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:17.181867
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Maxwell-Ying/flaskbook
-https://github.com/Maxwell-Ying/flaskbook
-Entry file: flaskbook/app/__init__.py
-Scanned: 2016-10-25 15:14:18.471289
-Vulnerability 1:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 2:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 3:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 4:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 5:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 6:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 7:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 8:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 9:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 10:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 11:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 12:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 13:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 14:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 15:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 16:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 17:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 18:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 19:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 20:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 21:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 22:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 23:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 24:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 25:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 26:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 27:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 28:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 29:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 30:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 31:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 32:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 33:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 34:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 35:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 36:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 37:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 38:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 39:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 40:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 41:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 42:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 43:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 44:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 45:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 46:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 47:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 48:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 49:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 50:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 51:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 52:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 53:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 54:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 55:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 56:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-
-
-skhe/flasky
-https://github.com/skhe/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:18.989421
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jinxiaoyuan/flaskr
-https://github.com/jinxiaoyuan/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:19.524918
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jinxiaoyuan/flaskr.
-
-baloo98/flasky
-https://github.com/baloo98/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:20.057958
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sanketg10/flaskapp
-https://github.com/sanketg10/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:14:20.605899
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanketg10/flaskapp.
-
-wangxuan007/flasky
-https://github.com/wangxuan007/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:21.156569
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lambdaplus/flasko
-https://github.com/lambdaplus/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-25 15:14:33.495929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/operator.py
-
-fkirwin/flaskhelloworld
-https://github.com/fkirwin/flaskhelloworld
-Entry file: flaskhelloworld/hello_world.py
-Scanned: 2016-10-25 15:14:41.406459
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wang7lu6qiang5/flasky
-https://github.com/wang7lu6qiang5/flasky
-Entry file: None
-Scanned: 2016-10-25 15:14:41.940482
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ak042/flasktaskr
-https://github.com/ak042/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:42.448024
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-thedrew82/flaskr
-https://github.com/thedrew82/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:44.965062
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedrew82/flaskr.
-
-allergier/flaskr
-https://github.com/allergier/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:47.474750
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/allergier/flaskr.
-
-shenmj053/flaskr
-https://github.com/shenmj053/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:47.988534
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shenmj053/flaskr.
-
-neotrinity/flaskavro
-https://github.com/neotrinity/flaskavro
-Entry file: flaskavro/main.py
-Scanned: 2016-10-25 15:14:50.304973
-No vulnerabilities found.
-
-
-SSUHan/flasktutorial
-https://github.com/SSUHan/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 15:14:50.821789
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SSUHan/flasktutorial.
-
-ma53192190/flaskwork
-https://github.com/ma53192190/flaskwork
-Entry file: flaskwork/flaskwork.py
-Scanned: 2016-10-25 15:14:52.106866
-No vulnerabilities found.
-
-
-zverxw13/flaskr
-https://github.com/zverxw13/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:14:52.652540
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zverxw13/flaskr.
-
-Mendurim/flasktut
-https://github.com/Mendurim/flasktut
-Entry file: flasktut/hello.py
-Scanned: 2016-10-25 15:14:53.954163
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zeroisme/flaskblog
-https://github.com/zeroisme/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:15:03.528355
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeroisme/flaskblog.
-
-hoorn91/flaskproject
-https://github.com/hoorn91/flaskproject
-Entry file: flaskproject/app/hello.py
-Scanned: 2016-10-25 15:15:05.899985
-Vulnerability 1:
-File: flaskproject/app/hello.py
- > User input at line 70, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flaskproject/app/hello.py
- > reaches line 77, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-wanghaa/flasky
-https://github.com/wanghaa/flasky
-Entry file: None
-Scanned: 2016-10-25 15:15:06.422856
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HDking/flasktaskr
-https://github.com/HDking/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:15:06.995218
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gjcooper/flaskprac
-https://github.com/gjcooper/flaskprac
-Entry file: flaskprac/app/__init__.py
-Scanned: 2016-10-25 15:15:08.539944
-No vulnerabilities found.
-
-
-liuhuai0217/flasky
-https://github.com/liuhuai0217/flasky
-Entry file: None
-Scanned: 2016-10-25 15:15:09.064317
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-deliveryyyyguy/flaskapp
-https://github.com/deliveryyyyguy/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:15:10.577129
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/deliveryyyyguy/flaskapp.
-
-omshankar1/flaskapp
-https://github.com/omshankar1/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:15:11.090586
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/omshankar1/flaskapp.
-
-maxwang051/flasktaskr
-https://github.com/maxwang051/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:15:11.609428
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aaron077/flaskblog
-https://github.com/aaron077/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:15:16.155524
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/aaron077/flaskblog.
-
-hoobalias/Flaskr
-https://github.com/hoobalias/Flaskr
-Entry file: Flaskr/flaskr_original.py
-Scanned: 2016-10-25 15:15:17.469315
-No vulnerabilities found.
-
-
-joanna-solomiewicz/FlaskWorkshop
-https://github.com/joanna-solomiewicz/FlaskWorkshop
-Entry file: FlaskWorkshop/app.py
-Scanned: 2016-10-25 15:15:24.053549
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWorkshop/venv/lib/python3.5/operator.py
-
-erk52/FlaskDynamics
-https://github.com/erk52/FlaskDynamics
-Entry file: FlaskDynamics/view.py
-Scanned: 2016-10-25 15:15:25.397556
-Vulnerability 1:
-File: FlaskDynamics/view.py
- > User input at line 18, trigger word ".data":
- result = phasePlot(form.XPrime.data, form.YPrime.data)
-Reassigned in:
- File: FlaskDynamics/view.py
- > Line 20: result = None
-File: FlaskDynamics/view.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('new_view.html',form=form, result=result)
-
-
-
-KentaYamada/flaskr2
-https://github.com/KentaYamada/flaskr2
-Entry file: flaskr2/__init__.py
-Scanned: 2016-10-25 15:15:26.716419
-No vulnerabilities found.
-
-
-NapoleonYoung/FlaskWeb
-https://github.com/NapoleonYoung/FlaskWeb
-Entry file: FlaskWeb/MyFirstWebServer/app/__init__.py
-Scanned: 2016-10-25 15:15:35.049583
-Vulnerability 1:
-File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > User input at line 15, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > Line 12: name = None
-File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name)
-
-
-
-DaBaiLi/FlaskBlog
-https://github.com/DaBaiLi/FlaskBlog
-Entry file: FlaskBlog/app/__init__.py
-Scanned: 2016-10-25 15:15:36.615396
-Vulnerability 1:
-File: FlaskBlog/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 26: posts = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskBlog/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: FlaskBlog/app/main/views.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 35: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 38: posts = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 3:
-File: FlaskBlog/app/main/views.py
- > User input at line 98, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 100: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: FlaskBlog/app/main/views.py
- > Line 102: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 105: comments = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: FlaskBlog/app/main/views.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: FlaskBlog/app/main/views.py
- > User input at line 131, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 132: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 135: comments = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 136, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-zhouyang2640/FlaskInit
-https://github.com/zhouyang2640/FlaskInit
-Entry file: FlaskInit/hello.py
-Scanned: 2016-10-25 15:15:37.967707
-No vulnerabilities found.
-
-
-rmGuarachi/flaskTutorial
-https://github.com/rmGuarachi/flaskTutorial
-Entry file: flaskTutorial/webapp.py
-Scanned: 2016-10-25 15:15:39.274791
-No vulnerabilities found.
-
-
-Thetides/FlaskyTut
-https://github.com/Thetides/FlaskyTut
-Entry file: FlaskyTut/app.py
-Scanned: 2016-10-25 15:15:40.515106
-No vulnerabilities found.
-
-
-cs207-project/FlaskAPI
-https://github.com/cs207-project/FlaskAPI
-Entry file: FlaskAPI/app.py
-Scanned: 2016-10-25 15:15:48.367416
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-tajihiro/FlaskBluemix
-https://github.com/tajihiro/FlaskBluemix
-Entry file: FlaskBluemix/index.py
-Scanned: 2016-10-25 15:15:49.658512
-No vulnerabilities found.
-
-
-s3c0nDD/FlaskTutorial
-https://github.com/s3c0nDD/FlaskTutorial
-Entry file: FlaskTutorial/app/__init__.py
-Scanned: 2016-10-25 15:15:50.881826
-No vulnerabilities found.
-
-
-HaarisKhan/FlaskDemos
-https://github.com/HaarisKhan/FlaskDemos
-Entry file: None
-Scanned: 2016-10-25 15:15:57.655914
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hamartia0/FlaskWeb
-https://github.com/hamartia0/FlaskWeb
-Entry file: FlaskWeb/web3b.py
-Scanned: 2016-10-25 15:16:05.250623
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-prrateekk/FlaskTesting
-https://github.com/prrateekk/FlaskTesting
-Entry file: FlaskTesting/hello.py
-Scanned: 2016-10-25 15:16:11.799176
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTesting/venv/lib/python2.7/sre_compile.py
-
-kolapapa/flasky2
-https://github.com/kolapapa/flasky2
-Entry file: flasky2/app/__init__.py
-Scanned: 2016-10-25 15:16:13.244672
-No vulnerabilities found.
-
-
-mion00/flaskSQLAlchemy
-https://github.com/mion00/flaskSQLAlchemy
-Entry file: flaskSQLAlchemy/app.py
-Scanned: 2016-10-25 15:16:14.656427
-Vulnerability 1:
-File: flaskSQLAlchemy/app.py
- > User input at line 32, trigger word "get(":
- service = request.args.get('service')
-File: flaskSQLAlchemy/app.py
- > reaches line 34, trigger word "filter(":
- users = User.query.filter(User.json.has_key(service)).all()
-
-
-
-gnu4cn/flaskLearnings
-https://github.com/gnu4cn/flaskLearnings
-Entry file: flaskLearnings/demos/request_attributes.py
-Scanned: 2016-10-25 15:16:25.535869
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-argenis2021/FlaskTutorial
-https://github.com/argenis2021/FlaskTutorial
-Entry file: FlaskTutorial/app/__init__.py
-Scanned: 2016-10-25 15:16:27.284016
-No vulnerabilities found.
-
-
-ZaighumRajput/flaskPractice
-https://github.com/ZaighumRajput/flaskPractice
-Entry file: flaskPractice/chapter2/hello.py
-Scanned: 2016-10-25 15:16:28.771838
-No vulnerabilities found.
-
-
-GriMel/FlaskFirst
-https://github.com/GriMel/FlaskFirst
-Entry file: FlaskFirst/app/__init__.py
-Scanned: 2016-10-25 15:16:30.043183
-No vulnerabilities found.
-
-
-pepemontana7/flaskFinal
-https://github.com/pepemontana7/flaskFinal
-Entry file: flaskFinal/firstapp/hello.py
-Scanned: 2016-10-25 15:16:31.300360
-No vulnerabilities found.
-
-
-KotiyaSenya/FlaskLearn
-https://github.com/KotiyaSenya/FlaskLearn
-Entry file: FlaskLearn/flask_learn/__init__.py
-Scanned: 2016-10-25 15:16:32.845999
-Vulnerability 1:
-File: FlaskLearn/flask_learn/main/views/index.py
- > User input at line 10, trigger word "get(":
- user_agent = request.headers.get('User-Agent')
-File: FlaskLearn/flask_learn/main/views/index.py
- > reaches line 11, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.utcnow())
-
-
-
-johnwheeler/flask-ask
-https://github.com/johnwheeler/flask-ask
-Entry file: flask-ask/samples/session/session.py
-Scanned: 2016-10-25 15:16:36.367252
-Vulnerability 1:
-File: flask-ask/samples/session/session.py
- > User input at line 39, trigger word "get(":
- color = session.attributes.get(COLOR_KEY)
-Reassigned in:
- File: flask-ask/samples/session/session.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = statement(statement_text).simple_card(card_title, statement_text)
- File: flask-ask/samples/session/session.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = question(question_text).reprompt(question_text).simple_card(card_title, question_text)
-File: flask-ask/samples/session/session.py
- > reaches line 41, trigger word "render_template(":
- statement_text = render_template('known_color_bye',color=color)
-
-
-
-shn7798/FlaskZhihu
-https://github.com/shn7798/FlaskZhihu
-Entry file: FlaskZhihu/tests/test_orm.py
-Scanned: 2016-10-25 15:16:38.118185
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhangsen1992/flask
-https://github.com/zhangsen1992/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:39.116377
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-luojiyin1987/flask
-https://github.com/luojiyin1987/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:39.610964
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chrislinan/flask
-https://github.com/chrislinan/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:40.125537
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lagougou/flask
-https://github.com/lagougou/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:40.629867
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ryanmthompson/flask
-https://github.com/ryanmthompson/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:41.145380
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Mufflerman/Flask
-https://github.com/Mufflerman/Flask
-Entry file: None
-Scanned: 2016-10-25 15:16:41.673546
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tkirkland/Flask
-https://github.com/tkirkland/Flask
-Entry file: None
-Scanned: 2016-10-25 15:16:42.193258
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-glrh111/flask
-https://github.com/glrh111/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:42.706399
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-parampara/flask
-https://github.com/parampara/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:43.249071
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-maxweiber/flask
-https://github.com/maxweiber/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:43.779490
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rakeshkirola/Flask
-https://github.com/rakeshkirola/Flask
-Entry file: None
-Scanned: 2016-10-25 15:16:44.301388
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-caibitim/Flask
-https://github.com/caibitim/Flask
-Entry file: None
-Scanned: 2016-10-25 15:16:44.819122
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-syntaxSizer/flask
-https://github.com/syntaxSizer/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:45.367726
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gabrielecker/Flask
-https://github.com/gabrielecker/Flask
-Entry file: None
-Scanned: 2016-10-25 15:16:49.906554
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Dianalim209/flask
-https://github.com/Dianalim209/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:50.507169
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-moonoroman/flask
-https://github.com/moonoroman/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:52.017605
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ekusy/flask
-https://github.com/ekusy/flask
-Entry file: None
-Scanned: 2016-10-25 15:16:58.569100
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gaurikatyagi/Flask
-https://github.com/gaurikatyagi/Flask
-Entry file: None
-Scanned: 2016-10-25 15:17:06.101130
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mrffrm1234/flask
-https://github.com/mrffrm1234/flask
-Entry file: None
-Scanned: 2016-10-25 15:17:12.621167
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rockaja/flask
-https://github.com/rockaja/flask
-Entry file: None
-Scanned: 2016-10-25 15:17:14.138502
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bhops/flask
-https://github.com/bhops/flask
-Entry file: None
-Scanned: 2016-10-25 15:17:15.654409
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ooohiroyukiooo/flask
-https://github.com/ooohiroyukiooo/flask
-Entry file: None
-Scanned: 2016-10-25 15:17:26.169061
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-miguelgrinberg/flack
-https://github.com/miguelgrinberg/flack
-Entry file: flack/flack/__init__.py
-Scanned: 2016-10-25 15:17:29.861562
-Vulnerability 1:
-File: flack/flack/api/messages.py
- > User input at line 36, trigger word "get(":
- since = int(request.args.get('updated_since', '0'))
-Reassigned in:
- File: flack/flack/api/messages.py
- > Line 40: since = day_ago
-File: flack/flack/api/messages.py
- > reaches line 41, trigger word "filter(":
- msgs = Message.query.filter(Message.updated_at > since).order_by(Message.updated_at)
-
-Vulnerability 2:
-File: flack/flack/api/users.py
- > User input at line 38, trigger word "get(":
- users = users.filter_by(online=request.args.get('online') != '0')
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
-File: flack/flack/api/users.py
- > reaches line 40, trigger word "filter(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-
-Vulnerability 3:
-File: flack/flack/api/users.py
- > User input at line 40, trigger word "get(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
- File: flack/flack/api/users.py
- > Line 38: users = users.filter_by(online=request.args.get('online') != '0')
-File: flack/flack/api/users.py
- > reaches line 40, trigger word "filter(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-
-Vulnerability 4:
-File: flack/flack/api/users.py
- > User input at line 38, trigger word "get(":
- users = users.filter_by(online=request.args.get('online') != '0')
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
-File: flack/flack/api/users.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()])
-
-Vulnerability 5:
-File: flack/flack/api/users.py
- > User input at line 40, trigger word "get(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
- File: flack/flack/api/users.py
- > Line 38: users = users.filter_by(online=request.args.get('online') != '0')
-File: flack/flack/api/users.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()])
-
-
-
-enginebai/PyMessager
-https://github.com/enginebai/PyMessager
-Entry file: PyMessager/api.py
-Scanned: 2016-10-25 15:17:31.220108
-No vulnerabilities found.
-
-
-TwilioDevEd/sms2fa-flask
-https://github.com/TwilioDevEd/sms2fa-flask
-Entry file: sms2fa-flask/sms2fa_flask/__init__.py
-Scanned: 2016-10-25 15:17:35.927368
-Vulnerability 1:
-File: sms2fa-flask/sms2fa_flask/views.py
- > User input at line 51, trigger word "get(":
- user = User.query.get(session.get('user_email', '')) or abort(401)
-Reassigned in:
- File: sms2fa-flask/sms2fa_flask/views.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('secret_page'))
-File: sms2fa-flask/sms2fa_flask/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirmation.html',user=user)
-
-
-
-RoseOu/Flask-learning
-https://github.com/RoseOu/Flask-learning
-Entry file: None
-Scanned: 2016-10-25 15:17:44.111565
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-YUX-IO/gossl
-https://github.com/YUX-IO/gossl
-Entry file: gossl/app.py
-Scanned: 2016-10-25 15:17:53.143134
-No vulnerabilities found.
-
-
-yetship/the-way-to-flask
-https://github.com/yetship/the-way-to-flask
-Entry file: the-way-to-flask/code/application/__init__.py
-Scanned: 2016-10-25 15:17:56.449644
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-JoshData/parsey-mcparseface-server
-https://github.com/JoshData/parsey-mcparseface-server
-Entry file: parsey-mcparseface-server/server.py
-Scanned: 2016-10-25 15:17:57.833487
-No vulnerabilities found.
-
-
-YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg
-https://github.com/YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg
-Entry file: uwsgi-nginx-flask-docker-for-sinaimg/flask/app/main.py
-Scanned: 2016-10-25 15:18:00.765366
-No vulnerabilities found.
-
-
-patternexon/hello
-https://github.com/patternexon/hello
-Entry file: hello/hello.py
-Scanned: 2016-10-25 15:18:09.224356
-No vulnerabilities found.
-
-
-yassipo/webservice
-https://github.com/yassipo/webservice
-Entry file: webservice/app.py
-Scanned: 2016-10-25 15:18:10.548370
-No vulnerabilities found.
-
-
-tweddielin/flask-imsearch
-https://github.com/tweddielin/flask-imsearch
-Entry file: None
-Scanned: 2016-10-25 15:22:33.344981
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tweddielin/flask-imsearch.
-
-datademofun/heroku-basic-flask
-https://github.com/datademofun/heroku-basic-flask
-Entry file: heroku-basic-flask/app.py
-Scanned: 2016-10-25 15:22:38.270963
-No vulnerabilities found.
-
-
-simonbilskyrollins/Flask-Workshop
-https://github.com/simonbilskyrollins/Flask-Workshop
-Entry file: Flask-Workshop/step3.py
-Scanned: 2016-10-25 15:22:39.583731
-No vulnerabilities found.
-
-
-amey-sam/Flask-MailGun
-https://github.com/amey-sam/Flask-MailGun
-Entry file: None
-Scanned: 2016-10-25 15:22:41.411921
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun.
-
-hadesong/flask_weather
-https://github.com/hadesong/flask_weather
-Entry file: flask_weather/app_package/__init__.py
-Scanned: 2016-10-25 15:22:43.897356
-No vulnerabilities found.
-
-
-YUX-IO/flask-python351
-https://github.com/YUX-IO/flask-python351
-Entry file: flask-python351/sample-app/app.py
-Scanned: 2016-10-25 15:22:45.245749
-No vulnerabilities found.
-
-
-DullSmile/flasky
-https://github.com/DullSmile/flasky
-Entry file: None
-Scanned: 2016-10-25 15:22:45.770694
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-geochilmaru/flaskr
-https://github.com/geochilmaru/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:22:46.326243
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/geochilmaru/flaskr.
-
-hejiangping/flaskr
-https://github.com/hejiangping/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:22:46.850734
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hejiangping/flaskr.
-
-ealesid/flaskbook
-https://github.com/ealesid/flaskbook
-Entry file: flaskbook/app/__init__.py
-Scanned: 2016-10-25 15:22:58.574105
-Vulnerability 1:
-File: flaskbook/app/main/views.py
- > User input at line 19, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 27: pagination = query.order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_POSTS_PER_PAGE'], error_out=False)
- File: flaskbook/app/main/views.py
- > Line 30: posts = pagination.items
- File: flaskbook/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskbook/app/main/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskbook/app/main/views.py
- > User input at line 22, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 20: show_followed = False
- File: flaskbook/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskbook/app/main/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskbook/app/main/views.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 40: pagination = Post.objects(author_id=user).order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_POSTS_PER_PAGE'], error_out=False)
- File: flaskbook/app/main/views.py
- > Line 43: posts = pagination.items
-File: flaskbook/app/main/views.py
- > reaches line 44, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskbook/app/main/views.py
- > User input at line 118, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 120: page = Comment.objects(post_id=post).count() - 1 // current_app.config['FLASKBOOK_COMMENTS_PER_PAGE'] + 1
- File: flaskbook/app/main/views.py
- > Line 121: pagination = Comment.objects(post_id=post).order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskbook/app/main/views.py
- > Line 124: comments = pagination.items
- File: flaskbook/app/main/views.py
- > Line 117: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=1))
-File: flaskbook/app/main/views.py
- > reaches line 125, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskbook/app/main/views.py
- > User input at line 183, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 184: pagination = Follow.objects(followed=user).paginate(page,per_page=current_app.config['FLASKBOOK_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskbook/app/main/views.py
- > Line 187: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskbook/app/main/views.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskbook/app/main/views.py
- > reaches line 189, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskbook/app/main/views.py
- > User input at line 199, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 200: pagination = Follow.objects(follower=user).paginate(page,per_page=current_app.config['FLASKBOOK_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskbook/app/main/views.py
- > Line 203: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskbook/app/main/views.py
- > Line 198: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskbook/app/main/views.py
- > reaches line 205, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flaskbook/app/main/views.py
- > User input at line 229, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskbook/app/main/views.py
- > Line 230: pagination = Comment.objects.order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskbook/app/main/views.py
- > Line 233: comments = pagination.items
-File: flaskbook/app/main/views.py
- > reaches line 234, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-jake-bladt/flasksandbox
-https://github.com/jake-bladt/flasksandbox
-Entry file: flasksandbox/app/app.py
-Scanned: 2016-10-25 15:23:00.114722
-Vulnerability 1:
-File: flasksandbox/app/helpers.py
- > User input at line 4, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: flasksandbox/app/helpers.py
- > Line 6: page = int(page)
- File: flasksandbox/app/helpers.py
- > Line 8: page = 1
- File: flasksandbox/app/helpers.py
- > Line 9: object_list = query.paginate(page, paginate_by)
-File: flasksandbox/app/helpers.py
- > reaches line 10, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context)
-
-
-
-yoophi/flaskygram
-https://github.com/yoophi/flaskygram
-Entry file: None
-Scanned: 2016-10-25 15:23:02.115586
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flaskygram.
-
-Ifresher/Flaskr
-https://github.com/Ifresher/Flaskr
-Entry file: Flaskr/Flask.py
-Scanned: 2016-10-25 15:23:03.456749
-No vulnerabilities found.
-
-
-andresmguk/flasktaskr
-https://github.com/andresmguk/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:04.008346
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-minc-yang/flaskdemo
-https://github.com/minc-yang/flaskdemo
-Entry file: flaskdemo/flask_app2/my_app/__init__.py
-Scanned: 2016-10-25 15:23:06.572611
-Vulnerability 1:
-File: flaskdemo/flask_app2/my_app/product/views.py
- > User input at line 17, trigger word "get(":
- product = PRODUCTS.get(key)
-File: flaskdemo/flask_app2/my_app/product/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('product.html',product=product)
-
-
-
-zmrow/flasktaskr
-https://github.com/zmrow/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:07.098425
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Jpatcourtney/flasktasker
-https://github.com/Jpatcourtney/flasktasker
-Entry file: flasktasker/views.py
-Scanned: 2016-10-25 15:23:08.598119
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-liyocee/flaskr
-https://github.com/liyocee/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:09.124422
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/liyocee/flaskr.
-
-yanni-zhang/flaskweb
-https://github.com/yanni-zhang/flaskweb
-Entry file: flaskweb/app/__init__.py
-Scanned: 2016-10-25 15:23:11.441169
-Vulnerability 1:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 16: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 17: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 20: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 19, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 16: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 17: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 20: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 16: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 17: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 20: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 33, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 36: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 37: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 40: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 39, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 8:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 33, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 36: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 37: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 40: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 42, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 33, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 36: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 37: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 40: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 43, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 13: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 16: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 15, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 13: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 16: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 18, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 13: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 16: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 38: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 41: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 40, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 38: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 41: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 43, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 38: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 41: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 44, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskweb/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 22: show_followed = False
- File: flaskweb/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskweb/app/main/views.py
- > User input at line 29, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 33: posts = pagination.items
- File: flaskweb/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskweb/app/main/views.py
- > User input at line 56, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 57: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 60: posts = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 61, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flaskweb/app/main/views.py
- > User input at line 117, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 119: page = post.comments.count() - 1 / current_app.config['COMMENTS_PER_PAGE'] + 1
- File: flaskweb/app/main/views.py
- > Line 120: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 123: comments = pagination.items
- File: flaskweb/app/main/views.py
- > Line 116: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskweb/app/main/views.py
- > reaches line 124, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], comments=comments, form=form, pagination=pagination)
-
-Vulnerability 20:
-File: flaskweb/app/main/views.py
- > User input at line 179, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 180: pagination = user.followers.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 183: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskweb/app/main/views.py
- > Line 178: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 185, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注我的人', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flaskweb/app/main/views.py
- > User input at line 195, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 196: pagination = user.followed.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 199: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskweb/app/main/views.py
- > Line 194: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 201, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='我关注的人', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flaskweb/app/main/views.py
- > User input at line 209, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 210: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 213: comments = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 214, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-googoos/flasktaskr
-https://github.com/googoos/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:11.984073
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lg31415/flaskr
-https://github.com/lg31415/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:12.524116
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lg31415/flaskr.
-
-AliceLanniste/Flasky
-https://github.com/AliceLanniste/Flasky
-Entry file: None
-Scanned: 2016-10-25 15:23:14.192132
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AliceLanniste/Flasky.
-
-efrainmunoz/flasktaskr
-https://github.com/efrainmunoz/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:14.716093
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HansKramer/flaskr
-https://github.com/HansKramer/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:15.238881
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/HansKramer/flaskr.
-
-shorian/flaskr
-https://github.com/shorian/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:15.992354
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shorian/flaskr.
-
-Jpatcourtney/flasktaskr
-https://github.com/Jpatcourtney/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:16.523178
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-janejin8829/flaskangular-
-https://github.com/janejin8829/flaskangular-
-Entry file: None
-Scanned: 2016-10-25 15:23:17.793944
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/janejin8829/flaskangular-.
-
-ljxxcaijing/flaskblog
-https://github.com/ljxxcaijing/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:23:18.331813
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ljxxcaijing/flaskblog.
-
-mmoran0032/flaskwork
-https://github.com/mmoran0032/flaskwork
-Entry file: flaskwork/hello.py
-Scanned: 2016-10-25 15:23:35.666066
-No vulnerabilities found.
-
-
-Maxwell-Ying/flaskbook
-https://github.com/Maxwell-Ying/flaskbook
-Entry file: flaskbook/app/__init__.py
-Scanned: 2016-10-25 15:23:37.002436
-Vulnerability 1:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 2:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 3:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 4:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 5:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 6:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 7:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 8:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 9:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 10:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 11:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 12:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 13:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 14:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 15:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 16:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 17:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 18:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 19:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 20:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 21:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 22:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 23:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 24:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 25:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 26:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 27:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 28:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 29:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 30:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 31:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 32:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 33:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 34:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 35:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 36:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 37:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 38:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 39:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 40:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 41:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 42:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 43:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 44:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 45:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 46:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 47:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 48:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 49:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 50:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 51:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 52:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 53:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 54:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 55:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 56:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-
-
-bewithgaurav/flaskmap
-https://github.com/bewithgaurav/flaskmap
-Entry file: flaskmap/__init__.py
-Scanned: 2016-10-25 15:23:53.582059
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-ansel333/flaskr
-https://github.com/ansel333/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:54.161866
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ansel333/flaskr.
-
-ojgoyal/flaskr
-https://github.com/ojgoyal/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:23:54.690187
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ojgoyal/flaskr.
-
-ordenador/flaskrestful
-https://github.com/ordenador/flaskrestful
-Entry file: flaskrestful/flaskrestful.py
-Scanned: 2016-10-25 15:24:05.454671
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yvonnendutaw/flaskbook
-https://github.com/yvonnendutaw/flaskbook
-Entry file: flaskbook/app/__init__.py
-Scanned: 2016-10-25 15:25:07.541735
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhangjiewang/flasky
-https://github.com/zhangjiewang/flasky
-Entry file: None
-Scanned: 2016-10-25 15:25:08.076559
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kathure/flasky
-https://github.com/Kathure/flasky
-Entry file: None
-Scanned: 2016-10-25 15:25:08.597626
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-maxweiber/flaskr
-https://github.com/maxweiber/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:09.119481
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/maxweiber/flaskr.
-
-zjl1110/flaskdemo
-https://github.com/zjl1110/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 15:25:17.353964
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-EricGarza/flaskbyexample
-https://github.com/EricGarza/flaskbyexample
-Entry file: flaskbyexample/app.py
-Scanned: 2016-10-25 15:25:27.144835
-No vulnerabilities found.
-
-
-hoorn91/flaskproject
-https://github.com/hoorn91/flaskproject
-Entry file: flaskproject/app/hello.py
-Scanned: 2016-10-25 15:25:28.509811
-Vulnerability 1:
-File: flaskproject/app/hello.py
- > User input at line 70, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flaskproject/app/hello.py
- > reaches line 77, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-hongmaoxiao/flasky
-https://github.com/hongmaoxiao/flasky
-Entry file: None
-Scanned: 2016-10-25 15:25:29.036716
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jiuhuandao/Flaskr
-https://github.com/jiuhuandao/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-25 15:25:30.510178
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-nrugas/flasky
-https://github.com/nrugas/flasky
-Entry file: None
-Scanned: 2016-10-25 15:25:31.049116
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fromzeroedu/flaskbook
-https://github.com/fromzeroedu/flaskbook
-Entry file: flaskbook/application.py
-Scanned: 2016-10-25 15:25:33.651484
-Vulnerability 1:
-File: flaskbook/home/views.py
- > User input at line 15, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/home/views.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('home/home.html')
-File: flaskbook/home/views.py
- > reaches line 15, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 2:
-File: flaskbook/home/views.py
- > User input at line 15, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/home/views.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('home/home.html')
-File: flaskbook/home/views.py
- > reaches line 19, trigger word "filter(":
- feed_messages = Feed.objects.filter(user=user).order_by('-create_date')[10]
-
-Vulnerability 3:
-File: flaskbook/home/views.py
- > User input at line 15, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/home/views.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('home/home.html')
-File: flaskbook/home/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home/feed_home.html',user=user, form=form, feed_messages=feed_messages)
-
-Vulnerability 4:
-File: flaskbook/relationship/views.py
- > User input at line 14, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 18: rel = Relationship.get_relationship(logged_user, to_user)
- File: flaskbook/relationship/views.py
- > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user)
-File: flaskbook/relationship/views.py
- > reaches line 14, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 5:
-File: flaskbook/relationship/views.py
- > User input at line 14, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 18: rel = Relationship.get_relationship(logged_user, to_user)
- File: flaskbook/relationship/views.py
- > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user)
-File: flaskbook/relationship/views.py
- > reaches line 41, trigger word "render_template(":
- body_html = render_template('mail/relationship/added_friend.html',from_user=logged_user, to_user=to_user)
-
-Vulnerability 6:
-File: flaskbook/relationship/views.py
- > User input at line 14, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 18: rel = Relationship.get_relationship(logged_user, to_user)
- File: flaskbook/relationship/views.py
- > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user)
-File: flaskbook/relationship/views.py
- > reaches line 46, trigger word "render_template(":
- body_text = render_template('mail/relationship/added_friend.txt',from_user=logged_user, to_user=to_user)
-
-Vulnerability 7:
-File: flaskbook/relationship/views.py
- > User input at line 67, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 71: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 67, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 8:
-File: flaskbook/relationship/views.py
- > User input at line 67, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 71: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 74, trigger word "filter(":
- rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete()
-
-Vulnerability 9:
-File: flaskbook/relationship/views.py
- > User input at line 67, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 71: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 77, trigger word "filter(":
- reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete()
-
-Vulnerability 10:
-File: flaskbook/relationship/views.py
- > User input at line 91, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 95: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 91, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 11:
-File: flaskbook/relationship/views.py
- > User input at line 91, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 95: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 99, trigger word "filter(":
- rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete()
-
-Vulnerability 12:
-File: flaskbook/relationship/views.py
- > User input at line 91, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 95: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 102, trigger word "filter(":
- reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete()
-
-Vulnerability 13:
-File: flaskbook/relationship/views.py
- > User input at line 123, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 127: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 123, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 14:
-File: flaskbook/relationship/views.py
- > User input at line 123, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 127: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 131, trigger word "filter(":
- rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete()
-
-Vulnerability 15:
-File: flaskbook/user/views.py
- > User input at line 25, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 40, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 16:
-File: flaskbook/user/views.py
- > User input at line 27, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 40, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 17:
-File: flaskbook/user/views.py
- > User input at line 25, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 41, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 18:
-File: flaskbook/user/views.py
- > User input at line 27, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 41, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 19:
-File: flaskbook/user/views.py
- > User input at line 57, trigger word ".data":
- user = User.objects.filter(username=form.username.data).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 70: user = None
-File: flaskbook/user/views.py
- > reaches line 57, trigger word "filter(":
- user = User.objects.filter(username=form.username.data).first()
-
-Vulnerability 20:
-File: flaskbook/user/views.py
- > User input at line 64, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home_app.home'))
- File: flaskbook/user/views.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error)
-File: flaskbook/user/views.py
- > reaches line 66, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 21:
-File: flaskbook/user/views.py
- > User input at line 92, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 84: logged_user = None
- File: flaskbook/user/views.py
- > Line 93: rel = Relationship.get_relationship(logged_user, user)
- File: flaskbook/user/views.py
- > Line 85: rel = None
-File: flaskbook/user/views.py
- > reaches line 92, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 22:
-File: flaskbook/user/views.py
- > User input at line 92, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 84: logged_user = None
- File: flaskbook/user/views.py
- > Line 93: rel = Relationship.get_relationship(logged_user, user)
- File: flaskbook/user/views.py
- > Line 85: rel = None
-File: flaskbook/user/views.py
- > reaches line 118, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user/profile.html',user=user, logged_user=logged_user, rel=rel, friends=friends, friends_total=friends_total, friends_page=friends_page, form=form, profile_messages=profile_messages)
-
-Vulnerability 23:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 136, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 24:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 148, trigger word "filter(":
- if User.objects.filter(username=form.username.data.lower()).first():
-
-Vulnerability 25:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 154, trigger word "filter(":
- if User.objects.filter(email=form.email.data.lower()).first():
-
-Vulnerability 26:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 168, trigger word "render_template(":
- body_html = render_template('mail/user/change_email.html',user=user)
-
-Vulnerability 27:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 169, trigger word "render_template(":
- body_text = render_template('mail/user/change_email.txt',user=user)
-
-Vulnerability 28:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 180, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user)
-
-Vulnerability 29:
-File: flaskbook/user/views.py
- > User input at line 203, trigger word ".data":
- user = User.objects.filter(email=form.email.data.lower()).first()
-File: flaskbook/user/views.py
- > reaches line 203, trigger word "filter(":
- user = User.objects.filter(email=form.email.data.lower()).first()
-
-Vulnerability 30:
-File: flaskbook/user/views.py
- > User input at line 203, trigger word ".data":
- user = User.objects.filter(email=form.email.data.lower()).first()
-File: flaskbook/user/views.py
- > reaches line 212, trigger word "render_template(":
- body_html = render_template('mail/user/password_reset.html',user=user)
-
-Vulnerability 31:
-File: flaskbook/user/views.py
- > User input at line 203, trigger word ".data":
- user = User.objects.filter(email=form.email.data.lower()).first()
-File: flaskbook/user/views.py
- > reaches line 213, trigger word "render_template(":
- body_text = render_template('mail/user/password_reset.txt',user=user)
-
-Vulnerability 32:
-File: flaskbook/user/views.py
- > User input at line 261, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-File: flaskbook/user/views.py
- > reaches line 261, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 33:
-File: flaskbook/feed/views.py
- > User input at line 119, trigger word "get(":
- from_user = User.objects.get(username=session.get('username'))
-File: flaskbook/feed/views.py
- > reaches line 122, trigger word "filter(":
- existing_like = Message.objects.filter(parent=message_id, message_type=LIKE, from_user=from_user).count()
-
-
-
-yanni-zh/flaskweb
-https://github.com/yanni-zh/flaskweb
-Entry file: flaskweb/app/__init__.py
-Scanned: 2016-10-25 15:25:37.997444
-Vulnerability 1:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 16: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 17: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 20: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 19, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 16: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 17: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 20: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 16: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 17: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 20: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 33, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 36: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 37: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 40: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 39, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 8:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 33, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 36: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 37: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 40: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 42, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 33, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 36: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 37: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 40: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 43, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 13: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 16: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 15, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 13: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 16: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 18, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 12: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 13: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 16: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 38: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 41: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 40, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 38: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 41: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 43, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 37: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 38: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 41: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 44, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskweb/app/main/views.py
- > User input at line 41, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 39: show_followed = False
-File: flaskweb/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, Post=Post, amount=amount, comments=comments, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskweb/app/main/views.py
- > User input at line 46, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 47: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 50: posts = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, Post=Post, amount=amount, comments=comments, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskweb/app/main/views.py
- > User input at line 81, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 82: posts_pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 85: posts = posts_pagination.items
- File: flaskweb/app/main/views.py
- > Line 86: comments_pagination = user.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 89: comments = comments_pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 90, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, Post=Post, posts_pagination=posts_pagination, comments=comments, comments_pagination=comments_pagination)
-
-Vulnerability 19:
-File: flaskweb/app/main/views.py
- > User input at line 144, trigger word ".data":
- post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object())
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 155: ret_MAYBE_FUNCTION_NAME = render_template('add_post.html',form=form, title='添加文章')
-File: flaskweb/app/main/views.py
- > reaches line 154, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-
-Vulnerability 20:
-File: flaskweb/app/main/views.py
- > User input at line 144, trigger word ".data":
- post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object())
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 155: ret_MAYBE_FUNCTION_NAME = render_template('add_post.html',form=form, title='添加文章')
-File: flaskweb/app/main/views.py
- > reaches line 154, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-
-Vulnerability 21:
-File: flaskweb/app/main/views.py
- > User input at line 200, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 202: page = post.comments.count() - 1 / current_app.config['COMMENTS_PER_PAGE'] + 1
- File: flaskweb/app/main/views.py
- > Line 203: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 206: comments = pagination.items
- File: flaskweb/app/main/views.py
- > Line 199: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskweb/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',post=post, comments=comments, form=form, pagination=pagination)
-
-Vulnerability 22:
-File: flaskweb/app/main/views.py
- > User input at line 248, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 249: pagination = user.followers.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 252: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskweb/app/main/views.py
- > Line 247: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 254, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注我的人', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 23:
-File: flaskweb/app/main/views.py
- > User input at line 264, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 265: pagination = user.followed.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 268: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskweb/app/main/views.py
- > Line 263: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 270, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='我关注的人', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 24:
-File: flaskweb/app/main/views.py
- > User input at line 309, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 310: pagination = category.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 313: posts = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 314, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',id=id, posts=posts, pagination=pagination, categories=categories, title=category.name)
-
-
-
-pcpianobar/flaskr
-https://github.com/pcpianobar/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:38.523141
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pcpianobar/flaskr.
-
-mrdrms/flaskr
-https://github.com/mrdrms/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:39.028877
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrdrms/flaskr.
-
-fburkitt/flasktaskr
-https://github.com/fburkitt/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:39.539458
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-asimonia/flasktaskr
-https://github.com/asimonia/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:40.052994
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chestnutme/flaskie
-https://github.com/chestnutme/flaskie
-Entry file: flaskie/app/__init__.py
-Scanned: 2016-10-25 15:25:42.314183
-Vulnerability 1:
-File: flaskie/app/main/views.py
- > User input at line 18, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 29: posts = pagination.items
- File: flaskie/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskie/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskie/app/main/views.py
- > User input at line 21, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 19: show_followed = False
- File: flaskie/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskie/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskie/app/main/views.py
- > User input at line 36, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 37: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 39: posts = pagination.items
-File: flaskie/app/main/views.py
- > reaches line 40, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskie/app/main/views.py
- > User input at line 95, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 97: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskie/app/main/views.py
- > Line 99: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 102: comments = pagination.items
- File: flaskie/app/main/views.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskie/app/main/views.py
- > reaches line 103, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskie/app/main/views.py
- > User input at line 158, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 159: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskie/app/main/views.py
- > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flaskie/app/main/views.py
- > reaches line 164, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskie/app/main/views.py
- > User input at line 174, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 175: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'])
- File: flaskie/app/main/views.py
- > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskie/app/main/views.py
- > Line 173: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flaskie/app/main/views.py
- > reaches line 179, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-fengyu225/flaskr
-https://github.com/fengyu225/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:42.857115
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/fengyu225/flaskr.
-
-jbussdieker/flaskr
-https://github.com/jbussdieker/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:43.419094
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jbussdieker/flaskr.
-
-sisyphus1993/flaskreview
-https://github.com/sisyphus1993/flaskreview
-Entry file: flaskreview/app/__init__.py
-Scanned: 2016-10-25 15:25:45.295532
-Vulnerability 1:
-File: flaskreview/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskreview/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskreview/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskreview/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskreview/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskreview/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskreview/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskreview/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskreview/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskreview/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskreview/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskreview/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskreview/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskreview/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskreview/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskreview/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskreview/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskreview/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskreview/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskreview/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskreview/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskreview/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 31: posts = pagination.items
- File: flaskreview/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskreview/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 22: show_followed = False
- File: flaskreview/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskreview/app/main/views.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 40: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 42: posts = pagination.items
-File: flaskreview/app/main/views.py
- > reaches line 43, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flaskreview/app/main/views.py
- > User input at line 102, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 104: page = post.comments.count() - 1 // 20 + 1
- File: flaskreview/app/main/views.py
- > Line 105: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 107: comments = pagination.items
- File: flaskreview/app/main/views.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskreview/app/main/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flaskreview/app/main/views.py
- > User input at line 167, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 168: pagination = user.followers.paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 170: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskreview/app/main/views.py
- > Line 166: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 172, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flaskreview/app/main/views.py
- > User input at line 183, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 184: pagination = user.followed.paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 186: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskreview/app/main/views.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskreview/app/main/views.py
- > reaches line 188, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flaskreview/app/main/views.py
- > User input at line 213, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskreview/app/main/views.py
- > Line 214: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=20, error_out=False)
- File: flaskreview/app/main/views.py
- > Line 217: comments = pagination.items
-File: flaskreview/app/main/views.py
- > reaches line 218, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-richardqlin/flaskralchemy
-https://github.com/richardqlin/flaskralchemy
-Entry file: None
-Scanned: 2016-10-25 15:25:46.733171
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy.
-
-mikomwang/flaskr
-https://github.com/mikomwang/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:47.253426
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mikomwang/flaskr.
-
-anngle/flaskweb
-https://github.com/anngle/flaskweb
-Entry file: flaskweb/hello2.py
-Scanned: 2016-10-25 15:25:48.880202
-Vulnerability 1:
-File: flaskweb/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 22: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=3, error_out=False)
- File: flaskweb/app/main/views.py
- > Line 24: posts = pagination.items
- File: flaskweb/app/main/views.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
- File: flaskweb/app/main/views.py
- > Line 20: posts = Post.query.order_by(Post.timestamp.desc()).all()
-File: flaskweb/app/main/views.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-
-
-Aprimus1/flasktaskr
-https://github.com/Aprimus1/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:25:49.400350
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cuttlesoft/flask-bitmapist
-https://github.com/cuttlesoft/flask-bitmapist
-Entry file: flask-bitmapist/tests/conftest.py
-Scanned: 2016-10-25 15:25:54.896809
-No vulnerabilities found.
-
-
-Riffstation/flaskutilsexample
-https://github.com/Riffstation/flaskutilsexample
-Entry file: flaskutilsexample/src/app/__init__.py
-Scanned: 2016-10-25 15:25:56.355993
-No vulnerabilities found.
-
-
-meloalright/flask
-https://github.com/meloalright/flask
-Entry file: None
-Scanned: 2016-10-25 15:25:57.390782
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-paulgoblin/flask
-https://github.com/paulgoblin/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:06.924516
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tayan-serna/flask
-https://github.com/tayan-serna/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:08.464569
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dolv/Flask
-https://github.com/dolv/Flask
-Entry file: None
-Scanned: 2016-10-25 15:26:08.995084
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Aslkayn/flask
-https://github.com/Aslkayn/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:09.504204
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Mamun-dueee/flask
-https://github.com/Mamun-dueee/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:10.020122
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gisumwa/Flask
-https://github.com/gisumwa/Flask
-Entry file: None
-Scanned: 2016-10-25 15:26:18.585266
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhouleian/flask
-https://github.com/zhouleian/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:28.116421
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-virtue1990/flask
-https://github.com/virtue1990/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:29.641280
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dhaval38/Flask
-https://github.com/dhaval38/Flask
-Entry file: None
-Scanned: 2016-10-25 15:26:30.186137
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nppat/Flask
-https://github.com/nppat/Flask
-Entry file: None
-Scanned: 2016-10-25 15:26:31.818793
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dmitry-moroz/flask
-https://github.com/dmitry-moroz/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:32.327809
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-TeamDroneFireman/Flask
-https://github.com/TeamDroneFireman/Flask
-Entry file: None
-Scanned: 2016-10-25 15:26:34.849130
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sushmit86/Flask
-https://github.com/sushmit86/Flask
-Entry file: None
-Scanned: 2016-10-25 15:26:39.394854
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vorkos/flask
-https://github.com/vorkos/flask
-Entry file: None
-Scanned: 2016-10-25 15:26:39.923482
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-timmyreilly/intro-to-flask
-https://github.com/timmyreilly/intro-to-flask
-Entry file: intro-to-flask/hello.py
-Scanned: 2016-10-25 15:26:43.146695
-No vulnerabilities found.
-
-
-Revolution1/Flask-WhooshAlchemyPlus
-https://github.com/Revolution1/Flask-WhooshAlchemyPlus
-Entry file: Flask-WhooshAlchemyPlus/test/test_all.py
-Scanned: 2016-10-25 15:26:44.943717
-No vulnerabilities found.
-
-
-sloria/flask-konch
-https://github.com/sloria/flask-konch
-Entry file: flask-konch/example_app/hello.py
-Scanned: 2016-10-25 15:26:46.241252
-No vulnerabilities found.
-
-
-cloverstd/flask-wechatpy
-https://github.com/cloverstd/flask-wechatpy
-Entry file: flask-wechatpy/demo.py
-Scanned: 2016-10-25 15:26:48.115713
-No vulnerabilities found.
-
-
-postrational/rest_api_demo
-https://github.com/postrational/rest_api_demo
-Entry file: rest_api_demo/rest_api_demo/app.py
-Scanned: 2016-10-25 15:26:50.112747
-Vulnerability 1:
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > User input at line 8, trigger word "get(":
- category_id = data.get('category_id')
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > reaches line 9, trigger word "filter(":
- category = Category.query.filter(Category.id == category_id).one()
-
-Vulnerability 2:
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > User input at line 19, trigger word "get(":
- category_id = data.get('category_id')
-File: rest_api_demo/rest_api_demo/api/blog/business.py
- > reaches line 20, trigger word "filter(":
- post.category = Category.query.filter(Category.id == category_id).one()
-
-
-
-patternexon/hello
-https://github.com/patternexon/hello
-Entry file: hello/hello.py
-Scanned: 2016-10-25 15:26:57.850304
-No vulnerabilities found.
-
-
-QuentinMoss/reimagined-computing-machine
-https://github.com/QuentinMoss/reimagined-computing-machine
-Entry file: reimagined-computing-machine/app/__init__.py
-Scanned: 2016-10-25 15:26:59.195968
-No vulnerabilities found.
-
-
-13923858795/Tutorial
-https://github.com/13923858795/Tutorial
-Entry file: Tutorial/my/app/__init__.py
-Scanned: 2016-10-25 15:27:07.091368
-Vulnerability 1:
-File: Tutorial/my/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 33: posts = pagination.items
- File: Tutorial/my/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Tutorial/my/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 23: show_followed = False
- File: Tutorial/my/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Tutorial/my/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 44: posts = pagination.items
-File: Tutorial/my/app/main/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Tutorial/my/app/main/views.py
- > User input at line 109, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 111: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Tutorial/my/app/main/views.py
- > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 116: comments = pagination.items
- File: Tutorial/my/app/main/views.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Tutorial/my/app/main/views.py
- > reaches line 117, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Tutorial/my/app/main/views.py
- > User input at line 176, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 177: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 180: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Tutorial/my/app/main/views.py
- > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 182, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Tutorial/my/app/main/views.py
- > User input at line 193, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 194: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 197: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Tutorial/my/app/main/views.py
- > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Tutorial/my/app/main/views.py
- > reaches line 199, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Tutorial/my/app/main/views.py
- > User input at line 231, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Tutorial/my/app/main/views.py
- > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Tutorial/my/app/main/views.py
- > Line 235: comments = pagination.items
-File: Tutorial/my/app/main/views.py
- > reaches line 236, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-szparag3/flask-hello-world
-https://github.com/szparag3/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 15:27:14.631803
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DanceCats/DanceCat
-https://github.com/DanceCats/DanceCat
-Entry file: DanceCat/DanceCat/__init__.py
-Scanned: 2016-10-25 15:27:21.006936
-Vulnerability 1:
-File: DanceCat/DanceCat/Views.py
- > User input at line 252, trigger word "form[":
- triggered_job = QueryDataJob.query.get_or_404(request.form['id'])
-Reassigned in:
- File: DanceCat/DanceCat/Views.py
- > Line 256: tracker = TrackJobRun(triggered_job.job_id)
-File: DanceCat/DanceCat/Views.py
- > reaches line 269, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('ack''tracker_id'Truetracker.track_job_run_id)
-
-Vulnerability 2:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 45, trigger word "get(":
- connection_id = received_data.get('connectionId', 0)
-Reassigned in:
- File: DanceCat/DanceCat/Socket.py
- > Line 55: running_connection = Connection.query.get(connection_id)
- File: DanceCat/DanceCat/Socket.py
- > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60))
- File: DanceCat/DanceCat/Socket.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime)
- File: DanceCat/DanceCat/Socket.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)])
- File: DanceCat/DanceCat/Socket.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!')
- File: DanceCat/DanceCat/Socket.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!')
- File: DanceCat/DanceCat/Socket.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 3:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 46, trigger word "get(":
- query = received_data.get('query', '')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 4:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 55, trigger word "get(":
- running_connection = Connection.query.get(connection_id)
-Reassigned in:
- File: DanceCat/DanceCat/Socket.py
- > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60))
- File: DanceCat/DanceCat/Socket.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime)
- File: DanceCat/DanceCat/Socket.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)])
- File: DanceCat/DanceCat/Socket.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!')
- File: DanceCat/DanceCat/Socket.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!')
- File: DanceCat/DanceCat/Socket.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 5:
-File: DanceCat/DanceCat/Socket.py
- > User input at line 58, trigger word "get(":
- connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60))
-Reassigned in:
- File: DanceCat/DanceCat/Socket.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime)
- File: DanceCat/DanceCat/Socket.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)])
- File: DanceCat/DanceCat/Socket.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!')
- File: DanceCat/DanceCat/Socket.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!')
- File: DanceCat/DanceCat/Socket.py
- > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!')
-File: DanceCat/DanceCat/Socket.py
- > reaches line 68, trigger word "execute(":
- connector.execute(query)
-
-Vulnerability 6:
-File: DanceCat/DanceCat/JobWorker.py
- > User input at line 91, trigger word "get(":
- job = QueryDataJob.query.get(job_id)
-Reassigned in:
- File: DanceCat/DanceCat/JobWorker.py
- > Line 99: db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0))
- File: DanceCat/DanceCat/JobWorker.py
- > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all()
- File: DanceCat/DanceCat/JobWorker.py
- > Line 135: ret_MAYBE_FUNCTION_NAME = results
- File: DanceCat/DanceCat/JobWorker.py
- > Line 153: ret_MAYBE_FUNCTION_NAME = None
-File: DanceCat/DanceCat/JobWorker.py
- > reaches line 110, trigger word "execute(":
- db_connector.execute(job.query_string)
-
-Vulnerability 7:
-File: DanceCat/DanceCat/JobWorker.py
- > User input at line 99, trigger word "get(":
- db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0))
-Reassigned in:
- File: DanceCat/DanceCat/JobWorker.py
- > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all()
- File: DanceCat/DanceCat/JobWorker.py
- > Line 135: ret_MAYBE_FUNCTION_NAME = results
- File: DanceCat/DanceCat/JobWorker.py
- > Line 153: ret_MAYBE_FUNCTION_NAME = None
-File: DanceCat/DanceCat/JobWorker.py
- > reaches line 110, trigger word "execute(":
- db_connector.execute(job.query_string)
-
-
-
-menghao2015/flask_blog
-https://github.com/menghao2015/flask_blog
-Entry file: flask_blog/app/__init__.py
-Scanned: 2016-10-25 15:27:24.790851
-Vulnerability 1:
-File: flask_blog/app/main/views.py
- > User input at line 16, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 17: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 19: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html')
-File: flask_blog/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='index')
-
-Vulnerability 2:
-File: flask_blog/app/main/views.py
- > User input at line 30, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 31: pagination = Post.query.filter_by(lable_id=lable_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 36: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html')
-File: flask_blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, lable=lable, mark='lables')
-
-Vulnerability 3:
-File: flask_blog/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 45: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 47: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html')
-File: flask_blog/app/main/views.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='all')
-
-Vulnerability 4:
-File: flask_blog/app/main/views.py
- > User input at line 60, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 61: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 63: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html')
-File: flask_blog/app/main/views.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='mind_study')
-
-Vulnerability 5:
-File: flask_blog/app/main/views.py
- > User input at line 75, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 76: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 78: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html')
-File: flask_blog/app/main/views.py
- > reaches line 79, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='others')
-
-Vulnerability 6:
-File: flask_blog/app/main/views.py
- > User input at line 90, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 91: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 93: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 96: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html')
-File: flask_blog/app/main/views.py
- > reaches line 94, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='bug')
-
-
-
-mussaimo/auth-flask
-https://github.com/mussaimo/auth-flask
-Entry file: auth-flask/app.py
-Scanned: 2016-10-25 15:27:30.087897
-No vulnerabilities found.
-
-
-AmarKalabic/Football-Stream-Finder--Flask-
-https://github.com/AmarKalabic/Football-Stream-Finder--Flask-
-Entry file: Football-Stream-Finder--Flask-/main.py
-Scanned: 2016-10-25 15:27:31.550084
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-YUX-IO/flask-python351
-https://github.com/YUX-IO/flask-python351
-Entry file: flask-python351/sample-app/app.py
-Scanned: 2016-10-25 15:27:32.889207
-No vulnerabilities found.
-
-
-tuppa/flaskapp
-https://github.com/tuppa/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:27:33.407109
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tuppa/flaskapp.
-
-quyip8818/flaskrestful
-https://github.com/quyip8818/flaskrestful
-Entry file: flaskrestful/server/model_cloudsql.py
-Scanned: 2016-10-25 15:27:34.810810
-No vulnerabilities found.
-
-
-dribnet/flaskapp
-https://github.com/dribnet/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:27:35.333135
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dribnet/flaskapp.
-
-gzeinieh/flaskr
-https://github.com/gzeinieh/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:27:35.864095
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/gzeinieh/flaskr.
-
-rhildreth/flaskbook
-https://github.com/rhildreth/flaskbook
-Entry file: flaskbook/hello.py
-Scanned: 2016-10-25 15:27:44.146906
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-gandhk/flasklearn
-https://github.com/gandhk/flasklearn
-Entry file: flasklearn/main.py
-Scanned: 2016-10-25 15:27:45.562343
-No vulnerabilities found.
-
-
-Apophus/flaskdb
-https://github.com/Apophus/flaskdb
-Entry file: flaskdb/fdb.py
-Scanned: 2016-10-25 15:27:46.919675
-No vulnerabilities found.
-
-
-TacticalGoat/flasktest
-https://github.com/TacticalGoat/flasktest
-Entry file: flasktest/app/__init__.py
-Scanned: 2016-10-25 15:27:48.312157
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-WayneChen1987/flasky
-https://github.com/WayneChen1987/flasky
-Entry file: None
-Scanned: 2016-10-25 15:27:48.842048
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bwghughes/flaskdev
-https://github.com/bwghughes/flaskdev
-Entry file: flaskdev/hello.py
-Scanned: 2016-10-25 15:27:50.702913
-Vulnerability 1:
-File: flaskdev/tests.py
- > User input at line 10, trigger word "get(":
- res = client.get(url_for('hello_world'))
-File: flaskdev/tests.py
- > reaches line 10, trigger word "url_for(":
- res = client.get(url_for('hello_world'))
-
-
-
-matinde/flasktaskr
-https://github.com/matinde/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:27:51.238918
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-William0423/flaskybooklearn
-https://github.com/William0423/flaskybooklearn
-Entry file: flaskybooklearn/app/__init__.py
-Scanned: 2016-10-25 15:27:53.035203
-Vulnerability 1:
-File: flaskybooklearn/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskybooklearn/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskybooklearn/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskybooklearn/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskybooklearn/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskybooklearn/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskybooklearn/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskybooklearn/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskybooklearn/app/api_1_0/users.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/users.py
- > reaches line 50, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_post_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_post_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskybooklearn/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskybooklearn/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskybooklearn/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskybooklearn/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 32: posts = pagination.items
- File: flaskybooklearn/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskybooklearn/app/main/views.py
- > User input at line 24, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 22: show_followed = False
- File: flaskybooklearn/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskybooklearn/app/main/views.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 44: posts = pagination.items
-File: flaskybooklearn/app/main/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flaskybooklearn/app/main/views.py
- > User input at line 104, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskybooklearn/app/main/views.py
- > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 111: comments = pagination.items
- File: flaskybooklearn/app/main/views.py
- > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskybooklearn/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flaskybooklearn/app/main/views.py
- > User input at line 171, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskybooklearn/app/main/views.py
- > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 177, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flaskybooklearn/app/main/views.py
- > User input at line 188, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskybooklearn/app/main/views.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskybooklearn/app/main/views.py
- > reaches line 194, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flaskybooklearn/app/main/views.py
- > User input at line 219, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskybooklearn/app/main/views.py
- > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskybooklearn/app/main/views.py
- > Line 223: comments = pagination.items
-File: flaskybooklearn/app/main/views.py
- > reaches line 224, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-powerlanguage/flasktaskr
-https://github.com/powerlanguage/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:27:53.559808
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cmacro/flaskblog
-https://github.com/cmacro/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:27:54.090032
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cmacro/flaskblog.
-
-vrofze/flasky
-https://github.com/vrofze/flasky
-Entry file: None
-Scanned: 2016-10-25 15:27:54.604422
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ccsaber/flasker
-https://github.com/ccsaber/flasker
-Entry file: flasker/app/__init__.py
-Scanned: 2016-10-25 15:27:56.631273
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-IronFist16/flasky
-https://github.com/IronFist16/flasky
-Entry file: None
-Scanned: 2016-10-25 15:27:57.137857
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bsdtux/flaskblog
-https://github.com/bsdtux/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:27:58.655226
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bsdtux/flaskblog.
-
-terryllowery/flasktaskr
-https://github.com/terryllowery/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:00.170405
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-moerekh/flaskyflaskssy
-https://github.com/moerekh/flaskyflaskssy
-Entry file: flaskyflaskssy/flasky.py
-Scanned: 2016-10-25 15:28:06.893048
-No vulnerabilities found.
-
-
-Gre4tWhite/Flasknightmare
-https://github.com/Gre4tWhite/Flasknightmare
-Entry file: Flasknightmare/app/__init__.py
-Scanned: 2016-10-25 15:28:12.700215
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-vinay13/Flaskngular
-https://github.com/vinay13/Flaskngular
-Entry file: Flaskngular/flask_app.py
-Scanned: 2016-10-25 15:28:14.133302
-No vulnerabilities found.
-
-
-enricobacis/flaskey
-https://github.com/enricobacis/flaskey
-Entry file: flaskey/app.py
-Scanned: 2016-10-25 15:28:16.682979
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-nehamarne/flaskdemo
-https://github.com/nehamarne/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 15:28:22.205792
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ejakait/flaskpro
-https://github.com/ejakait/flaskpro
-Entry file: None
-Scanned: 2016-10-25 15:28:36.049118
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wrzto/flasky
-https://github.com/wrzto/flasky
-Entry file: None
-Scanned: 2016-10-25 15:28:36.613452
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-William0423/flaskylearn
-https://github.com/William0423/flaskylearn
-Entry file: flaskylearn/app/__init__.py
-Scanned: 2016-10-25 15:28:38.087103
-No vulnerabilities found.
-
-
-bhsantos11/flaskwebapp
-https://github.com/bhsantos11/flaskwebapp
-Entry file: flaskwebapp/flaskwebsite/__init__.py
-Scanned: 2016-10-25 15:28:39.510087
-No vulnerabilities found.
-
-
-jerodestapa/flasktodo
-https://github.com/jerodestapa/flasktodo
-Entry file: flasktodo/views.py
-Scanned: 2016-10-25 15:28:41.012131
-No vulnerabilities found.
-
-
-uptownjimmy/flasktaskr
-https://github.com/uptownjimmy/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:41.545948
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kirazz/flaskywebblog
-https://github.com/kirazz/flaskywebblog
-Entry file: flaskywebblog/git/webblog/app/__init__.py
-Scanned: 2016-10-25 15:28:44.832656
-Vulnerability 1:
-File: flaskywebblog/git/webblog/app/main/views.py
- > User input at line 19, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 20: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=5, error_out=False)
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 22: posts = pagination.items
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskywebblog/git/webblog/app/main/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flaskywebblog/git/webblog/app/main/views.py
- > User input at line 91, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 93: page = post.comments.count() - 1 // 5 + 1
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 95: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=5, error_out=False)
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 97: comments = pagination.items
- File: flaskywebblog/git/webblog/app/main/views.py
- > Line 90: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskywebblog/git/webblog/app/main/views.py
- > reaches line 98, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-
-
-vnxichow/flaskapp
-https://github.com/vnxichow/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:28:45.377337
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vnxichow/flaskapp.
-
-getser/flaskapiblog
-https://github.com/getser/flaskapiblog
-Entry file: flaskapiblog/__init__.py
-Scanned: 2016-10-25 15:28:46.771879
-Vulnerability 1:
-File: flaskapiblog/views.py
- > User input at line 112, trigger word "get(":
- post = Post.query.get(post_id)
-File: flaskapiblog/views.py
- > reaches line 115, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('post'post._asdict())
-
-Vulnerability 2:
-File: flaskapiblog/views.py
- > User input at line 187, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: flaskapiblog/views.py
- > Line 193: visitor = Visitor(email=email)
-File: flaskapiblog/views.py
- > reaches line 197, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True))
-
-Vulnerability 3:
-File: flaskapiblog/views.py
- > User input at line 187, trigger word "get(":
- email = request.json.get('email')
-Reassigned in:
- File: flaskapiblog/views.py
- > Line 193: visitor = Visitor(email=email)
-File: flaskapiblog/views.py
- > reaches line 197, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True))
-
-
-
-Paopand1/flasktaskr
-https://github.com/Paopand1/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:47.312619
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gabrielssilva/flasktasks
-https://github.com/gabrielssilva/flasktasks
-Entry file: flasktasks/flasktasks/__init__.py
-Scanned: 2016-10-25 15:28:49.915174
-Vulnerability 1:
-File: flasktasks/flasktasks/views.py
- > User input at line 35, trigger word "get(":
- mission = Mission.query.get_or_404(request.args.get('mission_id'))
-Reassigned in:
- File: flasktasks/flasktasks/views.py
- > Line 33: mission = None
-File: flasktasks/flasktasks/views.py
- > reaches line 44, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('task/index.html',tasks=tasks_by_status, mission=mission)
-
-Vulnerability 2:
-File: flasktasks/flasktasks/views.py
- > User input at line 96, trigger word "get(":
- color = Color(int(request.form.get('color_id')))
-Reassigned in:
- File: flasktasks/flasktasks/views.py
- > Line 99: tag = Tag(request.form.get('name'), color)
- File: flasktasks/flasktasks/views.py
- > Line 104: colors = {color.name : color.value for color in Color}
- File: flasktasks/flasktasks/views.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('missions'))
-File: flasktasks/flasktasks/views.py
- > reaches line 105, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tags/new.html',colors=colors)
-
-
-
-playgrdstar/flaskapp
-https://github.com/playgrdstar/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:28:50.429970
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp.
-
-caspii/flaskr
-https://github.com/caspii/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:50.951876
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/caspii/flaskr.
-
-tj621/flaskr
-https://github.com/tj621/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:51.470014
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/tj621/flaskr.
-
-LinMingjie/flaskr
-https://github.com/LinMingjie/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:51.980795
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/LinMingjie/flaskr.
-
-mayreeh/Flasky
-https://github.com/mayreeh/Flasky
-Entry file: None
-Scanned: 2016-10-25 15:28:52.535166
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mayreeh/Flasky.
-
-supor/flaskr
-https://github.com/supor/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:53.045470
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/supor/flaskr.
-
-ridnarong/flasky
-https://github.com/ridnarong/flasky
-Entry file: None
-Scanned: 2016-10-25 15:28:53.570451
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cjfoster10/flasktaskr
-https://github.com/cjfoster10/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:54.086493
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pkml/flasktaskr
-https://github.com/pkml/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:28:54.611787
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-davidwangv5/flasky
-https://github.com/davidwangv5/flasky
-Entry file: None
-Scanned: 2016-10-25 15:28:55.133489
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rahulmkumar/flaskapp
-https://github.com/rahulmkumar/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:28:55.652680
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp.
-
-seangilleran/flasko
-https://github.com/seangilleran/flasko
-Entry file: flasko/flasko/__init__.py
-Scanned: 2016-10-25 15:28:58.602601
-Vulnerability 1:
-File: flasko/flasko/blueprints/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasko/flasko/blueprints/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False)
- File: flasko/flasko/blueprints/views.py
- > Line 27: posts = pagination.items
- File: flasko/flasko/blueprints/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('views.index'))
-File: flasko/flasko/blueprints/views.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',disable_header=True, hello=random_post_question(), form=form, pagination=pagination, posts=posts, timestamp=datetime.utcnow())
-
-
-
-weisongchen/flaskexercise
-https://github.com/weisongchen/flaskexercise
-Entry file: flaskexercise/hello.py
-Scanned: 2016-10-25 15:29:06.898396
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskexercise/venv/lib/python2.7/sre_compile.py
-
-weisongchen/flaskapp
-https://github.com/weisongchen/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:29:07.583642
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/weisongchen/flaskapp.
-
-chenglinguang/flaskky
-https://github.com/chenglinguang/flaskky
-Entry file: flaskky/hello1.py
-Scanned: 2016-10-25 15:29:09.224331
-No vulnerabilities found.
-
-
-CharlieCheng2014/Flask-micro-flask
-https://github.com/CharlieCheng2014/Flask-micro-flask
-Entry file: Flask-micro-flask/app/__init__.py
-Scanned: 2016-10-25 15:29:10.589498
-No vulnerabilities found.
-
-
-er3456qi/FlaskBlog
-https://github.com/er3456qi/FlaskBlog
-Entry file: FlaskBlog/app/__init__.py
-Scanned: 2016-10-25 15:29:15.834463
-Vulnerability 1:
-File: FlaskBlog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE'])
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 16: next = None
-File: FlaskBlog/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: FlaskBlog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE'])
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 16: next = None
-File: FlaskBlog/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: FlaskBlog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE'])
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: FlaskBlog/app/api_1_0/posts.py
- > Line 16: next = None
-File: FlaskBlog/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: FlaskBlog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: FlaskBlog/app/api_1_0/users.py
- > Line 20: prev = None
- File: FlaskBlog/app/api_1_0/users.py
- > Line 23: next = None
-File: FlaskBlog/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: FlaskBlog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: FlaskBlog/app/api_1_0/users.py
- > Line 20: prev = None
- File: FlaskBlog/app/api_1_0/users.py
- > Line 23: next = None
-File: FlaskBlog/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: FlaskBlog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: FlaskBlog/app/api_1_0/users.py
- > Line 20: prev = None
- File: FlaskBlog/app/api_1_0/users.py
- > Line 23: next = None
-File: FlaskBlog/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: FlaskBlog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: FlaskBlog/app/api_1_0/users.py
- > Line 42: prev = None
- File: FlaskBlog/app/api_1_0/users.py
- > Line 45: next = None
-File: FlaskBlog/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: FlaskBlog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: FlaskBlog/app/api_1_0/users.py
- > Line 42: prev = None
- File: FlaskBlog/app/api_1_0/users.py
- > Line 45: next = None
-File: FlaskBlog/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: FlaskBlog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: FlaskBlog/app/api_1_0/users.py
- > Line 42: prev = None
- File: FlaskBlog/app/api_1_0/users.py
- > Line 45: next = None
-File: FlaskBlog/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: FlaskBlog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 18: next = None
-File: FlaskBlog/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: FlaskBlog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 18: next = None
-File: FlaskBlog/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: FlaskBlog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 18: next = None
-File: FlaskBlog/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: FlaskBlog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 46: next = None
-File: FlaskBlog/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: FlaskBlog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 46: next = None
-File: FlaskBlog/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: FlaskBlog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: FlaskBlog/app/api_1_0/comments.py
- > Line 46: next = None
-File: FlaskBlog/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: FlaskBlog/app/main/views.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 18: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE'])
- File: FlaskBlog/app/main/views.py
- > Line 20: posts = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 21, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination)
-
-Vulnerability 17:
-File: FlaskBlog/app/main/views.py
- > User input at line 27, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 28: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE'])
- File: FlaskBlog/app/main/views.py
- > Line 30: posts = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination)
-
-Vulnerability 18:
-File: FlaskBlog/app/main/views.py
- > User input at line 109, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 111: page = post.comments.count() - 1 / current_app.config['BLOG_COMMENTS_PER_PAGE'] + 1
- File: FlaskBlog/app/main/views.py
- > Line 112: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['BLOG_COMMENTS_PER_PAGE'])
- File: FlaskBlog/app/main/views.py
- > Line 114: comments = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: FlaskBlog/app/main/views.py
- > reaches line 115, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',post=post, form=form, comments=comments, pagination=pagination)
-
-Vulnerability 19:
-File: FlaskBlog/app/main/views.py
- > User input at line 173, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 174: pagination = user.followers.paginate(page,per_page=current_app.config['BLOG_FOLLOWERS_PER_PAGE'])
- File: FlaskBlog/app/main/views.py
- > Line 177: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: FlaskBlog/app/main/views.py
- > Line 172: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskBlog/app/main/views.py
- > reaches line 179, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 20:
-File: FlaskBlog/app/main/views.py
- > User input at line 193, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 194: pagination = user.following.paginate(page,per_page=current_app.config['BLOG_FOLLOWERS_PER_PAGE'])
- File: FlaskBlog/app/main/views.py
- > Line 197: follows = ['user''timestamp'item.followingitem.timestamp for item in pagination.items]
- File: FlaskBlog/app/main/views.py
- > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskBlog/app/main/views.py
- > reaches line 199, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.following', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: FlaskBlog/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 212: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['BLOG_FOLLOWERS_PER_PAGE'])
- File: FlaskBlog/app/main/views.py
- > Line 214: comments = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 215, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-vishwanath79/FlaskURLAPI
-https://github.com/vishwanath79/FlaskURLAPI
-Entry file: FlaskURLAPI/app.py
-Scanned: 2016-10-25 15:29:23.126139
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskURLAPI/hadoopify/lib/python2.7/sre_compile.py
-
-QMickael/flaskBlog
-https://github.com/QMickael/flaskBlog
-Entry file: flaskBlog/app/app.py
-Scanned: 2016-10-25 15:29:24.742470
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-CircaVictor/flaskTemplate
-https://github.com/CircaVictor/flaskTemplate
-Entry file: flaskTemplate/flask-app/app/__init__.py
-Scanned: 2016-10-25 15:29:27.235459
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-vmotto/FlaskBlog
-https://github.com/vmotto/FlaskBlog
-Entry file: FlaskBlog/app/app.py
-Scanned: 2016-10-25 15:29:38.080855
-No vulnerabilities found.
-
-
-xiangzhuyuan/flaskdemo1
-https://github.com/xiangzhuyuan/flaskdemo1
-Entry file: flaskdemo1/flaskdemo1/flaskr.py
-Scanned: 2016-10-25 15:29:40.420921
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-whimian/flaskyKrig
-https://github.com/whimian/flaskyKrig
-Entry file: flaskyKrig/test.py
-Scanned: 2016-10-25 15:29:45.787270
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-keer2345/flaskMega
-https://github.com/keer2345/flaskMega
-Entry file: flaskMega/app/__init__.py
-Scanned: 2016-10-25 15:29:47.171094
-No vulnerabilities found.
-
-
-josh14668/flaskApp
-https://github.com/josh14668/flaskApp
-Entry file: flaskApp/main.py
-Scanned: 2016-10-25 15:29:54.573111
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskApp/venv/lib/python2.7/sre_compile.py
-
-sh4nks/flask-caching
-https://github.com/sh4nks/flask-caching
-Entry file: flask-caching/setup.py
-Scanned: 2016-10-25 15:29:59.438579
-No vulnerabilities found.
-
-
-Riffstation/flaskutilsexample
-https://github.com/Riffstation/flaskutilsexample
-Entry file: flaskutilsexample/src/app/__init__.py
-Scanned: 2016-10-25 15:30:00.937313
-No vulnerabilities found.
-
-
-themese/flask
-https://github.com/themese/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:01.556349
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-radajin/flask
-https://github.com/radajin/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:02.622395
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-suryadana/Flask
-https://github.com/suryadana/Flask
-Entry file: None
-Scanned: 2016-10-25 15:30:03.152150
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-1131909224/flask
-https://github.com/1131909224/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:03.667949
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-manikandaraj123ster/flask
-https://github.com/manikandaraj123ster/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:04.714568
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-KyleSeem/Flask
-https://github.com/KyleSeem/Flask
-Entry file: None
-Scanned: 2016-10-25 15:30:05.324875
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-crazw/flask
-https://github.com/crazw/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:05.843418
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mwongeraE/Flask
-https://github.com/mwongeraE/Flask
-Entry file: None
-Scanned: 2016-10-25 15:30:06.411141
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Jzengzhan/Flask
-https://github.com/Jzengzhan/Flask
-Entry file: None
-Scanned: 2016-10-25 15:30:06.948720
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mani-python/flask
-https://github.com/mani-python/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:07.485990
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bTanya/flask
-https://github.com/bTanya/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:08.010886
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kirade/Flask
-https://github.com/Kirade/Flask
-Entry file: None
-Scanned: 2016-10-25 15:30:08.548598
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-salhernandez/Flask
-https://github.com/salhernandez/Flask
-Entry file: None
-Scanned: 2016-10-25 15:30:09.083152
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wangrenlearn/flask
-https://github.com/wangrenlearn/flask
-Entry file: None
-Scanned: 2016-10-25 15:30:09.602326
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-TheNixNinja/flask-boilerplate
-https://github.com/TheNixNinja/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-25 15:30:10.141142
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/TheNixNinja/flask-boilerplate.
-
-murilobsd/zeus
-https://github.com/murilobsd/zeus
-Entry file: None
-Scanned: 2016-10-25 15:30:16.441890
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/murilobsd/zeus.
-
-xuelangZF/NaHan
-https://github.com/xuelangZF/NaHan
-Entry file: NaHan/nahan/__init__.py
-Scanned: 2016-10-25 15:30:30.574564
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-clef/flask-nameko
-https://github.com/clef/flask-nameko
-Entry file: flask-nameko/tests/test_flask_pooled_cluster_rpc_proxy.py
-Scanned: 2016-10-25 15:30:38.131784
-No vulnerabilities found.
-
-
-rafaelhenrique/flask_tutorial
-https://github.com/rafaelhenrique/flask_tutorial
-Entry file: flask_tutorial/tvseries/__init__.py
-Scanned: 2016-10-25 15:30:44.387074
-No vulnerabilities found.
-
-
-haklabrador/podatci-s-burza
-https://github.com/haklabrador/podatci-s-burza
-Entry file: podatci-s-burza/webserver.py
-Scanned: 2016-10-25 15:30:45.995308
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sousic/flask_study
-https://github.com/sousic/flask_study
-Entry file: flask_study/flask_study.py
-Scanned: 2016-10-25 15:30:49.461297
-Vulnerability 1:
-File: flask_study/views/cookies.py
- > User input at line 13, trigger word "get(":
- username = request.cookies.get('username')
-File: flask_study/views/cookies.py
- > reaches line 14, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('cookies/readcookie.html',username=username)
-
-Vulnerability 2:
-File: flask_study/views/cookies.py
- > User input at line 19, trigger word "form[":
- username = request.form['username']
-File: flask_study/views/cookies.py
- > reaches line 23, trigger word "set_cookie(":
- response.set_cookie('username', username)
-
-Vulnerability 3:
-File: flask_study/views/fileUpload.py
- > User input at line 21, trigger word "files[":
- f = request.files['file']
-Reassigned in:
- File: flask_study/views/fileUpload.py
- > Line 23: filename = secure_filename(f.filename)
- File: flask_study/views/fileUpload.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = response
-File: flask_study/views/fileUpload.py
- > reaches line 25, trigger word "render_template(":
- response = make_response(render_template('fileupload/index.html',filename=filename))
-
-
-
-weinbergdavid/python-flask-security
-https://github.com/weinbergdavid/python-flask-security
-Entry file: python-flask-security/run.py
-Scanned: 2016-10-25 15:31:12.798394
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-opentracing-contrib/python-flask
-https://github.com/opentracing-contrib/python-flask
-Entry file: python-flask/tests/test_flask_opentracing.py
-Scanned: 2016-10-25 15:31:15.348842
-No vulnerabilities found.
-
-
-davidgomes/flask-pygood
-https://github.com/davidgomes/flask-pygood
-Entry file: flask-pygood/flask_pygood/test/demo.py
-Scanned: 2016-10-25 15:31:16.715832
-No vulnerabilities found.
-
-
-aaossa/flask-openshift
-https://github.com/aaossa/flask-openshift
-Entry file: flask-openshift/flask_openshift_template.py
-Scanned: 2016-10-25 15:31:18.363657
-Vulnerability 1:
-File: flask-openshift/flask_openshift_template.py
- > User input at line 14, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-openshift/flask_openshift_template.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flask-openshift/flask_openshift_template.py
- > reaches line 15, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username))
-
-Vulnerability 2:
-File: flask-openshift/flask_openshift_template.py
- > User input at line 14, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-openshift/flask_openshift_template.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flask-openshift/flask_openshift_template.py
- > reaches line 15, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username))
-
-
-
-k0itsu/flasktaskr
-https://github.com/k0itsu/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:31:18.903602
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rama16-meet/flasky
-https://github.com/rama16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:19.430864
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dina16-meet/flasky
-https://github.com/dina16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:19.970707
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-orr16-meet/flasky
-https://github.com/orr16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:20.506395
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-roni16-meet/flasky
-https://github.com/roni16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:21.025345
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-penglee87/flaskblog
-https://github.com/penglee87/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:31:21.561460
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/penglee87/flaskblog.
-
-atsk1618/flasko
-https://github.com/atsk1618/flasko
-Entry file: flasko/flasko.py
-Scanned: 2016-10-25 15:31:23.453760
-No vulnerabilities found.
-
-
-nsujan/flaskbot
-https://github.com/nsujan/flaskbot
-Entry file: flaskbot/wsgi/myflaskapp.py
-Scanned: 2016-10-25 15:31:25.160457
-No vulnerabilities found.
-
-
-davbrink/flaskblog
-https://github.com/davbrink/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:31:26.185209
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/davbrink/flaskblog.
-
-dongshuiquan/flasky
-https://github.com/dongshuiquan/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:26.724870
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-caseydunham/flaskr
-https://github.com/caseydunham/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:31:27.250833
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/caseydunham/flaskr.
-
-francium/flaskr
-https://github.com/francium/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:31:27.771256
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/francium/flaskr.
-
-Qqlick/Flasktaskr
-https://github.com/Qqlick/Flasktaskr
-Entry file: Flasktaskr/views.py
-Scanned: 2016-10-25 15:31:29.406916
-No vulnerabilities found.
-
-
-ToDolin/flaskgit
-https://github.com/ToDolin/flaskgit
-Entry file: flaskgit/flasky/app/__init__.py
-Scanned: 2016-10-25 15:31:30.944489
-No vulnerabilities found.
-
-
-yolandaz/flaskcars
-https://github.com/yolandaz/flaskcars
-Entry file: flaskcars/app.py
-Scanned: 2016-10-25 15:31:41.103668
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/sre_compile.py
-
-PansFortress/flaskr
-https://github.com/PansFortress/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:31:41.662717
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/PansFortress/flaskr.
-
-goodman1209/flaskrestserver
-https://github.com/goodman1209/flaskrestserver
-Entry file: flaskrestserver/hello.py
-Scanned: 2016-10-25 15:31:43.068276
-No vulnerabilities found.
-
-
-Ivicel/flasky
-https://github.com/Ivicel/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:43.588834
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-weihg/flaskr
-https://github.com/weihg/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:31:44.120293
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/weihg/flaskr.
-
-Dasmemes/flasky
-https://github.com/Dasmemes/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:44.641280
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-penglee87/flaskweb
-https://github.com/penglee87/flaskweb
-Entry file: flaskweb/app/__init__.py
-Scanned: 2016-10-25 15:31:46.367936
-Vulnerability 1:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskweb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskweb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskweb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskweb/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskweb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskweb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskweb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskweb/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskweb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskweb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskweb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskweb/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskweb/app/main/views.py
- > User input at line 25, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 33: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 34: posts = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',post_form=post_form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskweb/app/main/views.py
- > User input at line 28, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 26: show_followed = False
-File: flaskweb/app/main/views.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',post_form=post_form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskweb/app/main/views.py
- > User input at line 52, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 50: show_followed = False
- File: flaskweb/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
- File: flaskweb/app/main/views.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.create'))
-File: flaskweb/app/main/views.py
- > reaches line 58, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('create.html',post_form=post_form, show_followed=show_followed)
-
-Vulnerability 19:
-File: flaskweb/app/main/views.py
- > User input at line 64, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 65: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 68: posts = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 20:
-File: flaskweb/app/main/views.py
- > User input at line 128, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 130: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskweb/app/main/views.py
- > Line 132: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 135: comments = pagination.items
- File: flaskweb/app/main/views.py
- > Line 127: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskweb/app/main/views.py
- > reaches line 136, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 21:
-File: flaskweb/app/main/views.py
- > User input at line 221, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 222: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 225: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskweb/app/main/views.py
- > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 227, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flaskweb/app/main/views.py
- > User input at line 238, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 239: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 242: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskweb/app/main/views.py
- > Line 237: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskweb/app/main/views.py
- > reaches line 244, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 23:
-File: flaskweb/app/main/views.py
- > User input at line 269, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskweb/app/main/views.py
- > Line 270: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskweb/app/main/views.py
- > Line 273: comments = pagination.items
-File: flaskweb/app/main/views.py
- > reaches line 274, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-yuyanqiuqiu/flaskr
-https://github.com/yuyanqiuqiu/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:31:46.887549
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyanqiuqiu/flaskr.
-
-marvinmarnold/flasky
-https://github.com/marvinmarnold/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:47.422164
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bassel-meet/flasky
-https://github.com/bassel-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:48.974447
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sima16-meet/flasky
-https://github.com/sima16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:31:56.489329
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tamar16-meet/flasky
-https://github.com/tamar16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:14.022584
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alma16-meet/flasky
-https://github.com/alma16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:16.553923
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-guy16-meet/flasky
-https://github.com/guy16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:18.115565
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aixiamomo/flasky
-https://github.com/aixiamomo/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:19.627024
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yuyanqiuqiu/flaskblog
-https://github.com/yuyanqiuqiu/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:32:20.158637
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyanqiuqiu/flaskblog.
-
-Halcae/flaskapp
-https://github.com/Halcae/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:32:20.685236
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp.
-
-Kermit95/Flaskr
-https://github.com/Kermit95/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-25 15:32:27.604335
-No vulnerabilities found.
-
-
-wwpika/flaskww
-https://github.com/wwpika/flaskww
-Entry file: None
-Scanned: 2016-10-25 15:32:34.173652
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yasmeen16-meet/flasky
-https://github.com/yasmeen16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:34.708360
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-themuppet2/flasktaskr
-https://github.com/themuppet2/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:35.250814
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-LongstreetSolutions/flaskr
-https://github.com/LongstreetSolutions/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:35.800878
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/LongstreetSolutions/flaskr.
-
-stevehaigh/flasktest
-https://github.com/stevehaigh/flasktest
-Entry file: flasktest/flasktest.py
-Scanned: 2016-10-25 15:32:37.158378
-No vulnerabilities found.
-
-
-juniorkrvl/flasky
-https://github.com/juniorkrvl/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:37.688930
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-davbrink/flasktaskr
-https://github.com/davbrink/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:38.216837
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SachinMaharana/flaskblog
-https://github.com/SachinMaharana/flaskblog
-Entry file: None
-Scanned: 2016-10-25 15:32:38.733899
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SachinMaharana/flaskblog.
-
-dhan12/Flaskblog
-https://github.com/dhan12/Flaskblog
-Entry file: Flaskblog/run.py
-Scanned: 2016-10-25 15:32:43.479801
-Vulnerability 1:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 42, trigger word "form[":
- searchText = request.form['search']
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 54: searchText = request.args.get('search', '')
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-Vulnerability 2:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 54, trigger word "get(":
- searchText = request.args.get('search', '')
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 42: searchText = request.form['search']
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-Vulnerability 3:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 42, trigger word "form[":
- searchText = request.form['search']
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 54: searchText = request.args.get('search', '')
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-Vulnerability 4:
-File: Flaskblog/flaskblog/routes.py
- > User input at line 54, trigger word "get(":
- searchText = request.args.get('search', '')
-Reassigned in:
- File: Flaskblog/flaskblog/routes.py
- > Line 42: searchText = request.form['search']
- File: Flaskblog/flaskblog/routes.py
- > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 62: older_page = getPageLink(page + 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 64: newer_page = getPageLink(page - 1, tag, searchText)
- File: Flaskblog/flaskblog/routes.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals())
-File: Flaskblog/flaskblog/routes.py
- > reaches line 43, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText))
-
-
-
-amjad16-meet/flasky
-https://github.com/amjad16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:44.011109
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-elias16-meet/flasky
-https://github.com/elias16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:44.534834
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bluethon/flasky
-https://github.com/bluethon/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:45.050199
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-NathanJ4620/flasker
-https://github.com/NathanJ4620/flasker
-Entry file: flasker/test.py
-Scanned: 2016-10-25 15:32:46.386896
-No vulnerabilities found.
-
-
-rahulmkumar/flaskapp
-https://github.com/rahulmkumar/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:32:46.901223
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp.
-
-teodorgarzdin/Flaskr
-https://github.com/teodorgarzdin/Flaskr
-Entry file: Flaskr/Flaskr/flaskr/flaskr.py
-Scanned: 2016-10-25 15:32:48.232775
-No vulnerabilities found.
-
-
-linjialongmao/flasky
-https://github.com/linjialongmao/flasky
-Entry file: None
-Scanned: 2016-10-25 15:32:48.778714
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-algalanb/flaskapp
-https://github.com/algalanb/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:32:49.295767
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp.
-
-sinwar/flaskr
-https://github.com/sinwar/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:49.808019
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sinwar/flaskr.
-
-ptrees/flaskr
-https://github.com/ptrees/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:50.319578
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ptrees/flaskr.
-
-jcue/flasktaskr
-https://github.com/jcue/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:50.836929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-qhdong/flaskr
-https://github.com/qhdong/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:32:51.350645
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/qhdong/flaskr.
-
-aksenovpb/flaskproject
-https://github.com/aksenovpb/flaskproject
-Entry file: flaskproject/main.py
-Scanned: 2016-10-25 15:32:52.751739
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pengshiqi/Flaskr
-https://github.com/pengshiqi/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-25 15:32:58.143076
-No vulnerabilities found.
-
-
-stylianos-kampakis/flasktaskr
-https://github.com/stylianos-kampakis/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:33:14.670124
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yara16-meet/flasky
-https://github.com/yara16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:33:17.216994
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nimala16-meet/Flasky-
-https://github.com/nimala16-meet/Flasky-
-Entry file: None
-Scanned: 2016-10-25 15:33:24.735088
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/nimala16-meet/Flasky-.
-
-shiran16-meet/flasky
-https://github.com/shiran16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:33:25.261478
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fadi16-meet/flasky
-https://github.com/fadi16-meet/flasky
-Entry file: None
-Scanned: 2016-10-25 15:33:25.785166
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-igoroppo6/flasky
-https://github.com/igoroppo6/flasky
-Entry file: None
-Scanned: 2016-10-25 15:33:26.300307
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-evanzd/flasky
-https://github.com/evanzd/flasky
-Entry file: None
-Scanned: 2016-10-25 15:33:26.808290
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Dawson-G/flaskwebapp
-https://github.com/Dawson-G/flaskwebapp
-Entry file: flaskwebapp/main.py
-Scanned: 2016-10-25 15:33:29.162126
-No vulnerabilities found.
-
-
-chijie/flaskdemo
-https://github.com/chijie/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 15:33:35.724957
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-diazdeentr/flasktest
-https://github.com/diazdeentr/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 15:33:37.034913
-No vulnerabilities found.
-
-
-yinqiaoyicjx/flask
-https://github.com/yinqiaoyicjx/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:38.892048
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-krandmm/flask
-https://github.com/krandmm/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:39.432771
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yangliu2/flask
-https://github.com/yangliu2/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:39.947388
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-KeyJia/Flask
-https://github.com/KeyJia/Flask
-Entry file: None
-Scanned: 2016-10-25 15:33:40.463871
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Coolwater7/flask
-https://github.com/Coolwater7/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:40.975173
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sepihere/flask
-https://github.com/sepihere/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:44.494959
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-saiprakashreddymarasani/flask
-https://github.com/saiprakashreddymarasani/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:45.025524
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-deonna/flask
-https://github.com/deonna/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:45.535841
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ksbek/flask
-https://github.com/ksbek/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:46.077058
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tis86/flask
-https://github.com/tis86/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:47.644776
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-theparadoxer02/flask
-https://github.com/theparadoxer02/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:48.187558
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alazar-gm/flask
-https://github.com/alazar-gm/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:49.731697
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-krasytod/flask
-https://github.com/krasytod/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:50.281781
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-feirendada/Flask
-https://github.com/feirendada/Flask
-Entry file: None
-Scanned: 2016-10-25 15:33:50.817238
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Vaspy/Flask
-https://github.com/Vaspy/Flask
-Entry file: None
-Scanned: 2016-10-25 15:33:51.350559
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vipitsoft/flask
-https://github.com/vipitsoft/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:51.875892
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-reed-chi/flask
-https://github.com/reed-chi/flask
-Entry file: None
-Scanned: 2016-10-25 15:33:52.393148
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-huhjuang/Flask
-https://github.com/huhjuang/Flask
-Entry file: None
-Scanned: 2016-10-25 15:33:52.944771
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sebas095/Flask
-https://github.com/sebas095/Flask
-Entry file: None
-Scanned: 2016-10-25 15:34:15.036006
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SicunStudio/aunet-flask
-https://github.com/SicunStudio/aunet-flask
-Entry file: None
-Scanned: 2016-10-25 15:34:21.466256
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SicunStudio/aunet-flask.
-
-hit9/flask-docjson
-https://github.com/hit9/flask-docjson
-Entry file: flask-docjson/flask_docjson.py
-Scanned: 2016-10-25 15:34:27.112399
-No vulnerabilities found.
-
-
-codigofacilito/flask_cf
-https://github.com/codigofacilito/flask_cf
-Entry file: flask_cf/Project/main.py
-Scanned: 2016-10-25 15:34:29.040356
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lizTheDeveloper/__g26_flask
-https://github.com/lizTheDeveloper/__g26_flask
-Entry file: __g26_flask/app.py
-Scanned: 2016-10-25 15:34:30.647535
-Vulnerability 1:
-File: __g26_flask/app.py
- > User input at line 27, trigger word "get(":
- user = load_user(session.get('user_id'))
-File: __g26_flask/app.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Pokestraveganzamon', pokemon=pokelist, user=user)
-
-
-
-mosquito/flask-example
-https://github.com/mosquito/flask-example
-Entry file: flask-example/flask_example/app.py
-Scanned: 2016-10-25 15:34:34.126359
-No vulnerabilities found.
-
-
-zakzou/flask-weixin-pay
-https://github.com/zakzou/flask-weixin-pay
-Entry file: flask-weixin-pay/example.py
-Scanned: 2016-10-25 15:34:35.568008
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-hitakaken/flask-wechat
-https://github.com/hitakaken/flask-wechat
-Entry file: flask-wechat/example/run.py
-Scanned: 2016-10-25 15:34:37.583457
-No vulnerabilities found.
-
-
-ZakStrassberg/flask_products_group_project
-https://github.com/ZakStrassberg/flask_products_group_project
-Entry file: flask_products_group_project/server.py
-Scanned: 2016-10-25 15:34:39.034422
-No vulnerabilities found.
-
-
-teuton0215/microblog
-https://github.com/teuton0215/microblog
-Entry file: None
-Scanned: 2016-10-25 15:34:40.994018
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/teuton0215/microblog.
-
-iamrajhans/FlaskBackend
-https://github.com/iamrajhans/FlaskBackend
-Entry file: FlaskBackend/drone/main.py
-Scanned: 2016-10-25 15:34:42.570379
-No vulnerabilities found.
-
-
-afropolymath/papers
-https://github.com/afropolymath/papers
-Entry file: papers/api/__init__.py
-Scanned: 2016-10-25 15:34:44.854725
-Vulnerability 1:
-File: papers/api/controllers/files.py
- > User input at line 149, trigger word "get(":
- parent_id = args.get('parent_id', None)
-Reassigned in:
- File: papers/api/controllers/files.py
- > Line 161: update_fields['tag'] = parent_id == '0'g.file['id']'{}#{}'.format(folder_access['tag'], folder['last_index'])
- File: papers/api/controllers/files.py
- > Line 166: update_fields['parent_id'] = parent_id
- File: papers/api/controllers/files.py
- > Line 152: update_fields['name'] = name
-File: papers/api/controllers/files.py
- > reaches line 156, trigger word "filter(":
- folder_access = Folder.filter('id''creator'parent_iduser_id)
-
-
-
-on3iro/cookiecutter-flask
-https://github.com/on3iro/cookiecutter-flask
-Entry file: cookiecutter-flask/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/app.py
-Scanned: 2016-10-25 15:34:46.966186
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-benman1/tensorflow_flask
-https://github.com/benman1/tensorflow_flask
-Entry file: tensorflow_flask/api.py
-Scanned: 2016-10-25 15:34:48.288966
-No vulnerabilities found.
-
-
-remcohaszing/flask-openapi
-https://github.com/remcohaszing/flask-openapi
-Entry file: flask-openapi/example/app.py
-Scanned: 2016-10-25 15:34:50.328285
-No vulnerabilities found.
-
-
-lechain/flaskr
-https://github.com/lechain/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:34:50.848629
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lechain/flaskr.
-
-penglee87/flaskr
-https://github.com/penglee87/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:34:51.379314
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/penglee87/flaskr.
-
-asimonia/Flaskbook
-https://github.com/asimonia/Flaskbook
-Entry file: Flaskbook/application.py
-Scanned: 2016-10-25 15:34:52.851476
-Vulnerability 1:
-File: Flaskbook/user/views.py
- > User input at line 39, trigger word ".data":
- user = User.objects.filter(username=form.username.data).first()
-File: Flaskbook/user/views.py
- > reaches line 39, trigger word "filter(":
- user = User.objects.filter(username=form.username.data).first()
-
-Vulnerability 2:
-File: Flaskbook/user/views.py
- > User input at line 46, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: Flaskbook/user/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = 'User logged in'
- File: Flaskbook/user/views.py
- > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error)
-File: Flaskbook/user/views.py
- > reaches line 48, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-
-
-rouzazari/flaskfirst
-https://github.com/rouzazari/flaskfirst
-Entry file: flaskfirst/app/__init__.py
-Scanned: 2016-10-25 15:34:54.168200
-No vulnerabilities found.
-
-
-smilemlz/flasktest
-https://github.com/smilemlz/flasktest
-Entry file: flasktest/testem.py
-Scanned: 2016-10-25 15:34:55.470460
-No vulnerabilities found.
-
-
-Runningdogs/flasky
-https://github.com/Runningdogs/flasky
-Entry file: None
-Scanned: 2016-10-25 15:34:55.988341
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Markmwaura/Flaskblog
-https://github.com/Markmwaura/Flaskblog
-Entry file: Flaskblog/app/__init__.py
-Scanned: 2016-10-25 15:34:58.252311
-No vulnerabilities found.
-
-
-YaleYeah/flasky
-https://github.com/YaleYeah/flasky
-Entry file: None
-Scanned: 2016-10-25 15:34:58.797599
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-seizans/flasko
-https://github.com/seizans/flasko
-Entry file: flasko/main.py
-Scanned: 2016-10-25 15:35:00.134191
-No vulnerabilities found.
-
-
-faridalrafi/flaskopencv
-https://github.com/faridalrafi/flaskopencv
-Entry file: flaskopencv/app.py
-Scanned: 2016-10-25 15:35:04.042439
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pecone/flaskr
-https://github.com/pecone/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:35:04.585391
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pecone/flaskr.
-
-bencelder/flaskr
-https://github.com/bencelder/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:35:15.232160
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/bencelder/flaskr.
-
-vennyk/flasktaskr
-https://github.com/vennyk/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:35:17.765391
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-akjanik/flasktutorial
-https://github.com/akjanik/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 15:35:19.333979
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/akjanik/flasktutorial.
-
-EenTang/flaskdev
-https://github.com/EenTang/flaskdev
-Entry file: None
-Scanned: 2016-10-25 15:35:33.593319
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hyteer/flaskdemo
-https://github.com/hyteer/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 15:35:34.238419
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lxw15337674/flasklearn
-https://github.com/lxw15337674/flasklearn
-Entry file: flasklearn/flasklearn.py
-Scanned: 2016-10-25 15:35:44.282615
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-liangfei2016x/flaskweb
-https://github.com/liangfei2016x/flaskweb
-Entry file: None
-Scanned: 2016-10-25 15:35:54.891929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mcquam/flasktaskr
-https://github.com/mcquam/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:35:55.446914
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Sventenhaaf/flasktries
-https://github.com/Sventenhaaf/flasktries
-Entry file: flasktries/app.py
-Scanned: 2016-10-25 15:36:02.600217
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasktries/env/lib/python2.7/sre_compile.py
-
-munendrasn/Flaskr
-https://github.com/munendrasn/Flaskr
-Entry file: Flaskr/flaskr/flaskr.py
-Scanned: 2016-10-25 15:36:04.036913
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Eyali1001/flaskcalculator
-https://github.com/Eyali1001/flaskcalculator
-Entry file: flaskcalculator/calculator.py
-Scanned: 2016-10-25 15:36:05.383829
-Vulnerability 1:
-File: flaskcalculator/calculator.py
- > User input at line 14, trigger word "form[":
- result = int(request.form['title']) + int(request.form['text'])
-File: flaskcalculator/calculator.py
- > reaches line 15, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultpage.html',result=result)
-
-
-
-babydeya/flaskr
-https://github.com/babydeya/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:05.918624
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/babydeya/flaskr.
-
-rouzazari/flaskangular
-https://github.com/rouzazari/flaskangular
-Entry file: flaskangular/app/__init__.py
-Scanned: 2016-10-25 15:36:07.323349
-No vulnerabilities found.
-
-
-yantiz/flasktaskr
-https://github.com/yantiz/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:07.992067
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nocotan/flaski
-https://github.com/nocotan/flaski
-Entry file: flaski/app.py
-Scanned: 2016-10-25 15:36:09.400440
-No vulnerabilities found.
-
-
-berezovskiydenis/flasktaskr
-https://github.com/berezovskiydenis/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:09.934808
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-freakxx/flaskdemo
-https://github.com/freakxx/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 15:36:10.471366
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Baindaer/flaskr
-https://github.com/Baindaer/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:10.983919
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Baindaer/flaskr.
-
-lindentao/flaskr
-https://github.com/lindentao/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:11.538964
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lindentao/flaskr.
-
-demory191/flasktaskr
-https://github.com/demory191/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:12.111405
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Daylightmazekun/flaskfollow
-https://github.com/Daylightmazekun/flaskfollow
-Entry file: flaskfollow/app/__init__.py
-Scanned: 2016-10-25 15:36:14.040781
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-0x24a537r9/flasktest
-https://github.com/0x24a537r9/flasktest
-Entry file: flasktest/polling_monitor.py
-Scanned: 2016-10-25 15:36:15.357543
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-trevorwitter/flaskr
-https://github.com/trevorwitter/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:15.882874
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/trevorwitter/flaskr.
-
-caser789/flaskrr
-https://github.com/caser789/flaskrr
-Entry file: flaskrr/flaskr/flaskr.py
-Scanned: 2016-10-25 15:36:17.224644
-No vulnerabilities found.
-
-
-xuxiaoxing/flasky
-https://github.com/xuxiaoxing/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:17.742779
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tw7613781/flasky
-https://github.com/tw7613781/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:18.313114
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhang555/flasky
-https://github.com/zhang555/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:19.063410
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fiezwang/flasky
-https://github.com/fiezwang/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:19.708524
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-swdmike/flasky
-https://github.com/swdmike/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:20.222226
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-manuellah/flaskapp
-https://github.com/manuellah/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:36:20.749413
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/manuellah/flaskapp.
-
-musarahm/flaskbook
-https://github.com/musarahm/flaskbook
-Entry file: flaskbook/application.py
-Scanned: 2016-10-25 15:36:22.358044
-Vulnerability 1:
-File: flaskbook/home/views.py
- > User input at line 15, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/home/views.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = 'Welcome to Flaskbook!'
-File: flaskbook/home/views.py
- > reaches line 15, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 2:
-File: flaskbook/home/views.py
- > User input at line 15, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/home/views.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = 'Welcome to Flaskbook!'
-File: flaskbook/home/views.py
- > reaches line 19, trigger word "filter(":
- feed_messages = Feed.objects.filter(user=user).order_by('-create_date')[10]
-
-Vulnerability 3:
-File: flaskbook/home/views.py
- > User input at line 15, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/home/views.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = 'Welcome to Flaskbook!'
-File: flaskbook/home/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home/feed_home.html',user=user, form=form, feed_messages=feed_messages)
-
-Vulnerability 4:
-File: flaskbook/relationship/views.py
- > User input at line 14, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 18: rel = Relationship.get_relationship(logged_user, to_user)
- File: flaskbook/relationship/views.py
- > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user)
-File: flaskbook/relationship/views.py
- > reaches line 14, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 5:
-File: flaskbook/relationship/views.py
- > User input at line 14, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 18: rel = Relationship.get_relationship(logged_user, to_user)
- File: flaskbook/relationship/views.py
- > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user)
-File: flaskbook/relationship/views.py
- > reaches line 41, trigger word "render_template(":
- body_html = render_template('mail/relationship/added_friend.html',from_user=logged_user, to_user=to_user)
-
-Vulnerability 6:
-File: flaskbook/relationship/views.py
- > User input at line 14, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 18: rel = Relationship.get_relationship(logged_user, to_user)
- File: flaskbook/relationship/views.py
- > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user)
-File: flaskbook/relationship/views.py
- > reaches line 46, trigger word "render_template(":
- body_text = render_template('mail/relationship/added_friend.txt',from_user=logged_user, to_user=to_user)
-
-Vulnerability 7:
-File: flaskbook/relationship/views.py
- > User input at line 67, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 71: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 67, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 8:
-File: flaskbook/relationship/views.py
- > User input at line 67, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 71: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 74, trigger word "filter(":
- rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete()
-
-Vulnerability 9:
-File: flaskbook/relationship/views.py
- > User input at line 67, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 71: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 77, trigger word "filter(":
- reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete()
-
-Vulnerability 10:
-File: flaskbook/relationship/views.py
- > User input at line 91, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 95: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 91, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 11:
-File: flaskbook/relationship/views.py
- > User input at line 91, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 95: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 99, trigger word "filter(":
- rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete()
-
-Vulnerability 12:
-File: flaskbook/relationship/views.py
- > User input at line 91, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 95: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 102, trigger word "filter(":
- reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete()
-
-Vulnerability 13:
-File: flaskbook/relationship/views.py
- > User input at line 123, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 127: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 123, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 14:
-File: flaskbook/relationship/views.py
- > User input at line 123, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/relationship/views.py
- > Line 127: rel = Relationship.get_relationship(logged_user, to_user)
-File: flaskbook/relationship/views.py
- > reaches line 131, trigger word "filter(":
- rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete()
-
-Vulnerability 15:
-File: flaskbook/user/views.py
- > User input at line 25, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 40, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 16:
-File: flaskbook/user/views.py
- > User input at line 27, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 40, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 17:
-File: flaskbook/user/views.py
- > User input at line 25, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 41, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 18:
-File: flaskbook/user/views.py
- > User input at line 27, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code)
-File: flaskbook/user/views.py
- > reaches line 41, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 19:
-File: flaskbook/user/views.py
- > User input at line 57, trigger word ".data":
- user = User.objects.filter(username=form.username.data).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 70: user = None
-File: flaskbook/user/views.py
- > reaches line 57, trigger word "filter(":
- user = User.objects.filter(username=form.username.data).first()
-
-Vulnerability 20:
-File: flaskbook/user/views.py
- > User input at line 64, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home_app.home'))
- File: flaskbook/user/views.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error)
-File: flaskbook/user/views.py
- > reaches line 66, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 21:
-File: flaskbook/user/views.py
- > User input at line 92, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 84: logged_user = None
- File: flaskbook/user/views.py
- > Line 93: rel = Relationship.get_relationship(logged_user, user)
- File: flaskbook/user/views.py
- > Line 85: rel = None
-File: flaskbook/user/views.py
- > reaches line 92, trigger word "filter(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 22:
-File: flaskbook/user/views.py
- > User input at line 92, trigger word "get(":
- logged_user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 84: logged_user = None
- File: flaskbook/user/views.py
- > Line 93: rel = Relationship.get_relationship(logged_user, user)
- File: flaskbook/user/views.py
- > Line 85: rel = None
-File: flaskbook/user/views.py
- > reaches line 118, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user/profile.html',user=user, logged_user=logged_user, rel=rel, friends=friends, friends_total=friends_total, friends_page=friends_page, form=form, profile_messages=profile_messages)
-
-Vulnerability 23:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 136, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 24:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 148, trigger word "filter(":
- if User.objects.filter(username=form.username.data.lower()).first():
-
-Vulnerability 25:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 154, trigger word "filter(":
- if User.objects.filter(email=form.email.data.lower()).first():
-
-Vulnerability 26:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 168, trigger word "render_template(":
- body_html = render_template('mail/user/change_email.html',user=user)
-
-Vulnerability 27:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 169, trigger word "render_template(":
- body_text = render_template('mail/user/change_email.txt',user=user)
-
-Vulnerability 28:
-File: flaskbook/user/views.py
- > User input at line 136, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 138: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 143: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 164: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 175: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 141: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 180, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user)
-
-Vulnerability 29:
-File: flaskbook/user/views.py
- > User input at line 203, trigger word ".data":
- user = User.objects.filter(email=form.email.data.lower()).first()
-File: flaskbook/user/views.py
- > reaches line 203, trigger word "filter(":
- user = User.objects.filter(email=form.email.data.lower()).first()
-
-Vulnerability 30:
-File: flaskbook/user/views.py
- > User input at line 203, trigger word ".data":
- user = User.objects.filter(email=form.email.data.lower()).first()
-File: flaskbook/user/views.py
- > reaches line 212, trigger word "render_template(":
- body_html = render_template('mail/user/password_reset.html',user=user)
-
-Vulnerability 31:
-File: flaskbook/user/views.py
- > User input at line 203, trigger word ".data":
- user = User.objects.filter(email=form.email.data.lower()).first()
-File: flaskbook/user/views.py
- > reaches line 213, trigger word "render_template(":
- body_text = render_template('mail/user/password_reset.txt',user=user)
-
-Vulnerability 32:
-File: flaskbook/user/views.py
- > User input at line 261, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-File: flaskbook/user/views.py
- > reaches line 261, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 33:
-File: flaskbook/feed/views.py
- > User input at line 33, trigger word "get(":
- from_user = User.objects.get(username=session.get('username'))
-Reassigned in:
- File: flaskbook/feed/views.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = 'Error!'
- File: flaskbook/feed/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(ref)
-File: flaskbook/feed/views.py
- > reaches line 70, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_app.profile',username=from_user.username))
-
-Vulnerability 34:
-File: flaskbook/feed/views.py
- > User input at line 33, trigger word "get(":
- from_user = User.objects.get(username=session.get('username'))
-Reassigned in:
- File: flaskbook/feed/views.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = 'Error!'
- File: flaskbook/feed/views.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(ref)
-File: flaskbook/feed/views.py
- > reaches line 70, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_app.profile',username=from_user.username))
-
-Vulnerability 35:
-File: flaskbook/feed/views.py
- > User input at line 119, trigger word "get(":
- from_user = User.objects.get(username=session.get('username'))
-File: flaskbook/feed/views.py
- > reaches line 122, trigger word "filter(":
- existing_like = Message.objects.filter(parent=message_id, message_type=LIKE, from_user=from_user).count()
-
-
-
-HJeongWon/flaskr
-https://github.com/HJeongWon/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:23.030946
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/HJeongWon/flaskr.
-
-ChuckiePae/flaskr
-https://github.com/ChuckiePae/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:36:23.589978
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChuckiePae/flaskr.
-
-qhdong/flasky
-https://github.com/qhdong/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:27.104015
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wuqingwuqingwu/flaskk
-https://github.com/wuqingwuqingwu/flaskk
-Entry file: flaskk/chapter3a.py
-Scanned: 2016-10-25 15:36:42.025078
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/sre_compile.py
-
-oscarnyl/flaskpost
-https://github.com/oscarnyl/flaskpost
-Entry file: flaskpost/flaskpost/__init__.py
-Scanned: 2016-10-25 15:36:46.567566
-No vulnerabilities found.
-
-
-linjialongmao/flasky
-https://github.com/linjialongmao/flasky
-Entry file: None
-Scanned: 2016-10-25 15:36:56.106470
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-algalanb/flaskapp
-https://github.com/algalanb/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:36:56.617738
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp.
-
-Unknown22/Flaskr
-https://github.com/Unknown22/Flaskr
-Entry file: Flaskr/flaskr.py
-Scanned: 2016-10-25 15:37:05.054589
-No vulnerabilities found.
-
-
-sinwar/flaskr
-https://github.com/sinwar/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:37:05.597890
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sinwar/flaskr.
-
-lux600/flasktest
-https://github.com/lux600/flasktest
-Entry file: flasktest/hello_world.py
-Scanned: 2016-10-25 15:37:11.237442
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-AdamWawrow/flasktaskr
-https://github.com/AdamWawrow/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:37:11.813926
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-KamiNoSierhej/flaskkk
-https://github.com/KamiNoSierhej/flaskkk
-Entry file: flaskkk/flaskkk/Polczan.py
-Scanned: 2016-10-25 15:37:13.278581
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-reed-chi/flasktaskr
-https://github.com/reed-chi/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 15:37:13.821754
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Katebasoft/Flaskr
-https://github.com/Katebasoft/Flaskr
-Entry file: None
-Scanned: 2016-10-25 15:37:21.746637
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zangree/flaskytest
-https://github.com/zangree/flaskytest
-Entry file: flaskytest/app_manager.py
-Scanned: 2016-10-25 15:37:23.141729
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-he1chenglong/flasktest
-https://github.com/he1chenglong/flasktest
-Entry file: flasktest/code/02template/flaskapp.py
-Scanned: 2016-10-25 15:37:24.998174
-No vulnerabilities found.
-
-
-omegayang/flasklearn
-https://github.com/omegayang/flasklearn
-Entry file: flasklearn/app/__init__.py
-Scanned: 2016-10-25 15:37:26.742959
-Vulnerability 1:
-File: flasklearn/app/main/views.py
- > User input at line 64, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasklearn/app/main/views.py
- > Line 65: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasklearn/app/main/views.py
- > Line 68: posts = pagination.items
- File: flasklearn/app/main/views.py
- > Line 63: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasklearn/app/main/views.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flasklearn/app/main/views.py
- > User input at line 126, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasklearn/app/main/views.py
- > Line 127: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasklearn/app/main/views.py
- > Line 130: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flasklearn/app/main/views.py
- > Line 125: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasklearn/app/main/views.py
- > reaches line 132, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 3:
-File: flasklearn/app/main/views.py
- > User input at line 141, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasklearn/app/main/views.py
- > Line 142: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasklearn/app/main/views.py
- > Line 145: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flasklearn/app/main/views.py
- > Line 140: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasklearn/app/main/views.py
- > reaches line 147, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by ', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-ranchow/flaskapp
-https://github.com/ranchow/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:37:27.304905
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ranchow/flaskapp.
-
-lassegit/flask-reactjs
-https://github.com/lassegit/flask-reactjs
-Entry file: None
-Scanned: 2016-10-25 15:37:30.490623
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lassegit/flask-reactjs.
-
-vimalloc/flask-jwt-extended
-https://github.com/vimalloc/flask-jwt-extended
-Entry file: flask-jwt-extended/tests/test_blacklist.py
-Scanned: 2016-10-25 15:37:32.788891
-No vulnerabilities found.
-
-
-timmyreilly/introduction-to-flask
-https://github.com/timmyreilly/introduction-to-flask
-Entry file: introduction-to-flask/hello.py
-Scanned: 2016-10-25 15:37:35.113260
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-cuttlesoft/flask-workshop
-https://github.com/cuttlesoft/flask-workshop
-Entry file: flask-workshop/app/__init__.py
-Scanned: 2016-10-25 15:37:38.698193
-No vulnerabilities found.
-
-
-iamdavidmt/flask
-https://github.com/iamdavidmt/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:39.235601
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DIYer22/flask
-https://github.com/DIYer22/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:39.782257
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-woowooh/flask
-https://github.com/woowooh/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:40.310767
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jacksonyoudi/flask
-https://github.com/jacksonyoudi/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:41.365602
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jamesd3ao/Flask
-https://github.com/jamesd3ao/Flask
-Entry file: None
-Scanned: 2016-10-25 15:37:41.931208
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-YellowGB/Flask
-https://github.com/YellowGB/Flask
-Entry file: None
-Scanned: 2016-10-25 15:37:42.598234
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-konwan/flask
-https://github.com/konwan/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:43.185491
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lsyff210/flask
-https://github.com/lsyff210/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:43.977575
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dalyddaly/flask
-https://github.com/dalyddaly/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:44.566033
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Carryopendoor1/flask
-https://github.com/Carryopendoor1/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:46.145807
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CliveCullen/flask
-https://github.com/CliveCullen/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:56.670646
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jasondebolt/flask
-https://github.com/jasondebolt/flask
-Entry file: None
-Scanned: 2016-10-25 15:37:57.222967
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rdeeds/flask
-https://github.com/rdeeds/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:04.737807
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nsuJolie/flask
-https://github.com/nsuJolie/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:06.271669
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mod2695/flask
-https://github.com/mod2695/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:06.888142
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rionagreally/Flask
-https://github.com/rionagreally/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:12.413536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhaokefei/flask
-https://github.com/zhaokefei/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:12.926238
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-djjjj/flask
-https://github.com/djjjj/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:14.444630
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-xjr7670/flask
-https://github.com/xjr7670/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:15.009614
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-k9imJ/flask
-https://github.com/k9imJ/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:15.540520
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-berstearns/flask
-https://github.com/berstearns/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:23.060845
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fortune599/flask
-https://github.com/fortune599/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:24.611268
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yueqingwang/flask
-https://github.com/yueqingwang/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:26.167163
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-minglan01/flask
-https://github.com/minglan01/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:27.740875
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kkltcjk/flask
-https://github.com/kkltcjk/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:28.288990
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tcyfs/flask
-https://github.com/tcyfs/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:29.810110
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arcVyas/flask
-https://github.com/arcVyas/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:31.330114
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sakuuat/Flask
-https://github.com/sakuuat/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:33.852028
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lastone9182/flask
-https://github.com/lastone9182/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:36.376124
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-juliascript/Flask
-https://github.com/juliascript/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:39.912836
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-larry1994/flask
-https://github.com/larry1994/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:40.481591
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jyntran/flask
-https://github.com/jyntran/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:40.990479
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jience/flask
-https://github.com/jience/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:41.510765
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mayurvaidya09/Flask
-https://github.com/mayurvaidya09/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:42.055610
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-harryjia/flask
-https://github.com/harryjia/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:42.620298
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-randm-/flask
-https://github.com/randm-/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:43.136224
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-davinbutler/flask
-https://github.com/davinbutler/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:43.651891
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Gershine/Flask
-https://github.com/Gershine/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:44.176792
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rahulVudutala/flask
-https://github.com/rahulVudutala/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:44.710057
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jesusalatorre/Flask
-https://github.com/jesusalatorre/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:46.263619
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sanie4eg/Flask
-https://github.com/sanie4eg/Flask
-Entry file: None
-Scanned: 2016-10-25 15:38:56.794846
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-skraiman/flask
-https://github.com/skraiman/flask
-Entry file: None
-Scanned: 2016-10-25 15:38:57.313242
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-g00302826/Flask
-https://github.com/g00302826/Flask
-Entry file: None
-Scanned: 2016-10-25 15:39:04.863705
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ricardonhuang/flask
-https://github.com/ricardonhuang/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:06.435243
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cmeisinger/flask
-https://github.com/cmeisinger/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:07.044457
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-vojtahelle/flask
-https://github.com/vojtahelle/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:12.563003
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Morfyo/Flask
-https://github.com/Morfyo/Flask
-Entry file: None
-Scanned: 2016-10-25 15:39:13.841675
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hamdimuzakkiy/Flask
-https://github.com/hamdimuzakkiy/Flask
-Entry file: None
-Scanned: 2016-10-25 15:39:15.373975
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-VishnuArukat/flask
-https://github.com/VishnuArukat/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:23.887201
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fushouhai/flask
-https://github.com/fushouhai/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:25.401395
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-darylkeane/flask
-https://github.com/darylkeane/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:26.927311
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Tangugo/flask
-https://github.com/Tangugo/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:28.442990
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bharatsush/flask
-https://github.com/bharatsush/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:28.963141
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-LittltZhao/Flask
-https://github.com/LittltZhao/Flask
-Entry file: None
-Scanned: 2016-10-25 15:39:30.494947
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sadscv/flask
-https://github.com/sadscv/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:32.002567
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chenlei28695/flask
-https://github.com/chenlei28695/flask
-Entry file: None
-Scanned: 2016-10-25 15:39:34.584968
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-I-am-Gabi/flask-minicurso
-https://github.com/I-am-Gabi/flask-minicurso
-Entry file: flask-minicurso/minicurso-flask.py
-Scanned: 2016-10-25 15:39:39.553399
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhangheli/flask-google
-https://github.com/zhangheli/flask-google
-Entry file: flask-google/g.py
-Scanned: 2016-10-25 15:39:40.869318
-No vulnerabilities found.
-
-
-arpitbbhayani/flasksr
-https://github.com/arpitbbhayani/flasksr
-Entry file: flasksr/examples/basicsr.py
-Scanned: 2016-10-25 15:39:42.268533
-No vulnerabilities found.
-
-
-bellcodo/fisrt-flask-app
-https://github.com/bellcodo/fisrt-flask-app
-Entry file: fisrt-flask-app/hello_app.py
-Scanned: 2016-10-25 15:39:43.561876
-No vulnerabilities found.
-
-
-lk-geimfari/flask_church
-https://github.com/lk-geimfari/flask_church
-Entry file: flask_church/example.py
-Scanned: 2016-10-25 15:39:45.125775
-No vulnerabilities found.
-
-
-padznich/_flask
-https://github.com/padznich/_flask
-Entry file: _flask/proj_5_TDD_1/app.py
-Scanned: 2016-10-25 15:39:46.585218
-No vulnerabilities found.
-
-
-EverestYAO/flask-blog
-https://github.com/EverestYAO/flask-blog
-Entry file: flask-blog/flask/Scripts/flask-blog/app/__init__.py
-Scanned: 2016-10-25 15:39:48.575573
-Vulnerability 1:
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > User input at line 19, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 20: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 23: posts = pagination.items
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 31: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > User input at line 26, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 24: show_followed = False
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > User input at line 96, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 98: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 100: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 103: comments = pagination.items
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > reaches line 104, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > User input at line 160, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 161: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 163: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 159: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > reaches line 164, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > User input at line 173, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 174: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 172: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > reaches line 179, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 202: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > Line 204: comments = pagination.items
-File: flask-blog/flask/Scripts/flask-blog/app/main/views.py
- > reaches line 205, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-pandapan0021/myblog
-https://github.com/pandapan0021/myblog
-Entry file: None
-Scanned: 2016-10-25 15:39:57.133608
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-qwertypomy/flask-example-app
-https://github.com/qwertypomy/flask-example-app
-Entry file: flask-example-app/app.py
-Scanned: 2016-10-25 15:40:02.879970
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-Millyn/uFlask
-https://github.com/Millyn/uFlask
-Entry file: uFlask/project/__init__.py
-Scanned: 2016-10-25 15:40:04.415110
-No vulnerabilities found.
-
-
-hit9/flask-idempotent2
-https://github.com/hit9/flask-idempotent2
-Entry file: flask-idempotent2/example.py
-Scanned: 2016-10-25 15:40:05.967900
-No vulnerabilities found.
-
-
-rofrano/nyu-lab-restful-flask
-https://github.com/rofrano/nyu-lab-restful-flask
-Entry file: nyu-lab-restful-flask/server.py
-Scanned: 2016-10-25 15:40:07.362847
-No vulnerabilities found.
-
-
-Sthacks/sthacksWebsite
-https://github.com/Sthacks/sthacksWebsite
-Entry file: sthacksWebsite/app.py
-Scanned: 2016-10-25 15:40:09.461069
-No vulnerabilities found.
-
-
-on3iro/cookiecutter-flask
-https://github.com/on3iro/cookiecutter-flask
-Entry file: cookiecutter-flask/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/app.py
-Scanned: 2016-10-25 15:40:11.130094
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mmarconm/flask_templates
-https://github.com/mmarconm/flask_templates
-Entry file: flask_templates/app.py
-Scanned: 2016-10-25 15:40:13.451876
-No vulnerabilities found.
-
-
-AminHP/flask-mvc
-https://github.com/AminHP/flask-mvc
-Entry file: flask-mvc/project/application.py
-Scanned: 2016-10-25 15:40:14.889815
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jkaberg/tvhProxy
-https://github.com/jkaberg/tvhProxy
-Entry file: tvhProxy/tvhProxy.py
-Scanned: 2016-10-25 15:40:16.292469
-No vulnerabilities found.
-
-
-DanielTimLee/flask_tutorial
-https://github.com/DanielTimLee/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 15:40:17.820319
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/DanielTimLee/flask_tutorial.
-
-atomist-project-templates/flask-service
-https://github.com/atomist-project-templates/flask-service
-Entry file: flask-service/flask_service/__init__.py
-Scanned: 2016-10-25 15:40:19.333442
-Vulnerability 1:
-File: flask-service/flask_service/tests/test_main_views.py
- > User input at line 10, trigger word "get(":
- res = client.get(url_for('main_app.swagger'))
-File: flask-service/flask_service/tests/test_main_views.py
- > reaches line 10, trigger word "url_for(":
- res = client.get(url_for('main_app.swagger'))
-
-Vulnerability 2:
-File: flask-service/flask_service/my_app/tests/test_views.py
- > User input at line 6, trigger word "get(":
- res = client.get(url_for('my_app_app.index'))
-File: flask-service/flask_service/my_app/tests/test_views.py
- > reaches line 6, trigger word "url_for(":
- res = client.get(url_for('my_app_app.index'))
-
-
-
-EenTang/flaskdev
-https://github.com/EenTang/flaskdev
-Entry file: None
-Scanned: 2016-10-25 15:40:19.851994
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-martyni/flaskstrap
-https://github.com/martyni/flaskstrap
-Entry file: flaskstrap/flaskstrap/app.py
-Scanned: 2016-10-25 15:40:25.716084
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ramramu3433/flaskapp
-https://github.com/ramramu3433/flaskapp
-Entry file: None
-Scanned: 2016-10-25 15:40:26.235197
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ramramu3433/flaskapp.
-
-irritant/flasktory
-https://github.com/irritant/flasktory
-Entry file: flasktory/template/app/__init__.py
-Scanned: 2016-10-25 15:40:28.610347
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-naviplay/flasktutorial
-https://github.com/naviplay/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 15:40:29.140120
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/naviplay/flasktutorial.
-
-MagicRoc/flaskoc
-https://github.com/MagicRoc/flaskoc
-Entry file: flaskoc/hello.py
-Scanned: 2016-10-25 15:40:30.820739
-Vulnerability 1:
-File: flaskoc/app/main/views.py
- > User input at line 56, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskoc/app/main/views.py
- > Line 57: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskoc/app/main/views.py
- > Line 60: posts = pagination.items
- File: flaskoc/app/main/views.py
- > Line 55: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskoc/app/main/views.py
- > reaches line 61, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: flaskoc/app/main/views.py
- > User input at line 72, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskoc/app/main/views.py
- > Line 73: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskoc/app/main/views.py
- > Line 76: posts = pagination.items
-File: flaskoc/app/main/views.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-kaish5536/Flaskr
-https://github.com/kaish5536/Flaskr
-Entry file: None
-Scanned: 2016-10-25 15:40:31.349790
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sanjayankur31/flaskr
-https://github.com/sanjayankur31/flaskr
-Entry file: None
-Scanned: 2016-10-25 15:40:32.902278
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanjayankur31/flaskr.
-
-shalev67/flasky
-https://github.com/shalev67/flasky
-Entry file: None
-Scanned: 2016-10-25 15:40:35.472456
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-isyippee/flasky
-https://github.com/isyippee/flasky
-Entry file: None
-Scanned: 2016-10-25 15:40:37.986897
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mwoo99/flasktemplate
-https://github.com/mwoo99/flasktemplate
-Entry file: flasktemplate/flask_template.py
-Scanned: 2016-10-25 15:40:41.348043
-No vulnerabilities found.
-
-
-ChrisDBrooks/flaskbyexample
-https://github.com/ChrisDBrooks/flaskbyexample
-Entry file: flaskbyexample/hello.py
-Scanned: 2016-10-25 15:40:42.678284
-No vulnerabilities found.
-
-
-mkykadir/flaskrofficialtut
-https://github.com/mkykadir/flaskrofficialtut
-Entry file: flaskrofficialtut/flaskr.py
-Scanned: 2016-10-25 15:40:44.043829
-No vulnerabilities found.
-
-
-rbunch-dc/flasksql
-https://github.com/rbunch-dc/flasksql
-Entry file: flasksql/flaskMysql.py
-Scanned: 2016-10-25 15:40:47.296219
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yorolifarg/flasksample
-https://github.com/yorolifarg/flasksample
-Entry file: flasksample/chapter2/app.py
-Scanned: 2016-10-25 15:40:50.960304
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pradyumnac/flasklearn
-https://github.com/pradyumnac/flasklearn
-Entry file: flasklearn/code/redisdemo.py
-Scanned: 2016-10-25 15:40:52.365940
-No vulnerabilities found.
-
-
-gd452/flask
-https://github.com/gd452/flask
-Entry file: None
-Scanned: 2016-10-25 22:52:58.936313
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-llh335/flask
-https://github.com/llh335/flask
-Entry file: None
-Scanned: 2016-10-25 22:52:59.461930
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bh45k4r/flask
-https://github.com/bh45k4r/flask
-Entry file: None
-Scanned: 2016-10-25 22:52:59.983826
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-paulmin55/flask
-https://github.com/paulmin55/flask
-Entry file: None
-Scanned: 2016-10-25 22:53:00.510000
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CarlEkerot/flask-orm
-https://github.com/CarlEkerot/flask-orm
-Entry file: flask-orm/webapp/__init__.py
-Scanned: 2016-10-25 22:53:02.247094
-No vulnerabilities found.
-
-
-ibininja/upload_file_python
-https://github.com/ibininja/upload_file_python
-Entry file: upload_file_python/src/app_display_multiple_images.py
-Scanned: 2016-10-25 22:53:03.552835
-No vulnerabilities found.
-
-
-fraoustin/flaskserver
-https://github.com/fraoustin/flaskserver
-Entry file: None
-Scanned: 2016-10-25 22:53:04.096722
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver.
-
-ecerami/hello_flask
-https://github.com/ecerami/hello_flask
-Entry file: hello_flask/app.py
-Scanned: 2016-10-25 22:53:05.376527
-No vulnerabilities found.
-
-
-kai1/flasktest
-https://github.com/kai1/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 22:53:07.086537
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-willianribeiro/flaskr
-https://github.com/willianribeiro/flaskr
-Entry file: None
-Scanned: 2016-10-25 22:53:07.611841
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr.
-
-StuartChristie/Flasky
-https://github.com/StuartChristie/Flasky
-Entry file: None
-Scanned: 2016-10-25 22:53:08.112348
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/StuartChristie/Flasky.
-
-milinbhakta/flaskmaterialdesign
-https://github.com/milinbhakta/flaskmaterialdesign
-Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py
-Scanned: 2016-10-25 22:53:13.544515
-No vulnerabilities found.
-
-
-Hellemos/flaskapp
-https://github.com/Hellemos/flaskapp
-Entry file: None
-Scanned: 2016-10-25 22:53:14.610560
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Hellemos/flaskapp.
-
-ssssergey/flaskengine
-https://github.com/ssssergey/flaskengine
-Entry file: flaskengine/app/__init__.py
-Scanned: 2016-10-25 22:53:15.991679
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-milinbhakta/flaskjinja
-https://github.com/milinbhakta/flaskjinja
-Entry file: flaskjinja/hello.py
-Scanned: 2016-10-25 22:53:22.038783
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-saucecode/flaskcat
-https://github.com/saucecode/flaskcat
-Entry file: flaskcat/flaskcat.py
-Scanned: 2016-10-25 22:53:23.375791
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wiggitywalt/flasktaskr
-https://github.com/wiggitywalt/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 22:53:23.904316
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ashishkx/Flaskr
-https://github.com/ashishkx/Flaskr
-Entry file: None
-Scanned: 2016-10-25 22:53:24.416388
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jward1/flasktaskr
-https://github.com/jward1/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 22:53:24.931689
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-schoolofcode-me/web_blog
-https://github.com/schoolofcode-me/web_blog
-Entry file: web_blog/src/app.py
-Scanned: 2016-10-25 22:53:26.347500
-No vulnerabilities found.
-
-
-arpm/FlaskTaskr
-https://github.com/arpm/FlaskTaskr
-Entry file: None
-Scanned: 2016-10-25 22:53:26.882383
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/arpm/FlaskTaskr.
-
-iKalin/flask1
-https://github.com/iKalin/flask1
-Entry file: flask1/routes.py
-Scanned: 2016-10-25 22:53:30.342007
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-iamrajhans/FlaskPYDemo
-https://github.com/iamrajhans/FlaskPYDemo
-Entry file: None
-Scanned: 2016-10-25 22:53:31.697268
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/iamrajhans/FlaskPYDemo.
-
-MortalCatalyst/flaskTR
-https://github.com/MortalCatalyst/flaskTR
-Entry file: flaskTR/flasktaskr/views.py
-Scanned: 2016-10-25 22:53:32.988051
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-QuadPiece/Quad-Devices-Two
-https://github.com/QuadPiece/Quad-Devices-Two
-Entry file: Quad-Devices-Two/run.py
-Scanned: 2016-10-25 22:53:34.279342
-No vulnerabilities found.
-
-
-dbunker/Flask-Tread
-https://github.com/dbunker/Flask-Tread
-Entry file: Flask-Tread/examples/blog/app/mainapp/__init__.py
-Scanned: 2016-10-25 22:53:35.717929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-martincalvert/GAE-Flask
-https://github.com/martincalvert/GAE-Flask
-Entry file: GAE-Flask/routes.py
-Scanned: 2016-10-25 22:53:38.461088
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-fergyfresh/flask-staysafe
-https://github.com/fergyfresh/flask-staysafe
-Entry file: flask-staysafe/app/__init__.py
-Scanned: 2016-10-25 22:55:02.509582
-No vulnerabilities found.
-
-
-arvelt/hello-flask
-https://github.com/arvelt/hello-flask
-Entry file: hello-flask/main.py
-Scanned: 2016-10-25 22:55:04.187753
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-andrewheekin/flask-metatag
-https://github.com/andrewheekin/flask-metatag
-Entry file: flask-metatag/app.py
-Scanned: 2016-10-25 22:55:05.534757
-No vulnerabilities found.
-
-
-Seneckiy/workwithFlask
-https://github.com/Seneckiy/workwithFlask
-Entry file: workwithFlask/hello.py
-Scanned: 2016-10-25 22:55:07.888469
-No vulnerabilities found.
-
-
-xuefeng-huang/flask_task
-https://github.com/xuefeng-huang/flask_task
-Entry file: flask_task/__init__.py
-Scanned: 2016-10-25 22:55:09.253433
-No vulnerabilities found.
-
-
-ichy-wayland/flask-temp
-https://github.com/ichy-wayland/flask-temp
-Entry file: flask-temp/main.py
-Scanned: 2016-10-25 22:55:10.642719
-No vulnerabilities found.
-
-
-RodrigoVillatoro/flask_blog
-https://github.com/RodrigoVillatoro/flask_blog
-Entry file: flask_blog/blog_app/my_app.py
-Scanned: 2016-10-25 22:55:12.470274
-Vulnerability 1:
-File: flask_blog/blog_app/views.py
- > User input at line 42, trigger word "get(":
- user_email = request.form.get('email')
-File: flask_blog/blog_app/views.py
- > reaches line 43, trigger word "filter(":
- user = User.query.filter(User.email == user_email).first()
-
-Vulnerability 2:
-File: flask_blog/blog_app/helpers.py
- > User input at line 5, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: flask_blog/blog_app/helpers.py
- > Line 7: page = int(page)
- File: flask_blog/blog_app/helpers.py
- > Line 9: page = 1
- File: flask_blog/blog_app/helpers.py
- > Line 10: object_list = query.paginate(page, paginate_by)
-File: flask_blog/blog_app/helpers.py
- > reaches line 11, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context)
-
-Vulnerability 3:
-File: flask_blog/blog_app/entries/blueprint.py
- > User input at line 95, trigger word "files[":
- image_file = request.files['file']
-Reassigned in:
- File: flask_blog/blog_app/entries/blueprint.py
- > Line 96: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename))
-File: flask_blog/blog_app/entries/blueprint.py
- > reaches line 101, trigger word "flash(":
- flash('Saved {}'.format(os.path.basename(filename)), 'success')
-
-Vulnerability 4:
-File: flask_blog/blog_app/entries/blueprint.py
- > User input at line 112, trigger word "Markup(":
- markdown_body = Markup(markdown.markdown(entry.body))
-File: flask_blog/blog_app/entries/blueprint.py
- > reaches line 114, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('entries/detail.html',entry=entry, form=form, markdown_body=markdown_body)
-
-Vulnerability 5:
-File: flask_blog/blog_app/entries/forms.py
- > User input at line 86, trigger word ".data":
- entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first()
-File: flask_blog/blog_app/entries/forms.py
- > reaches line 86, trigger word "filter(":
- entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first()
-
-
-
-patrickyoung/simple-flask
-https://github.com/patrickyoung/simple-flask
-Entry file: simple-flask/hello.py
-Scanned: 2016-10-25 22:55:13.775921
-No vulnerabilities found.
-
-
-sancarbar/flask-auth
-https://github.com/sancarbar/flask-auth
-Entry file: flask-auth/app.py
-Scanned: 2016-10-25 22:55:15.056476
-No vulnerabilities found.
-
-
-lifayi2008/my_flask
-https://github.com/lifayi2008/my_flask
-Entry file: my_flask/app/__init__.py
-Scanned: 2016-10-25 22:55:16.491103
-No vulnerabilities found.
-
-
-staticor/learnFlask
-https://github.com/staticor/learnFlask
-Entry file: None
-Scanned: 2016-10-25 22:55:17.820748
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/staticor/learnFlask.
-
-mehmettaskiner/flask-skeleton
-https://github.com/mehmettaskiner/flask-skeleton
-Entry file: flask-skeleton/app.py
-Scanned: 2016-10-25 22:55:19.107333
-No vulnerabilities found.
-
-
-robin-lee/flask-tutorial
-https://github.com/robin-lee/flask-tutorial
-Entry file: flask-tutorial/app.py
-Scanned: 2016-10-25 22:55:20.517485
-No vulnerabilities found.
-
-
-zonzpoo/blog-flask
-https://github.com/zonzpoo/blog-flask
-Entry file: blog-flask/tests/hello.py
-Scanned: 2016-10-25 22:55:21.943925
-No vulnerabilities found.
-
-
-arpm/flask-blog
-https://github.com/arpm/flask-blog
-Entry file: None
-Scanned: 2016-10-25 22:55:25.314758
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-raejoon/lype-flask
-https://github.com/raejoon/lype-flask
-Entry file: lype-flask/lyre.py
-Scanned: 2016-10-25 22:55:26.786581
-Vulnerability 1:
-File: lype-flask/lyre.py
- > User input at line 239, trigger word "get(":
- splid = request.args.get('spl', None)
-Reassigned in:
- File: lype-flask/lyre.py
- > Line 252: plid = splid
- File: lype-flask/lyre.py
- > Line 256: videos = serv.get_videos(youtube, plid)
- File: lype-flask/lyre.py
- > Line 257: session['playq'] = videos
- File: lype-flask/lyre.py
- > Line 258: session['nowplaying'] = -1
- File: lype-flask/lyre.py
- > Line 267: title = serv.get_title_from_plid(playlists, plid)
- File: lype-flask/lyre.py
- > Line 269: title = serv.get_title_from_plid(searched_playlists, plid)
- File: lype-flask/lyre.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 240: plid = request.args.get('pl', None)
- File: lype-flask/lyre.py
- > Line 244: videos = None
- File: lype-flask/lyre.py
- > Line 246: session['shuffle'] = False
- File: lype-flask/lyre.py
- > Line 249: session['nowplaying'] = -1
-File: lype-flask/lyre.py
- > reaches line 271, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos)
-
-Vulnerability 2:
-File: lype-flask/lyre.py
- > User input at line 240, trigger word "get(":
- plid = request.args.get('pl', None)
-Reassigned in:
- File: lype-flask/lyre.py
- > Line 252: plid = splid
- File: lype-flask/lyre.py
- > Line 256: videos = serv.get_videos(youtube, plid)
- File: lype-flask/lyre.py
- > Line 257: session['playq'] = videos
- File: lype-flask/lyre.py
- > Line 258: session['nowplaying'] = -1
- File: lype-flask/lyre.py
- > Line 267: title = serv.get_title_from_plid(playlists, plid)
- File: lype-flask/lyre.py
- > Line 269: title = serv.get_title_from_plid(searched_playlists, plid)
- File: lype-flask/lyre.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback'))
- File: lype-flask/lyre.py
- > Line 244: videos = None
- File: lype-flask/lyre.py
- > Line 246: session['shuffle'] = False
- File: lype-flask/lyre.py
- > Line 249: session['nowplaying'] = -1
-File: lype-flask/lyre.py
- > reaches line 271, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos)
-
-
-
-ayusharma/flask-mysql
-https://github.com/ayusharma/flask-mysql
-Entry file: flask-mysql/app.py
-Scanned: 2016-10-25 22:55:30.027330
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/sre_compile.py
-
-zolaneta/hello_flask
-https://github.com/zolaneta/hello_flask
-Entry file: hello_flask/Flask.py
-Scanned: 2016-10-25 22:55:31.366209
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mrasband/flask-seed
-https://github.com/mrasband/flask-seed
-Entry file: None
-Scanned: 2016-10-25 22:55:32.674385
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed.
-
-zhaojf85/docker-flask
-https://github.com/zhaojf85/docker-flask
-Entry file: docker-flask/hello-flask/app.py
-Scanned: 2016-10-25 22:55:33.971470
-No vulnerabilities found.
-
-
-higoreduardo/flask-blog
-https://github.com/higoreduardo/flask-blog
-Entry file: None
-Scanned: 2016-10-25 22:55:34.511316
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sholsapp/flask-science
-https://github.com/sholsapp/flask-science
-Entry file: flask-science/flaskscience/__init__.py
-Scanned: 2016-10-25 22:55:35.945297
-No vulnerabilities found.
-
-
-luoluohang/flask_blog
-https://github.com/luoluohang/flask_blog
-Entry file: flask_blog/app/__init__.py
-Scanned: 2016-10-25 22:55:37.436175
-Vulnerability 1:
-File: flask_blog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flask_blog/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flask_blog/app/api_1_0/posts.py
- > Line 18: next = None
-File: flask_blog/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flask_blog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flask_blog/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flask_blog/app/api_1_0/posts.py
- > Line 18: next = None
-File: flask_blog/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flask_blog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: flask_blog/app/api_1_0/posts.py
- > Line 15: prev = None
- File: flask_blog/app/api_1_0/posts.py
- > Line 18: next = None
-File: flask_blog/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flask_blog/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 5:
-File: flask_blog/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 23: show_followed = False
- File: flask_blog/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 6:
-File: flask_blog/app/main/views.py
- > User input at line 43, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 44: pagination = user.post.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 47: posts = pagination.items
-File: flask_blog/app/main/views.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 7:
-File: flask_blog/app/main/views.py
- > User input at line 102, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 104: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask_blog/app/main/views.py
- > Line 105: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 107: comments = pagination.items
- File: flask_blog/app/main/views.py
- > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask_blog/app/main/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, pagination=pagination, comments=comments)
-
-Vulnerability 8:
-File: flask_blog/app/main/views.py
- > User input at line 154, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 155: pagination = user.follower.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 157: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_blog/app/main/views.py
- > Line 153: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 159, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, pagination=pagination, title='Followers of', endpoint='.followers', follows=follows)
-
-Vulnerability 9:
-File: flask_blog/app/main/views.py
- > User input at line 168, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 169: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 171: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_blog/app/main/views.py
- > Line 167: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 173, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, pagination=pagination, follows=follows, title='Followed by', endpoint='.followed_by')
-
-Vulnerability 10:
-File: flask_blog/app/main/views.py
- > User input at line 193, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 194: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 197: comments = pagination.items
-File: flask_blog/app/main/views.py
- > reaches line 198, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-mnzr/MegaFlask
-https://github.com/mnzr/MegaFlask
-Entry file: MegaFlask/app/__init__.py
-Scanned: 2016-10-25 22:55:38.868789
-No vulnerabilities found.
-
-
-rchibana/MicroBlog
-https://github.com/rchibana/MicroBlog
-Entry file: MicroBlog/app/__init__.py
-Scanned: 2016-10-25 22:55:40.311425
-No vulnerabilities found.
-
-
-damstrom/flask-hello-world
-https://github.com/damstrom/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 22:55:40.853296
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-atf1999/Flask-Mega-Tutorial
-https://github.com/atf1999/Flask-Mega-Tutorial
-Entry file: Flask-Mega-Tutorial/server.py
-Scanned: 2016-10-25 22:55:42.167166
-No vulnerabilities found.
-
-
-ThukralAman/flaskApp2
-https://github.com/ThukralAman/flaskApp2
-Entry file: flaskApp2/app.py
-Scanned: 2016-10-25 22:55:43.647468
-No vulnerabilities found.
-
-
-apeete/flaskHelloWorld
-https://github.com/apeete/flaskHelloWorld
-Entry file: flaskHelloWorld/app.py
-Scanned: 2016-10-25 22:56:01.647510
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lucidfrontier45/FlaskRethinkDBProject
-https://github.com/lucidfrontier45/FlaskRethinkDBProject
-Entry file: FlaskRethinkDBProject/webapp/factory.py
-Scanned: 2016-10-25 22:56:04.014430
-No vulnerabilities found.
-
-
-jwnwilson/flask_gae_example
-https://github.com/jwnwilson/flask_gae_example
-Entry file: flask_gae_example/hello_world.py
-Scanned: 2016-10-25 22:56:08.399074
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-saichandra286/BlogSpot-using-flask
-https://github.com/saichandra286/BlogSpot-using-flask
-Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py
-Scanned: 2016-10-25 22:56:09.895689
-No vulnerabilities found.
-
-
-Hyvjan/flask-hello-world
-https://github.com/Hyvjan/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 22:56:10.461534
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-auslander70/flask_hello_world
-https://github.com/auslander70/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-25 22:56:11.770942
-No vulnerabilities found.
-
-
-BugisDev/AppSurvey-Flask
-https://github.com/BugisDev/AppSurvey-Flask
-Entry file: AppSurvey-Flask/app.py
-Scanned: 2016-10-25 22:56:13.208337
-No vulnerabilities found.
-
-
-purpleP/flask_alchemy_rest
-https://github.com/purpleP/flask_alchemy_rest
-Entry file: flask_alchemy_rest/tests/test_endpoints.py
-Scanned: 2016-10-25 22:56:14.910214
-No vulnerabilities found.
-
-
-yueyehm/flask_hello_world
-https://github.com/yueyehm/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-25 22:56:16.186736
-No vulnerabilities found.
-
-
-lhr0916/flask_redis_task_q
-https://github.com/lhr0916/flask_redis_task_q
-Entry file: flask_redis_task_q/web/app.py
-Scanned: 2016-10-25 22:56:17.487375
-No vulnerabilities found.
-
-
-PrettyPrinted/flask-request-decorators
-https://github.com/PrettyPrinted/flask-request-decorators
-Entry file: flask-request-decorators/request_decorators.py
-Scanned: 2016-10-25 22:56:18.771571
-No vulnerabilities found.
-
-
-ics/Flask-GnuPG
-https://github.com/ics/Flask-GnuPG
-Entry file: Flask-GnuPG/test_flask_gnupg.py
-Scanned: 2016-10-25 22:56:20.081953
-No vulnerabilities found.
-
-
-johnkabler/flask_dash_learn
-https://github.com/johnkabler/flask_dash_learn
-Entry file: flask_dash_learn/first_app.py
-Scanned: 2016-10-25 22:56:21.376570
-No vulnerabilities found.
-
-
-leitu/netscaler-flask-api
-https://github.com/leitu/netscaler-flask-api
-Entry file: netscaler-flask-api/netscaler_api/__init__.py
-Scanned: 2016-10-25 22:56:22.806756
-No vulnerabilities found.
-
-
-shilpasanthosh/flask-user-login-app
-https://github.com/shilpasanthosh/flask-user-login-app
-Entry file: flask-user-login-app/loginapp/app.py
-Scanned: 2016-10-25 22:56:26.598037
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-rasselpratomo/simple_flask_restful
-https://github.com/rasselpratomo/simple_flask_restful
-Entry file: simple_flask_restful/app/__init__.py
-Scanned: 2016-10-25 22:56:27.936138
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-PrettyPrinted/flask-uploads-intro
-https://github.com/PrettyPrinted/flask-uploads-intro
-Entry file: flask-uploads-intro/upload.py
-Scanned: 2016-10-25 22:56:29.434167
-No vulnerabilities found.
-
-
-kojoidrissa/flask_intro_video
-https://github.com/kojoidrissa/flask_intro_video
-Entry file: flask_intro_video/5a/hello.py
-Scanned: 2016-10-25 22:56:30.972172
-Vulnerability 1:
-File: flask_intro_video/5a/hello.py
- > User input at line 36, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_intro_video/5a/hello.py
- > Line 32: name = None
-File: flask_intro_video/5a/hello.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name, new=new)
-
-
-
-joe8767/flask-restful-example
-https://github.com/joe8767/flask-restful-example
-Entry file: flask-restful-example/api.py
-Scanned: 2016-10-25 22:56:32.366072
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mrkewen/flask-hello-world
-https://github.com/mrkewen/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 22:56:32.880390
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jmsalcido/python-flask-microblog
-https://github.com/jmsalcido/python-flask-microblog
-Entry file: python-flask-microblog/microblog/app/__init__.py
-Scanned: 2016-10-25 22:56:34.424185
-Vulnerability 1:
-File: python-flask-microblog/microblog/app/views.py
- > User input at line 107, trigger word ".data":
- username = form.username.data
-Reassigned in:
- File: python-flask-microblog/microblog/app/views.py
- > Line 108: g.user.username = username
- File: python-flask-microblog/microblog/app/views.py
- > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form)
-File: python-flask-microblog/microblog/app/views.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username))
-
-Vulnerability 2:
-File: python-flask-microblog/microblog/app/views.py
- > User input at line 107, trigger word ".data":
- username = form.username.data
-Reassigned in:
- File: python-flask-microblog/microblog/app/views.py
- > Line 108: g.user.username = username
- File: python-flask-microblog/microblog/app/views.py
- > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form)
-File: python-flask-microblog/microblog/app/views.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username))
-
-Vulnerability 3:
-File: python-flask-microblog/microblog/app/forms.py
- > User input at line 34, trigger word ".data":
- users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all()
-File: python-flask-microblog/microblog/app/forms.py
- > reaches line 34, trigger word "filter(":
- users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all()
-
-
-
-ettanany/flask-angular-contact-manager
-https://github.com/ettanany/flask-angular-contact-manager
-Entry file: flask-angular-contact-manager/server/app/__init__.py
-Scanned: 2016-10-25 22:56:36.240415
-No vulnerabilities found.
-
-
-nausheenfatma/WebAppWithFlask
-https://github.com/nausheenfatma/WebAppWithFlask
-Entry file: WebAppWithFlask/model.py
-Scanned: 2016-10-25 22:56:37.551302
-Vulnerability 1:
-File: WebAppWithFlask/controller.py
- > User input at line 21, trigger word "form[":
- post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published'])
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 22: post_add = post.add(post)
- File: WebAppWithFlask/controller.py
- > Line 27: error = post_add
-File: WebAppWithFlask/controller.py
- > reaches line 28, trigger word "flash(":
- flash(error)
-
-Vulnerability 2:
-File: WebAppWithFlask/controller.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
- File: WebAppWithFlask/controller.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
-File: WebAppWithFlask/controller.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post)
-
-Vulnerability 3:
-File: WebAppWithFlask/controller.py
- > User input at line 57, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 62: post_delete = post.delete(post)
- File: WebAppWithFlask/controller.py
- > Line 66: error = post_delete
-File: WebAppWithFlask/controller.py
- > reaches line 67, trigger word "flash(":
- flash(error)
-
-
-
-marcfilba/videoStreamingFlask
-https://github.com/marcfilba/videoStreamingFlask
-Entry file: videoStreamingFlask/main.py
-Scanned: 2016-10-25 22:56:38.818608
-No vulnerabilities found.
-
-
-Jacob234/Flask-hello-world
-https://github.com/Jacob234/Flask-hello-world
-Entry file: Flask-hello-world/hello_world.py
-Scanned: 2016-10-25 22:56:40.115612
-No vulnerabilities found.
-
-
-PrettyPrinted/flask-restless-post
-https://github.com/PrettyPrinted/flask-restless-post
-Entry file: flask-restless-post/restless.py
-Scanned: 2016-10-25 22:56:41.391557
-No vulnerabilities found.
-
-
-alexwilkerson/microblog
-https://github.com/alexwilkerson/microblog
-Entry file: None
-Scanned: 2016-10-25 22:56:41.914873
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/alexwilkerson/microblog.
-
-austindavid/flasktaskr-cont
-https://github.com/austindavid/flasktaskr-cont
-Entry file: flasktaskr-cont/project/__init__.py
-Scanned: 2016-10-25 22:56:43.347078
-No vulnerabilities found.
-
-
-RicoChou/MyFlasky
-https://github.com/RicoChou/MyFlasky
-Entry file: MyFlasky/app/__init__.py
-Scanned: 2016-10-25 22:56:45.119184
-Vulnerability 1:
-File: MyFlasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlasky/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: MyFlasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlasky/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: MyFlasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: MyFlasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: MyFlasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: MyFlasky/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 23: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 45: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 45: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: MyFlasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: MyFlasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: MyFlasky/app/api_1_0/users.py
- > Line 45: next = None
-File: MyFlasky/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: MyFlasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: MyFlasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: MyFlasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: MyFlasky/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: MyFlasky/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 55: posts = pagination.items
- File: MyFlasky/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: MyFlasky/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 45: show_followed = False
- File: MyFlasky/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: MyFlasky/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 67: posts = pagination.items
-File: MyFlasky/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: MyFlasky/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: MyFlasky/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 134: comments = pagination.items
- File: MyFlasky/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: MyFlasky/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: MyFlasky/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: MyFlasky/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: MyFlasky/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: MyFlasky/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: MyFlasky/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: MyFlasky/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: MyFlasky/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: MyFlasky/app/main/views.py
- > Line 246: comments = pagination.items
-File: MyFlasky/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-tdvtoan/scorecard-recognition
-https://github.com/tdvtoan/scorecard-recognition
-Entry file: scorecard-recognition/project/__init__.py
-Scanned: 2016-10-25 22:57:03.199318
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-saichandra286/Complete-Angularjs-Flask-Todo-App
-https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App
-Entry file: None
-Scanned: 2016-10-25 22:57:04.635308
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App.
-
-quiqua/docker-flask-celery-redis-example
-https://github.com/quiqua/docker-flask-celery-redis-example
-Entry file: docker-flask-celery-redis-example/src/myapp/app.py
-Scanned: 2016-10-25 22:57:06.960086
-No vulnerabilities found.
-
-
-MakeSchool-17/trip-planner-flask-backend-thetopplayer
-https://github.com/MakeSchool-17/trip-planner-flask-backend-thetopplayer
-Entry file: trip-planner-flask-backend-thetopplayer/server.py
-Scanned: 2016-10-25 22:57:11.779892
-No vulnerabilities found.
-
-
-MacHu-GWU/flask-restless-api-client-project
-https://github.com/MacHu-GWU/flask-restless-api-client-project
-Entry file: flask-restless-api-client-project/tests/CustomizeSerialization/run_server.py
-Scanned: 2016-10-25 22:57:13.199443
-No vulnerabilities found.
-
-
-whiskeyromeo/bucketlist
-https://github.com/whiskeyromeo/bucketlist
-Entry file: None
-Scanned: 2016-10-25 22:57:16.571795
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CHHLeo/foruV1home_flask_pycharm_practice
-https://github.com/CHHLeo/foruV1home_flask_pycharm_practice
-Entry file: foruV1home_flask_pycharm_practice/flask_pycharm_practice.py
-Scanned: 2016-10-25 22:58:02.327129
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-heamon7/learn-restful
-https://github.com/heamon7/learn-restful
-Entry file: learn-restful/app.py
-Scanned: 2016-10-25 22:58:04.196237
-Vulnerability 1:
-File: learn-restful/app.py
- > User input at line 82, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: learn-restful/app.py
- > reaches line 89, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-goodyvn/flask
-https://github.com/goodyvn/flask
-Entry file: None
-Scanned: 2016-10-25 22:58:06.840590
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stevebannon/flask
-https://github.com/stevebannon/flask
-Entry file: None
-Scanned: 2016-10-25 22:58:07.373781
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sebkouba/dynamic-flask-form
-https://github.com/sebkouba/dynamic-flask-form
-Entry file: dynamic-flask-form/multimodel.py
-Scanned: 2016-10-25 22:58:08.671271
-No vulnerabilities found.
-
-
-willianribeiro/flaskr
-https://github.com/willianribeiro/flaskr
-Entry file: None
-Scanned: 2016-10-25 22:58:09.229833
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr.
-
-solutionspecialist/flaskr
-https://github.com/solutionspecialist/flaskr
-Entry file: None
-Scanned: 2016-10-25 22:58:09.756008
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/solutionspecialist/flaskr.
-
-XingxinLi/flaskr
-https://github.com/XingxinLi/flaskr
-Entry file: None
-Scanned: 2016-10-25 22:58:10.301521
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/XingxinLi/flaskr.
-
-wiggitywalt/flasktaskr
-https://github.com/wiggitywalt/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 22:58:10.827083
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mg6/flaskr
-https://github.com/mg6/flaskr
-Entry file: None
-Scanned: 2016-10-25 22:58:11.345424
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mg6/flaskr.
-
-sourHobbes/flaskdemo
-https://github.com/sourHobbes/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 22:58:11.892680
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Bayaz/flasktaskr
-https://github.com/Bayaz/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 22:58:12.472403
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kewsie/flasky
-https://github.com/kewsie/flasky
-Entry file: None
-Scanned: 2016-10-25 22:58:13.005040
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-metakermit/resin-home-automator
-https://github.com/metakermit/resin-home-automator
-Entry file: resin-home-automator/src/main.py
-Scanned: 2016-10-25 22:58:14.779511
-No vulnerabilities found.
-
-
-guiti1/FlaskAp
-https://github.com/guiti1/FlaskAp
-Entry file: FlaskAp/FlaskApp/__init__.py
-Scanned: 2016-10-25 22:58:18.629201
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/sre_compile.py
-
-zerodaemon/flask1
-https://github.com/zerodaemon/flask1
-Entry file: flask1/flaskr.py
-Scanned: 2016-10-25 22:58:19.952866
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-JoshLandry/FlaskBlog
-https://github.com/JoshLandry/FlaskBlog
-Entry file: FlaskBlog/Flask_Blog/__init__.py
-Scanned: 2016-10-25 22:58:22.016582
-Vulnerability 1:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 187, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 190: newEntry = BlogEntry(user=current_user, title=title, entry=entry, rating=rating, artist=artist, tags=tags)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 193, trigger word "flash(":
- flash('Stored entry: '{}''.format(title))
-
-Vulnerability 2:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 221, trigger word ".data":
- user = User.get_by_username(form.username.data)
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 224, trigger word "flash(":
- flash('Logged in successfully as {}.'.format(user.username))
-
-Vulnerability 3:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 221, trigger word ".data":
- user = User.get_by_username(form.username.data)
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 225, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username))
-
-Vulnerability 4:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 221, trigger word ".data":
- user = User.get_by_username(form.username.data)
-Reassigned in:
- File: FlaskBlog/Flask_Blog/__init__.py
- > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 225, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username))
-
-Vulnerability 5:
-File: FlaskBlog/Flask_Blog/__init__.py
- > User input at line 238, trigger word ".data":
- user = User(email=form.email.data, username=form.username.data, password=form.password.data)
-File: FlaskBlog/Flask_Blog/__init__.py
- > reaches line 243, trigger word "flash(":
- flash('Welcome, {}! Please login.'.format(user.username))
-
-
-
-Bayaz/FlaskBlog
-https://github.com/Bayaz/FlaskBlog
-Entry file: FlaskBlog/blog.py
-Scanned: 2016-10-25 22:58:23.338010
-No vulnerabilities found.
-
-
-colindjk/flaskTest
-https://github.com/colindjk/flaskTest
-Entry file: flaskTest/app.py
-Scanned: 2016-10-25 22:58:24.760344
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Arsh23/random-crossword-generater
-https://github.com/Arsh23/random-crossword-generater
-Entry file: random-crossword-generater/app.py
-Scanned: 2016-10-25 22:58:26.833117
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-spark0128/flask-intro
-https://github.com/spark0128/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-25 22:58:44.917086
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-petrgru/flask-remenarna
-https://github.com/petrgru/flask-remenarna
-Entry file: flask-remenarna/app/__init__.py
-Scanned: 2016-10-25 22:58:47.831306
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-bcb/flask-uploads
-https://github.com/bcb/flask-uploads
-Entry file: flask-uploads/tests/test-uploads.py
-Scanned: 2016-10-25 22:58:49.446425
-No vulnerabilities found.
-
-
-mauriciorey/learning_flask
-https://github.com/mauriciorey/learning_flask
-Entry file: learning_flask/routes.py
-Scanned: 2016-10-25 22:58:51.352444
-Vulnerability 1:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 93, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-Vulnerability 2:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 96, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-
-
-kumaraswins/flask-angular
-https://github.com/kumaraswins/flask-angular
-Entry file: flask-angular/app/__init__.py
-Scanned: 2016-10-25 22:59:00.589865
-No vulnerabilities found.
-
-
-zengyifa/flask-starter
-https://github.com/zengyifa/flask-starter
-Entry file: None
-Scanned: 2016-10-25 22:59:02.440856
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zengyifa/flask-starter.
-
-rookiebulls/flask-learn
-https://github.com/rookiebulls/flask-learn
-Entry file: None
-Scanned: 2016-10-25 22:59:18.436892
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-climberwb/flask-blog
-https://github.com/climberwb/flask-blog
-Entry file: None
-Scanned: 2016-10-25 22:59:18.963999
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Hyvjan/flask-blog
-https://github.com/Hyvjan/flask-blog
-Entry file: None
-Scanned: 2016-10-25 22:59:19.504864
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-xingyz/flask_thebutton
-https://github.com/xingyz/flask_thebutton
-Entry file: flask_thebutton/app/__init__.py
-Scanned: 2016-10-25 22:59:21.194920
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-brittanymcgarr/learningFlask
-https://github.com/brittanymcgarr/learningFlask
-Entry file: learningFlask/FlaskPractice/app/app.py
-Scanned: 2016-10-25 22:59:23.807485
-Vulnerability 1:
-File: learningFlask/FlaskPractice/app/helpers.py
- > User input at line 13, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: learningFlask/FlaskPractice/app/helpers.py
- > Line 16: page = int(page)
- File: learningFlask/FlaskPractice/app/helpers.py
- > Line 18: page = 1
- File: learningFlask/FlaskPractice/app/helpers.py
- > Line 20: object_list = query.paginate(page, paginate_by)
-File: learningFlask/FlaskPractice/app/helpers.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context)
-
-Vulnerability 2:
-File: learningFlask/FlaskPractice/app/entries/blueprint.py
- > User input at line 65, trigger word "files[":
- image_file = request.files['file']
-Reassigned in:
- File: learningFlask/FlaskPractice/app/entries/blueprint.py
- > Line 66: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename))
-File: learningFlask/FlaskPractice/app/entries/blueprint.py
- > reaches line 69, trigger word "flash(":
- flash('Saved %s' % os.path.basename(filename), 'success')
-
-
-
-PrettyPrinted/flask-sessions
-https://github.com/PrettyPrinted/flask-sessions
-Entry file: flask-sessions/session.py
-Scanned: 2016-10-25 22:59:25.092248
-No vulnerabilities found.
-
-
-pfig/flask-elasticsearch
-https://github.com/pfig/flask-elasticsearch
-Entry file: flask-elasticsearch/flask_elasticsearch.py
-Scanned: 2016-10-25 22:59:26.509386
-No vulnerabilities found.
-
-
-nimeshkverma/Ideal_Flask
-https://github.com/nimeshkverma/Ideal_Flask
-Entry file: Ideal_Flask/LargeApp/app/__init__.py
-Scanned: 2016-10-25 22:59:30.372248
-Vulnerability 1:
-File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py
- > User input at line 31, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py
- > Line 35: session['user_id'] = user.id
-File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py
- > reaches line 37, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-tholsapp/flask_framework
-https://github.com/tholsapp/flask_framework
-Entry file: flask_framework/app/__init__.py
-Scanned: 2016-10-25 22:59:31.750043
-No vulnerabilities found.
-
-
-evansa/flask-sqlalchemy
-https://github.com/evansa/flask-sqlalchemy
-Entry file: flask-sqlalchemy/flask-sqlalchemy/__init__.py
-Scanned: 2016-10-25 22:59:33.191366
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Kajvdh/nao-flask
-https://github.com/Kajvdh/nao-flask
-Entry file: nao-flask/app.py
-Scanned: 2016-10-25 22:59:34.614123
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-anbasile/flask_sample
-https://github.com/anbasile/flask_sample
-Entry file: flask_sample/app.py
-Scanned: 2016-10-25 22:59:38.392646
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_sample/flask/lib/python2.7/sre_compile.py
-
-androidzhibinw/Flask-reg
-https://github.com/androidzhibinw/Flask-reg
-Entry file: Flask-reg/app.py
-Scanned: 2016-10-25 22:59:40.098682
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mrasband/flask-seed
-https://github.com/mrasband/flask-seed
-Entry file: None
-Scanned: 2016-10-25 22:59:40.649354
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed.
-
-vrokida/demo-flask
-https://github.com/vrokida/demo-flask
-Entry file: demo-flask/demo-flask.py
-Scanned: 2016-10-25 22:59:41.961382
-No vulnerabilities found.
-
-
-Clarity-89/server_flask
-https://github.com/Clarity-89/server_flask
-Entry file: server_flask/project.py
-Scanned: 2016-10-25 22:59:43.889984
-No vulnerabilities found.
-
-
-jcmflenso/flask-udemy
-https://github.com/jcmflenso/flask-udemy
-Entry file: flask-udemy/hello.py
-Scanned: 2016-10-25 22:59:45.196385
-No vulnerabilities found.
-
-
-schakalakka/flask-project
-https://github.com/schakalakka/flask-project
-Entry file: flask-project/app/__init__.py
-Scanned: 2016-10-25 22:59:53.911255
-No vulnerabilities found.
-
-
-simongareste/flask-dummy
-https://github.com/simongareste/flask-dummy
-Entry file: flask-dummy/flask_dummy/__init__.py
-Scanned: 2016-10-25 22:59:55.398065
-No vulnerabilities found.
-
-
-liu1020269358/learn-flask
-https://github.com/liu1020269358/learn-flask
-Entry file: None
-Scanned: 2016-10-25 22:59:59.524116
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-foobaar/flask-expt
-https://github.com/foobaar/flask-expt
-Entry file: flask-expt/flask-experiment.py
-Scanned: 2016-10-25 23:00:00.816662
-No vulnerabilities found.
-
-
-lucafaggianelli/flask-skeleton
-https://github.com/lucafaggianelli/flask-skeleton
-Entry file: flask-skeleton/app_template/app_name/__init__.py
-Scanned: 2016-10-25 23:00:03.535557
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-econne01/flask_blog
-https://github.com/econne01/flask_blog
-Entry file: flask_blog/app/app.py
-Scanned: 2016-10-25 23:00:05.672336
-Vulnerability 1:
-File: flask_blog/app/views.py
- > User input at line 13, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-File: flask_blog/app/views.py
- > reaches line 20, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index'))
-
-Vulnerability 2:
-File: flask_blog/app/views.py
- > User input at line 13, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-File: flask_blog/app/views.py
- > reaches line 20, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index'))
-
-Vulnerability 3:
-File: flask_blog/app/views.py
- > User input at line 13, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-File: flask_blog/app/views.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',next_url=next_url)
-
-Vulnerability 4:
-File: flask_blog/app/views.py
- > User input at line 55, trigger word "get(":
- entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/app/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/app/views.py
- > reaches line 61, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug))
-
-Vulnerability 5:
-File: flask_blog/app/views.py
- > User input at line 55, trigger word "get(":
- entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/app/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/app/views.py
- > reaches line 61, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug))
-
-Vulnerability 6:
-File: flask_blog/app/views.py
- > User input at line 55, trigger word "get(":
- entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/app/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/app/views.py
- > reaches line 63, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug))
-
-Vulnerability 7:
-File: flask_blog/app/views.py
- > User input at line 55, trigger word "get(":
- entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/app/views.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/app/views.py
- > reaches line 63, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug))
-
-
-
-mdeamon/flask_app
-https://github.com/mdeamon/flask_app
-Entry file: flask_app/app.py
-Scanned: 2016-10-25 23:00:07.171417
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-dlrice/hello-flask
-https://github.com/dlrice/hello-flask
-Entry file: hello-flask/hello.py
-Scanned: 2016-10-25 23:00:08.516472
-No vulnerabilities found.
-
-
-euler1337/flask_tutorial
-https://github.com/euler1337/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:00:09.125331
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/euler1337/flask_tutorial.
-
-devyash/Intelligent-Public-Grievance-System
-https://github.com/devyash/Intelligent-Public-Grievance-System
-Entry file: Intelligent-Public-Grievance-System/app.py
-Scanned: 2016-10-25 23:00:15.905252
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-elphinkuo/ji_python_flask
-https://github.com/elphinkuo/ji_python_flask
-Entry file: ji_python_flask/app/musicModify.py
-Scanned: 2016-10-25 23:00:17.367839
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-afaki077/minitweet
-https://github.com/afaki077/minitweet
-Entry file: None
-Scanned: 2016-10-25 23:00:19.885409
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/afaki077/minitweet.
-
-ThukralAman/flaskApp2
-https://github.com/ThukralAman/flaskApp2
-Entry file: flaskApp2/app.py
-Scanned: 2016-10-25 23:00:21.688297
-No vulnerabilities found.
-
-
-sbm367/flaskTest2
-https://github.com/sbm367/flaskTest2
-Entry file: flaskTest2/flaskTest.py
-Scanned: 2016-10-25 23:00:23.002941
-No vulnerabilities found.
-
-
-emil-k/climate-compare_FlaskApp
-https://github.com/emil-k/climate-compare_FlaskApp
-Entry file: climate-compare_FlaskApp/__init__.py
-Scanned: 2016-10-25 23:00:31.642521
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: climate-compare_FlaskApp/venv/lib/python2.7/sre_compile.py
-
-Cosaquee/flask-weather-app
-https://github.com/Cosaquee/flask-weather-app
-Entry file: flask-weather-app/main.py
-Scanned: 2016-10-25 23:00:35.613840
-No vulnerabilities found.
-
-
-daytonight/Flask-Web-Development-code
-https://github.com/daytonight/Flask-Web-Development-code
-Entry file: Flask-Web-Development-code/venv/lib/python2.7/site-packages/flask_sqlalchemy/__init__.py
-Scanned: 2016-10-25 23:00:41.259627
-No vulnerabilities found.
-
-
-lkpanganiban/flask-mega-tutorial
-https://github.com/lkpanganiban/flask-mega-tutorial
-Entry file: flask-mega-tutorial/app/__init__.py
-Scanned: 2016-10-25 23:00:42.915677
-No vulnerabilities found.
-
-
-saichandra286/BlogSpot-using-flask
-https://github.com/saichandra286/BlogSpot-using-flask
-Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py
-Scanned: 2016-10-25 23:00:44.503513
-No vulnerabilities found.
-
-
-afborodin/simple-mysql-flask-app
-https://github.com/afborodin/simple-mysql-flask-app
-Entry file: None
-Scanned: 2016-10-25 23:01:32.976816
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dternyak/my-react-flask-blog
-https://github.com/dternyak/my-react-flask-blog
-Entry file: my-react-flask-blog/index.py
-Scanned: 2016-10-25 23:01:48.978051
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-skriems/flask-cherrypy-dockerized
-https://github.com/skriems/flask-cherrypy-dockerized
-Entry file: flask-cherrypy-dockerized/app.py
-Scanned: 2016-10-25 23:01:50.315894
-No vulnerabilities found.
-
-
-johnkabler/flask_dash_learn
-https://github.com/johnkabler/flask_dash_learn
-Entry file: flask_dash_learn/first_app.py
-Scanned: 2016-10-25 23:01:51.604494
-No vulnerabilities found.
-
-
-broak/flask-hello-world
-https://github.com/broak/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:01:52.124866
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ABaldwinHunter/flask-clone-classic
-https://github.com/ABaldwinHunter/flask-clone-classic
-Entry file: flask-clone-classic/setup.py
-Scanned: 2016-10-25 23:01:55.994130
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ldrunner100/flask_hello_world
-https://github.com/ldrunner100/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-25 23:01:59.137979
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-FinleySmile/flask_blog_demo
-https://github.com/FinleySmile/flask_blog_demo
-Entry file: flask_blog_demo/flask_blog_demo.py
-Scanned: 2016-10-25 23:02:01.475353
-Vulnerability 1:
-File: flask_blog_demo/flask_blog_demo.py
- > User input at line 63, trigger word "form[":
- username = request.form['username']
-Reassigned in:
- File: flask_blog_demo/flask_blog_demo.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_entries'))
-File: flask_blog_demo/flask_blog_demo.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',username=username, error=error)
-
-
-
-quandrei/godzilla-foxfire-flask
-https://github.com/quandrei/godzilla-foxfire-flask
-Entry file: godzilla-foxfire-flask/app/__init__.py
-Scanned: 2016-10-25 23:02:03.530545
-No vulnerabilities found.
-
-
-ArTrics/Flask_Angular_Project
-https://github.com/ArTrics/Flask_Angular_Project
-Entry file: Flask_Angular_Project/index.py
-Scanned: 2016-10-25 23:02:08.068371
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/sre_compile.py
-
-RodrigoVillatoro/flask_social_network
-https://github.com/RodrigoVillatoro/flask_social_network
-Entry file: flask_social_network/app/__init__.py
-Scanned: 2016-10-25 23:02:10.483382
-Vulnerability 1:
-File: flask_social_network/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/posts.py
- > Line 17: posts = pagination.items
- File: flask_social_network/app/api_1_0/posts.py
- > Line 18: prev_page = None
- File: flask_social_network/app/api_1_0/posts.py
- > Line 21: next_page = None
-File: flask_social_network/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flask_social_network/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/posts.py
- > Line 17: posts = pagination.items
- File: flask_social_network/app/api_1_0/posts.py
- > Line 18: prev_page = None
- File: flask_social_network/app/api_1_0/posts.py
- > Line 21: next_page = None
-File: flask_social_network/app/api_1_0/posts.py
- > reaches line 23, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flask_social_network/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/posts.py
- > Line 17: posts = pagination.items
- File: flask_social_network/app/api_1_0/posts.py
- > Line 18: prev_page = None
- File: flask_social_network/app/api_1_0/posts.py
- > Line 21: next_page = None
-File: flask_social_network/app/api_1_0/posts.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 4:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 21: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 22: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 25: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 24, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 21: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 22: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 25: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 27, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 21: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 22: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 25: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 28, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 7:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 49: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 49: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 51, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flask_social_network/app/api_1_0/users.py
- > User input at line 39, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/users.py
- > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: flask_social_network/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: flask_social_network/app/api_1_0/users.py
- > Line 49: next_page = None
-File: flask_social_network/app/api_1_0/users.py
- > reaches line 52, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 10:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 16: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 17: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 20: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 19, trigger word "url_for(":
- prev_page = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 16: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 17: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 20: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 22, trigger word "url_for(":
- next_page = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 16: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 17: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 20: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total)
-
-Vulnerability 13:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 44: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 45: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 48: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 47, trigger word "url_for(":
- prev_page = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 44: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 45: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 48: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 50, trigger word "url_for(":
- next_page = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flask_social_network/app/api_1_0/comments.py
- > User input at line 40, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/api_1_0/comments.py
- > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/api_1_0/comments.py
- > Line 44: comments = pagination.items
- File: flask_social_network/app/api_1_0/comments.py
- > Line 45: prev_page = None
- File: flask_social_network/app/api_1_0/comments.py
- > Line 48: next_page = None
-File: flask_social_network/app/api_1_0/comments.py
- > reaches line 51, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total)
-
-Vulnerability 16:
-File: flask_social_network/app/main/views.py
- > User input at line 47, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 56: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 61: posts = pagination.items
- File: flask_social_network/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 62, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flask_social_network/app/main/views.py
- > User input at line 50, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 48: show_followed = False
- File: flask_social_network/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 62, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flask_social_network/app/main/views.py
- > User input at line 74, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 75: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 80: posts = pagination.items
-File: flask_social_network/app/main/views.py
- > reaches line 81, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flask_social_network/app/main/views.py
- > User input at line 146, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 148: page = post.comments.count() - 1 // current_app.config['APP_COMMENTS_PER_PAGE'] + 1
- File: flask_social_network/app/main/views.py
- > Line 150: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 155: comments = pagination.items
- File: flask_social_network/app/main/views.py
- > Line 145: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.post',id=post.id, page=-1))
-File: flask_social_network/app/main/views.py
- > reaches line 156, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flask_social_network/app/main/views.py
- > User input at line 220, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 221: pagination = user.followers.paginate(page,per_page=current_app.config['APP_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 226: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_social_network/app/main/views.py
- > Line 219: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 228, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='main.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flask_social_network/app/main/views.py
- > User input at line 244, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 245: pagination = user.followed.paginate(page,per_page=current_app.config['APP_FOLLOWING_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 250: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_social_network/app/main/views.py
- > Line 243: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask_social_network/app/main/views.py
- > reaches line 252, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='main.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flask_social_network/app/main/views.py
- > User input at line 282, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_social_network/app/main/views.py
- > Line 283: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_social_network/app/main/views.py
- > Line 288: comments = pagination.items
-File: flask_social_network/app/main/views.py
- > reaches line 289, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-mdublin/Flask-CRUD-template
-https://github.com/mdublin/Flask-CRUD-template
-Entry file: Flask-CRUD-template/blog/__init__.py
-Scanned: 2016-10-25 23:02:15.082103
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-p00gz/flask-imdbratings-app-backend
-https://github.com/p00gz/flask-imdbratings-app-backend
-Entry file: flask-imdbratings-app-backend/imdbRatings/__init__.py
-Scanned: 2016-10-25 23:02:19.183152
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-moonlitesolutions/flask_rest_template
-https://github.com/moonlitesolutions/flask_rest_template
-Entry file: flask_rest_template/flask_rest/api/api.py
-Scanned: 2016-10-25 23:02:22.465419
-No vulnerabilities found.
-
-
-mrkewen/flask-hello-world
-https://github.com/mrkewen/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:02:22.986028
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wasw100/flask-sqlalchemy-demo2
-https://github.com/wasw100/flask-sqlalchemy-demo2
-Entry file: flask-sqlalchemy-demo2/hello.py
-Scanned: 2016-10-25 23:02:24.318950
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-artisanofcode/flask-generic-views
-https://github.com/artisanofcode/flask-generic-views
-Entry file: flask-generic-views/setup.py
-Scanned: 2016-10-25 23:02:26.015080
-Vulnerability 1:
-File: flask-generic-views/flask_generic_views/core.py
- > User input at line 308, trigger word "get(":
- query = request.environ.get('QUERY_STRING', '')
-File: flask-generic-views/flask_generic_views/core.py
- > reaches line 311, trigger word "replace(":
- url = url_parse(url).replace(query=query).to_url()
-
-
-
-mekanix/flask-bootstrap-sql-rest
-https://github.com/mekanix/flask-bootstrap-sql-rest
-Entry file: flask-bootstrap-sql-rest/manage.py
-Scanned: 2016-10-25 23:02:27.418324
-No vulnerabilities found.
-
-
-ayesandarmoe/microblog_flask_tutorial
-https://github.com/ayesandarmoe/microblog_flask_tutorial
-Entry file: microblog_flask_tutorial/app/__init__.py
-Scanned: 2016-10-25 23:02:37.316632
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-alexwilkerson/flask-hello-world
-https://github.com/alexwilkerson/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:02:37.932265
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nausheenfatma/WebAppWithFlask
-https://github.com/nausheenfatma/WebAppWithFlask
-Entry file: WebAppWithFlask/model.py
-Scanned: 2016-10-25 23:02:39.237421
-Vulnerability 1:
-File: WebAppWithFlask/controller.py
- > User input at line 21, trigger word "form[":
- post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published'])
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 22: post_add = post.add(post)
- File: WebAppWithFlask/controller.py
- > Line 27: error = post_add
-File: WebAppWithFlask/controller.py
- > reaches line 28, trigger word "flash(":
- flash(error)
-
-Vulnerability 2:
-File: WebAppWithFlask/controller.py
- > User input at line 35, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
- File: WebAppWithFlask/controller.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index'))
-File: WebAppWithFlask/controller.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post)
-
-Vulnerability 3:
-File: WebAppWithFlask/controller.py
- > User input at line 57, trigger word "get(":
- post = Post.query.get(id)
-Reassigned in:
- File: WebAppWithFlask/controller.py
- > Line 62: post_delete = post.delete(post)
- File: WebAppWithFlask/controller.py
- > Line 66: error = post_delete
-File: WebAppWithFlask/controller.py
- > reaches line 67, trigger word "flash(":
- flash(error)
-
-
-
-yaoelvon/flask-uwsgi-demo
-https://github.com/yaoelvon/flask-uwsgi-demo
-Entry file: flask-uwsgi-demo/DeployingFlask/myflaskapp.py
-Scanned: 2016-10-25 23:02:40.469692
-No vulnerabilities found.
-
-
-Owen-Gillespie/FeatureLabsFlaskDemo
-https://github.com/Owen-Gillespie/FeatureLabsFlaskDemo
-Entry file: FeatureLabsFlaskDemo/main.py
-Scanned: 2016-10-25 23:02:46.873536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-richardsop/REST-API
-https://github.com/richardsop/REST-API
-Entry file: REST-API/app.py
-Scanned: 2016-10-25 23:02:58.559083
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tianxie/my_flasky
-https://github.com/tianxie/my_flasky
-Entry file: my_flasky/app/__init__.py
-Scanned: 2016-10-25 23:03:00.240089
-No vulnerabilities found.
-
-
-sheldonsmickley/flaskemail_app
-https://github.com/sheldonsmickley/flaskemail_app
-Entry file: flaskemail_app/emails.py
-Scanned: 2016-10-25 23:03:01.702086
-Vulnerability 1:
-File: flaskemail_app/emails.py
- > User input at line 57, trigger word "form[":
- url = c.execute('select url from emails where company_name like ?', (request.form['existing_company']))
-Reassigned in:
- File: flaskemail_app/emails.py
- > Line 58: url = url.fetchall()[0][0]
-File: flaskemail_app/emails.py
- > reaches line 57, trigger word "execute(":
- url = c.execute('select url from emails where company_name like ?', (request.form['existing_company']))
-
-Vulnerability 2:
-File: flaskemail_app/emails.py
- > User input at line 57, trigger word "form[":
- url = c.execute('select url from emails where company_name like ?', (request.form['existing_company']))
-Reassigned in:
- File: flaskemail_app/emails.py
- > Line 58: url = url.fetchall()[0][0]
-File: flaskemail_app/emails.py
- > reaches line 59, trigger word "execute(":
- c.execute('INSERT into emails (company_name, email, url) values (?, ?, ?)', (request.form['existing_company'], request.form['email'], url))
-
-
-
-shas15/Betting-Chips
-https://github.com/shas15/Betting-Chips
-Entry file: Betting-Chips/test.py
-Scanned: 2016-10-25 23:03:03.246985
-Vulnerability 1:
-File: Betting-Chips/Models/User.py
- > User input at line 20, trigger word "form[":
- login_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 22, trigger word "filter(":
- found = User.query.filter(User.id == login_id, User.password == login_password).first()
-
-Vulnerability 2:
-File: Betting-Chips/Models/User.py
- > User input at line 21, trigger word "form[":
- login_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 22, trigger word "filter(":
- found = User.query.filter(User.id == login_id, User.password == login_password).first()
-
-Vulnerability 3:
-File: Betting-Chips/Models/User.py
- > User input at line 20, trigger word "form[":
- login_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 27, trigger word "jsonify(":
- print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True))
-
-Vulnerability 4:
-File: Betting-Chips/Models/User.py
- > User input at line 21, trigger word "form[":
- login_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 27, trigger word "jsonify(":
- print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True))
-
-Vulnerability 5:
-File: Betting-Chips/Models/User.py
- > User input at line 20, trigger word "form[":
- login_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 32, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success')
-
-Vulnerability 6:
-File: Betting-Chips/Models/User.py
- > User input at line 21, trigger word "form[":
- login_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail')
-File: Betting-Chips/Models/User.py
- > reaches line 32, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success')
-
-Vulnerability 7:
-File: Betting-Chips/Models/User.py
- > User input at line 45, trigger word "form[":
- signup_name = request.form['name']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 49: user.name = signup_name
-File: Betting-Chips/Models/User.py
- > reaches line 54, trigger word "jsonify(":
- print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True))
-
-Vulnerability 8:
-File: Betting-Chips/Models/User.py
- > User input at line 46, trigger word "form[":
- signup_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 50: user.id = signup_id
-File: Betting-Chips/Models/User.py
- > reaches line 54, trigger word "jsonify(":
- print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True))
-
-Vulnerability 9:
-File: Betting-Chips/Models/User.py
- > User input at line 47, trigger word "form[":
- signup_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 51: user.password = signup_password
-File: Betting-Chips/Models/User.py
- > reaches line 54, trigger word "jsonify(":
- print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True))
-
-Vulnerability 10:
-File: Betting-Chips/Models/User.py
- > User input at line 45, trigger word "form[":
- signup_name = request.form['name']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 49: user.name = signup_name
-File: Betting-Chips/Models/User.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success')
-
-Vulnerability 11:
-File: Betting-Chips/Models/User.py
- > User input at line 46, trigger word "form[":
- signup_id = request.form['id']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 50: user.id = signup_id
-File: Betting-Chips/Models/User.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success')
-
-Vulnerability 12:
-File: Betting-Chips/Models/User.py
- > User input at line 47, trigger word "form[":
- signup_password = request.form['password']
-Reassigned in:
- File: Betting-Chips/Models/User.py
- > Line 51: user.password = signup_password
-File: Betting-Chips/Models/User.py
- > reaches line 60, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success')
-
-
-
-malong5219/SampleBlog
-https://github.com/malong5219/SampleBlog
-Entry file: None
-Scanned: 2016-10-25 23:03:10.675843
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alexwilkerson/microblog
-https://github.com/alexwilkerson/microblog
-Entry file: None
-Scanned: 2016-10-25 23:03:11.192066
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/alexwilkerson/microblog.
-
-jyang22/Flasky_blog
-https://github.com/jyang22/Flasky_blog
-Entry file: None
-Scanned: 2016-10-25 23:03:16.844809
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tusharpawar/Agrostar_Flaskr
-https://github.com/tusharpawar/Agrostar_Flaskr
-Entry file: Agrostar_Flaskr/flaskr/flaskr.py
-Scanned: 2016-10-25 23:03:21.529501
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-eunseo9808/fakeArtist
-https://github.com/eunseo9808/fakeArtist
-Entry file: fakeArtist/test.py
-Scanned: 2016-10-25 23:03:23.000337
-No vulnerabilities found.
-
-
-semonalbertyeah/quickflask
-https://github.com/semonalbertyeah/quickflask
-Entry file: quickflask/app.py
-Scanned: 2016-10-25 23:03:24.439249
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-aceokay/microblog
-https://github.com/aceokay/microblog
-Entry file: None
-Scanned: 2016-10-25 23:03:25.028119
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/aceokay/microblog.
-
-dantin/microblog
-https://github.com/dantin/microblog
-Entry file: None
-Scanned: 2016-10-25 23:03:25.549576
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dantin/microblog.
-
-buntyke/Flask
-https://github.com/buntyke/Flask
-Entry file: None
-Scanned: 2016-10-25 23:03:28.370288
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-suzf/Flask
-https://github.com/suzf/Flask
-Entry file: None
-Scanned: 2016-10-25 23:03:28.926303
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-b-e/flask
-https://github.com/b-e/flask
-Entry file: None
-Scanned: 2016-10-25 23:03:29.443727
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-psuong/FlaskWorkshop
-https://github.com/psuong/FlaskWorkshop
-Entry file: FlaskWorkshop/output-string/app.py
-Scanned: 2016-10-25 23:03:31.215853
-No vulnerabilities found.
-
-
-BLKStone/flask_image_search
-https://github.com/BLKStone/flask_image_search
-Entry file: flask_image_search/app/app.py
-Scanned: 2016-10-25 23:03:36.345721
-No vulnerabilities found.
-
-
-yj0914/flask-
-https://github.com/yj0914/flask-
-Entry file: flask-/num1.py
-Scanned: 2016-10-25 23:03:37.641919
-No vulnerabilities found.
-
-
-Bleezworld/flask_skeleton
-https://github.com/Bleezworld/flask_skeleton
-Entry file: flask_skeleton/serveur/__init__.py
-Scanned: 2016-10-25 23:03:40.040904
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-TwilioDevEd/lead-alerts-flask
-https://github.com/TwilioDevEd/lead-alerts-flask
-Entry file: None
-Scanned: 2016-10-25 23:03:40.545336
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask.
-
-soasme/flask-perm
-https://github.com/soasme/flask-perm
-Entry file: flask-perm/example.py
-Scanned: 2016-10-25 23:03:43.023343
-Vulnerability 1:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 68, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 68, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'))
-
-Vulnerability 2:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 73, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}')
-File: flask-perm/tests/test_blueprint.py
- > reaches line 73, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}')
-
-Vulnerability 3:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 80, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 80, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id'])
-
-Vulnerability 4:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 87, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 87, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-
-Vulnerability 5:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 121, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 114, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.delete_permission',permission_id=permission['id']))
-
-Vulnerability 6:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 121, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 121, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id']))
-
-Vulnerability 7:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 172, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 171: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 173, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.revoke_user_permission',user_permission_id=id))
-
-Vulnerability 8:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 188, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 187: resp = add_user_group_permission(client, user_group['id'], permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 189, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.revoke_user_group_permission',user_group_permission_id=id))
-
-Vulnerability 9:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 199, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}')
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 198: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 199, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}')
-
-Vulnerability 10:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 210, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 209: resp = add_user_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 210, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-
-Vulnerability 11:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 221, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}')
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 220: resp = add_user_group_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 221, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}')
-
-Vulnerability 12:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 232, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 231: resp = add_user_group_permission(client, 1, permission['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 232, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id'])
-
-Vulnerability 13:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 245, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_groups'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 245, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_groups'))
-
-Vulnerability 14:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 280, trigger word ".data":
- id = json.loads(resp.data)['data']['id']
-Reassigned in:
- File: flask-perm/tests/test_blueprint.py
- > Line 279: resp = add_user_group_member(client, 1, user_group['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 281, trigger word "url_for(":
- resp = client.delete(url_for('flask_perm_api.delete_user_from_user_group',user_group_member_id=id))
-
-Vulnerability 15:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 291, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id'])
-File: flask-perm/tests/test_blueprint.py
- > reaches line 291, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id'])
-
-Vulnerability 16:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 304, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_users'))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 304, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_users'))
-
-Vulnerability 17:
-File: flask-perm/tests/test_blueprint.py
- > User input at line 309, trigger word "get(":
- resp = client.get(url_for('flask_perm_api.get_user',user_id=1))
-File: flask-perm/tests/test_blueprint.py
- > reaches line 309, trigger word "url_for(":
- resp = client.get(url_for('flask_perm_api.get_user',user_id=1))
-
-Vulnerability 18:
-File: flask-perm/flask_perm/admin.py
- > User input at line 12, trigger word "get(":
- render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERM_ADMIN_PREFIX') + '/api'current_app.config.get('PERM_ADMIN_PREFIX')current_app.config.get('DEBUG')
-Reassigned in:
- File: flask-perm/flask_perm/admin.py
- > Line 10: ret_MAYBE_FUNCTION_NAME = redirect(url_for('perm-admin.login'))
-File: flask-perm/flask_perm/admin.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/perm-admin/index.html',render_data)
-
-
-
-expersso/flaskr
-https://github.com/expersso/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:03:43.554238
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/expersso/flaskr.
-
-gileez/flasker
-https://github.com/gileez/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-25 23:03:44.964723
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-rishipuri/flasktodo
-https://github.com/rishipuri/flasktodo
-Entry file: flasktodo/flasktodo.py
-Scanned: 2016-10-25 23:03:46.264306
-No vulnerabilities found.
-
-
-Hyvjan/flasktaskr
-https://github.com/Hyvjan/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:03:46.819487
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zachary-russell/Flaskr
-https://github.com/zachary-russell/Flaskr
-Entry file: None
-Scanned: 2016-10-25 23:03:47.340741
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-storress/Flaskserver
-https://github.com/storress/Flaskserver
-Entry file: Flaskserver/main.py
-Scanned: 2016-10-25 23:03:48.639781
-No vulnerabilities found.
-
-
-dadasoz-cuelogic/flaskapp
-https://github.com/dadasoz-cuelogic/flaskapp
-Entry file: None
-Scanned: 2016-10-25 23:03:59.185926
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp.
-
-nickaustinlee/flasktaskr
-https://github.com/nickaustinlee/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:04:01.758036
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sindhus/flaskr
-https://github.com/sindhus/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:04:02.355909
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flaskr.
-
-Bayaz/flasktaskr
-https://github.com/Bayaz/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:04:03.917017
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-xavinso/flasktaskr
-https://github.com/xavinso/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:04:11.477618
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CharlieWinters/flaskapi
-https://github.com/CharlieWinters/flaskapi
-Entry file: flaskapi/aydaapi4.py
-Scanned: 2016-10-25 23:04:17.368201
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/sre_compile.py
-
-kewsie/flasky
-https://github.com/kewsie/flasky
-Entry file: None
-Scanned: 2016-10-25 23:04:18.233695
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-apeete/flaskBlog
-https://github.com/apeete/flaskBlog
-Entry file: flaskBlog/blog.py
-Scanned: 2016-10-25 23:04:25.640459
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/sre_compile.py
-
-land-pack/flaskBlog
-https://github.com/land-pack/flaskBlog
-Entry file: flaskBlog/flaskr.py
-Scanned: 2016-10-25 23:04:27.119495
-No vulnerabilities found.
-
-
-OscarMelin/learning-flask-bootstrap
-https://github.com/OscarMelin/learning-flask-bootstrap
-Entry file: learning-flask-bootstrap/__init__.py
-Scanned: 2016-10-25 23:04:32.686418
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/sre_compile.py
-
-hnb2/flask-customers
-https://github.com/hnb2/flask-customers
-Entry file: flask-customers/customers/__init__.py
-Scanned: 2016-10-25 23:04:34.178433
-Vulnerability 1:
-File: flask-customers/customers/back/view.py
- > User input at line 71, trigger word ".data":
- customer = Customer(email=form.email.data, password=AdminCustomer._generate_password())
-Reassigned in:
- File: flask-customers/customers/back/view.py
- > Line 69: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/back/view.py
- > reaches line 82, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(customer=customer.json)
-
-Vulnerability 2:
-File: flask-customers/customers/back/view.py
- > User input at line 147, trigger word ".data":
- page = form.page.data
-Reassigned in:
- File: flask-customers/customers/back/view.py
- > Line 151: start = page * CustomerService.RESULTS_PER_PAGE
- File: flask-customers/customers/back/view.py
- > Line 152: stop = start + CustomerService.RESULTS_PER_PAGE
- File: flask-customers/customers/back/view.py
- > Line 154: raw_customers = CustomerService.get_customers(start=start, stop=stop)
- File: flask-customers/customers/back/view.py
- > Line 145: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/back/view.py
- > reaches line 159, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(current_page=page, total_pages=int(total_pages), customers=[customer.json for customer in raw_customers])
-
-Vulnerability 3:
-File: flask-customers/customers/front/view.py
- > User input at line 32, trigger word ".data":
- customer = Customer(email=form.email.data, password=form.password.data)
-Reassigned in:
- File: flask-customers/customers/front/view.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors)
-File: flask-customers/customers/front/view.py
- > reaches line 39, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(id=customer.id)
-
-
-
-raindrop4steven/tornadoFlask
-https://github.com/raindrop4steven/tornadoFlask
-Entry file: tornadoFlask/hello.py
-Scanned: 2016-10-25 23:04:35.575394
-No vulnerabilities found.
-
-
-samwuu/flask_demo
-https://github.com/samwuu/flask_demo
-Entry file: flask_demo/app/__init__.py
-Scanned: 2016-10-25 23:04:37.030368
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zengyifa/flask-starter
-https://github.com/zengyifa/flask-starter
-Entry file: None
-Scanned: 2016-10-25 23:04:37.570546
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zengyifa/flask-starter.
-
-mauriciorey/learning_flask
-https://github.com/mauriciorey/learning_flask
-Entry file: learning_flask/routes.py
-Scanned: 2016-10-25 23:04:39.463185
-Vulnerability 1:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 93, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-Vulnerability 2:
-File: learning_flask/routes.py
- > User input at line 85, trigger word ".data":
- address = form.address.data
-Reassigned in:
- File: learning_flask/routes.py
- > Line 89: my_coordinates = p.address_to_latlng(address)
- File: learning_flask/routes.py
- > Line 90: places = p.query(address)
- File: learning_flask/routes.py
- > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: learning_flask/routes.py
- > Line 77: places = []
- File: learning_flask/routes.py
- > Line 78: my_coordinates = (42.335647, -71.07505600000002)
- File: learning_flask/routes.py
- > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form)
-File: learning_flask/routes.py
- > reaches line 96, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places)
-
-
-
-cjmochrie/Flask-Demo
-https://github.com/cjmochrie/Flask-Demo
-Entry file: None
-Scanned: 2016-10-25 23:04:40.867274
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmochrie/Flask-Demo.
-
-cyan-blue/my_flask
-https://github.com/cyan-blue/my_flask
-Entry file: my_flask/doc/schedular.py
-Scanned: 2016-10-25 23:04:42.319689
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zachary-russell/Flask-Microblog
-https://github.com/zachary-russell/Flask-Microblog
-Entry file: Flask-Microblog/microblog/app/__init__.py
-Scanned: 2016-10-25 23:04:43.633954
-No vulnerabilities found.
-
-
-LeonNie52/Learn_Flask
-https://github.com/LeonNie52/Learn_Flask
-Entry file: Learn_Flask/hello.py
-Scanned: 2016-10-25 23:04:45.507986
-Vulnerability 1:
-File: Learn_Flask/app/main/views.py
- > User input at line 42, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 50: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 52: posts = pagination.items
- File: Learn_Flask/app/main/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog'))
-File: Learn_Flask/app/main/views.py
- > reaches line 53, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Learn_Flask/app/main/views.py
- > User input at line 45, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 43: show_followed = False
- File: Learn_Flask/app/main/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog'))
-File: Learn_Flask/app/main/views.py
- > reaches line 53, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Learn_Flask/app/main/views.py
- > User input at line 68, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 70: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Learn_Flask/app/main/views.py
- > Line 72: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 75: comments = pagination.items
- File: Learn_Flask/app/main/views.py
- > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Learn_Flask/app/main/views.py
- > reaches line 76, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: Learn_Flask/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Learn_Flask/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Learn_Flask/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: Learn_Flask/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Learn_Flask/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Learn_Flask/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Learn_Flask/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Learn_Flask/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Learn_Flask/app/main/views.py
- > Line 246: comments = pagination.items
-File: Learn_Flask/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-penguin-penpen/learnFlask
-https://github.com/penguin-penpen/learnFlask
-Entry file: None
-Scanned: 2016-10-25 23:04:46.042869
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/penguin-penpen/learnFlask.
-
-pfig/flask-elasticsearch
-https://github.com/pfig/flask-elasticsearch
-Entry file: flask-elasticsearch/flask_elasticsearch.py
-Scanned: 2016-10-25 23:04:47.473030
-No vulnerabilities found.
-
-
-olive42/moz-flask
-https://github.com/olive42/moz-flask
-Entry file: moz-flask/hello.py
-Scanned: 2016-10-25 23:04:48.813971
-No vulnerabilities found.
-
-
-nimeshkverma/Ideal_Flask
-https://github.com/nimeshkverma/Ideal_Flask
-Entry file: Ideal_Flask/LargeApp/app/__init__.py
-Scanned: 2016-10-25 23:04:52.506860
-Vulnerability 1:
-File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py
- > User input at line 31, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py
- > Line 35: session['user_id'] = user.id
-File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py
- > reaches line 37, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-tholsapp/flask_framework
-https://github.com/tholsapp/flask_framework
-Entry file: flask_framework/app/__init__.py
-Scanned: 2016-10-25 23:04:54.027785
-No vulnerabilities found.
-
-
-nivanko/flask-catalog
-https://github.com/nivanko/flask-catalog
-Entry file: flask-catalog/application.py
-Scanned: 2016-10-25 23:05:02.390874
-Vulnerability 1:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 162, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username'))
-
-Vulnerability 2:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-Vulnerability 3:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-
-
-jaramago/flask-basic
-https://github.com/jaramago/flask-basic
-Entry file: flask-basic/app/__init__.py
-Scanned: 2016-10-25 23:05:04.125866
-No vulnerabilities found.
-
-
-valdemarpereira/flask_tutorial
-https://github.com/valdemarpereira/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:05:04.678998
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/valdemarpereira/flask_tutorial.
-
-jit-1/flask-microblog
-https://github.com/jit-1/flask-microblog
-Entry file: None
-Scanned: 2016-10-25 23:05:06.178663
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jit-1/flask-microblog.
-
-nof4444/Flask-mongodb
-https://github.com/nof4444/Flask-mongodb
-Entry file: Flask-mongodb/blog.py
-Scanned: 2016-10-25 23:05:12.457496
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-mongodb/env/lib/python2.7/sre_compile.py
-
-VictorDMor/flask-app
-https://github.com/VictorDMor/flask-app
-Entry file: flask-app/app/__init__.py
-Scanned: 2016-10-25 23:05:24.076947
-No vulnerabilities found.
-
-
-setiaji/learn_flask
-https://github.com/setiaji/learn_flask
-Entry file: learn_flask/__init__.py
-Scanned: 2016-10-25 23:05:25.383179
-No vulnerabilities found.
-
-
-sunway1988/MyFlask
-https://github.com/sunway1988/MyFlask
-Entry file: MyFlask/app/__init__.py
-Scanned: 2016-10-25 23:05:27.244613
-No vulnerabilities found.
-
-
-ottoman91/flask_tutorial
-https://github.com/ottoman91/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:05:27.802174
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ottoman91/flask_tutorial.
-
-anbasile/flask_sample
-https://github.com/anbasile/flask_sample
-Entry file: flask_sample/app.py
-Scanned: 2016-10-25 23:05:36.619681
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_sample/flask/lib/python2.7/sre_compile.py
-
-HiagoMayk/projetoFlask
-https://github.com/HiagoMayk/projetoFlask
-Entry file: projetoFlask/routes.py
-Scanned: 2016-10-25 23:05:39.226051
-No vulnerabilities found.
-
-
-nimeshkverma/Versioned_Flask
-https://github.com/nimeshkverma/Versioned_Flask
-Entry file: Versioned_Flask/app/__init__.py
-Scanned: 2016-10-25 23:05:41.249014
-No vulnerabilities found.
-
-
-catcoderphp/flask-test
-https://github.com/catcoderphp/flask-test
-Entry file: flask-test/app.py
-Scanned: 2016-10-25 23:05:44.390026
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/venv/lib/python2.7/sre_compile.py
-
-huyquyet/flask-demo
-https://github.com/huyquyet/flask-demo
-Entry file: flask-demo/flask_demo/__init__.py
-Scanned: 2016-10-25 23:05:46.619401
-No vulnerabilities found.
-
-
-seonhyeshin/flask-mysql
-https://github.com/seonhyeshin/flask-mysql
-Entry file: None
-Scanned: 2016-10-25 23:05:57.720936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-euler1337/flask_tutorial
-https://github.com/euler1337/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:05:58.234416
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/euler1337/flask_tutorial.
-
-PhilipGough/flask_api
-https://github.com/PhilipGough/flask_api
-Entry file: flask_api/app/__init__.py
-Scanned: 2016-10-25 23:06:02.041726
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lauradebella/treinamentoFlask
-https://github.com/lauradebella/treinamentoFlask
-Entry file: treinamentoFlask/tutorialPythonClub/app.py
-Scanned: 2016-10-25 23:06:19.121166
-No vulnerabilities found.
-
-
-seanbehan/flask_websockets
-https://github.com/seanbehan/flask_websockets
-Entry file: flask_websockets/app.py
-Scanned: 2016-10-25 23:06:21.041760
-No vulnerabilities found.
-
-
-mburke05/flask_tutorial
-https://github.com/mburke05/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:06:21.570398
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mburke05/flask_tutorial.
-
-dhruvagarwal/flask_restdemo
-https://github.com/dhruvagarwal/flask_restdemo
-Entry file: flask_restdemo/example/main.py
-Scanned: 2016-10-25 23:06:22.956976
-No vulnerabilities found.
-
-
-elphinkuo/ji_python_flask
-https://github.com/elphinkuo/ji_python_flask
-Entry file: ji_python_flask/app/musicModify.py
-Scanned: 2016-10-25 23:06:24.886857
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-rjuppa/microblog
-https://github.com/rjuppa/microblog
-Entry file: None
-Scanned: 2016-10-25 23:06:25.416125
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rjuppa/microblog.
-
-depaoli/FlaskAppSample
-https://github.com/depaoli/FlaskAppSample
-Entry file: FlaskAppSample/flask_app_sample/__init__.py
-Scanned: 2016-10-25 23:06:26.803815
-No vulnerabilities found.
-
-
-webon100/ross_flask01
-https://github.com/webon100/ross_flask01
-Entry file: None
-Scanned: 2016-10-25 23:06:30.740910
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AlexProv/flaskRestApiSkeleton
-https://github.com/AlexProv/flaskRestApiSkeleton
-Entry file: flaskRestApiSkeleton/flaskServer.py
-Scanned: 2016-10-25 23:06:32.032067
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tommyblue/flask-react-blog
-https://github.com/tommyblue/flask-react-blog
-Entry file: flask-react-blog/initializer.py
-Scanned: 2016-10-25 23:06:33.750978
-No vulnerabilities found.
-
-
-MikeHannon/python_flask_teams
-https://github.com/MikeHannon/python_flask_teams
-Entry file: python_flask_teams/server.py
-Scanned: 2016-10-25 23:06:35.052364
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Cosaquee/flask-weather-app
-https://github.com/Cosaquee/flask-weather-app
-Entry file: flask-weather-app/main.py
-Scanned: 2016-10-25 23:06:38.808747
-No vulnerabilities found.
-
-
-xavinso/flask_hello_world
-https://github.com/xavinso/flask_hello_world
-Entry file: flask_hello_world/app.py
-Scanned: 2016-10-25 23:06:41.434666
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Ryanglambert/playing_with_flask
-https://github.com/Ryanglambert/playing_with_flask
-Entry file: playing_with_flask/hello.py
-Scanned: 2016-10-25 23:06:43.054984
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-aetherwu/Flask-Docker-Template
-https://github.com/aetherwu/Flask-Docker-Template
-Entry file: Flask-Docker-Template/flask/web/__init__.py
-Scanned: 2016-10-25 23:06:53.195663
-Vulnerability 1:
-File: Flask-Docker-Template/flask/web/views.py
- > User input at line 234, trigger word ".data":
- kw = form.name.data
-File: Flask-Docker-Template/flask/web/views.py
- > reaches line 236, trigger word "filter(":
- user = User.query.filter(User.nickname == kw).first()
-
-Vulnerability 2:
-File: Flask-Docker-Template/flask/web/views.py
- > User input at line 562, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Docker-Template/flask/web/views.py
- > Line 550: user = User.query.filter_by(email=user_email).first()
- File: Flask-Docker-Template/flask/web/views.py
- > Line 552: current_user.id = user.id
- File: Flask-Docker-Template/flask/web/views.py
- > Line 577: current_user.id = user.id
-File: Flask-Docker-Template/flask/web/views.py
- > reaches line 554, trigger word "set_cookie(":
- response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60)
-
-Vulnerability 3:
-File: Flask-Docker-Template/flask/web/views.py
- > User input at line 562, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Docker-Template/flask/web/views.py
- > Line 550: user = User.query.filter_by(email=user_email).first()
- File: Flask-Docker-Template/flask/web/views.py
- > Line 552: current_user.id = user.id
- File: Flask-Docker-Template/flask/web/views.py
- > Line 577: current_user.id = user.id
-File: Flask-Docker-Template/flask/web/views.py
- > reaches line 587, trigger word "set_cookie(":
- response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60)
-
-
-
-tomquirk/js-flavoured-flask
-https://github.com/tomquirk/js-flavoured-flask
-Entry file: js-flavoured-flask/app/__init__.py
-Scanned: 2016-10-25 23:06:54.860396
-No vulnerabilities found.
-
-
-gtlambert/first_flask_app
-https://github.com/gtlambert/first_flask_app
-Entry file: first_flask_app/app.py
-Scanned: 2016-10-25 23:06:59.710937
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-AngelMunoz/Flask-Blueprints-Template
-https://github.com/AngelMunoz/Flask-Blueprints-Template
-Entry file: Flask-Blueprints-Template/app/__init__.py
-Scanned: 2016-10-25 23:07:01.163686
-Vulnerability 1:
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > User input at line 15, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > Line 17: session['user_id'] = user.id
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > reaches line 18, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-ArTrics/Flask_Angular_Project
-https://github.com/ArTrics/Flask_Angular_Project
-Entry file: Flask_Angular_Project/index.py
-Scanned: 2016-10-25 23:07:05.061438
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/sre_compile.py
-
-orjanv/ESVtoLeetFlaskApp
-https://github.com/orjanv/ESVtoLeetFlaskApp
-Entry file: ESVtoLeetFlaskApp/app.py
-Scanned: 2016-10-25 23:07:06.568172
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ptmccarthy/flask-microblog-tutorial
-https://github.com/ptmccarthy/flask-microblog-tutorial
-Entry file: flask-microblog-tutorial/app/__init__.py
-Scanned: 2016-10-25 23:07:08.020121
-No vulnerabilities found.
-
-
-bronka/flask-hello-world
-https://github.com/bronka/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:07:08.556729
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Pensu/flask-ppc64le
-https://github.com/Pensu/flask-ppc64le
-Entry file: flask-ppc64le/app.py
-Scanned: 2016-10-25 23:07:09.905782
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mdublin/Flask-CRUD-template
-https://github.com/mdublin/Flask-CRUD-template
-Entry file: Flask-CRUD-template/blog/__init__.py
-Scanned: 2016-10-25 23:07:14.888270
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lwjones/flask-hello-world
-https://github.com/lwjones/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:07:15.483036
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-renmmotp/Ren_Learns_Flask
-https://github.com/renmmotp/Ren_Learns_Flask
-Entry file: Ren_Learns_Flask/flaskr/flaskr.py
-Scanned: 2016-10-25 23:07:16.909626
-No vulnerabilities found.
-
-
-leonidas/flask-spa-routing-example
-https://github.com/leonidas/flask-spa-routing-example
-Entry file: None
-Scanned: 2016-10-25 23:07:18.212771
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/leonidas/flask-spa-routing-example.
-
-zxqwerxz/test_flask_deploy
-https://github.com/zxqwerxz/test_flask_deploy
-Entry file: test_flask_deploy/hello.py
-Scanned: 2016-10-25 23:07:19.521810
-No vulnerabilities found.
-
-
-mbreisch/flask-hello-world
-https://github.com/mbreisch/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:07:20.064672
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sidthakur/docker-single-nginx-flask
-https://github.com/sidthakur/docker-single-nginx-flask
-Entry file: docker-single-nginx-flask/app/app.py
-Scanned: 2016-10-25 23:07:21.366716
-No vulnerabilities found.
-
-
-posenberg/Flask-Kickstarter-Clone
-https://github.com/posenberg/Flask-Kickstarter-Clone
-Entry file: Flask-Kickstarter-Clone/punchstarter/__init__.py
-Scanned: 2016-10-25 23:07:23.409787
-Vulnerability 1:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 42, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 46, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 53: image_filename = uploaded_image['public_id']
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 56, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 42, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 46, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 53: image_filename = uploaded_image['public_id']
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 6:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 56, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 73, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 7:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 81, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 8:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 89, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 94, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 9:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 89, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 10:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 89, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 11:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 115, trigger word "get(":
- query = request.args.get('q') or ''
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 124: query_text = query != ''query'all projects'
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 116, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 12:
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > User input at line 115, trigger word "get(":
- query = request.args.get('q') or ''
-Reassigned in:
- File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > Line 124: query_text = query != ''query'all projects'
-File: Flask-Kickstarter-Clone/punchstarter/__init__.py
- > reaches line 126, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query_text, projects=projects, project_count=project_count)
-
-
-
-pythonvietnam/meetup01-flask
-https://github.com/pythonvietnam/meetup01-flask
-Entry file: meetup01-flask/hello_world.py
-Scanned: 2016-10-25 23:07:24.897470
-Vulnerability 1:
-File: meetup01-flask/template.py
- > User input at line 9, trigger word "get(":
- name = request.args.get('name', 'guy')
-File: meetup01-flask/template.py
- > reaches line 10, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',name=name)
-
-
-
-palden/flask-hello-world
-https://github.com/palden/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:07:25.435136
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shane-kercheval/flask-postgresql-template
-https://github.com/shane-kercheval/flask-postgresql-template
-Entry file: flask-postgresql-template/app_factory.py
-Scanned: 2016-10-25 23:07:27.622357
-Vulnerability 1:
-File: flask-postgresql-template/app.py
- > User input at line 49, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask-postgresql-template/app.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-postgresql-template/app.py
- > reaches line 53, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default'))
-
-Vulnerability 2:
-File: flask-postgresql-template/app.py
- > User input at line 49, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask-postgresql-template/app.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask-postgresql-template/app.py
- > reaches line 53, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default'))
-
-
-
-jhh/puka-server-flask
-https://github.com/jhh/puka-server-flask
-Entry file: None
-Scanned: 2016-10-25 23:07:29.038235
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jhh/puka-server-flask.
-
-zhujian0805/my-website-by-flask
-https://github.com/zhujian0805/my-website-by-flask
-Entry file: my-website-by-flask/flaskr/flaskr.py
-Scanned: 2016-10-25 23:07:30.684906
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-charanjp/flask
-https://github.com/charanjp/flask
-Entry file: None
-Scanned: 2016-10-25 23:07:32.705584
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yasskh/flask
-https://github.com/yasskh/flask
-Entry file: None
-Scanned: 2016-10-25 23:07:33.236794
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-poxstone/flask
-https://github.com/poxstone/flask
-Entry file: None
-Scanned: 2016-10-25 23:07:34.742436
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-FlaskTutorial/Flask
-https://github.com/FlaskTutorial/Flask
-Entry file: None
-Scanned: 2016-10-25 23:07:36.283830
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-OnlySHI/flask
-https://github.com/OnlySHI/flask
-Entry file: None
-Scanned: 2016-10-25 23:07:39.814014
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jvuori/flask-uwsgi-nginx-haproxy-docker
-https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker
-Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py
-Scanned: 2016-10-25 23:07:43.131840
-No vulnerabilities found.
-
-
-akupara/flask_inspector
-https://github.com/akupara/flask_inspector
-Entry file: flask_inspector/example/app.py
-Scanned: 2016-10-25 23:07:44.874124
-No vulnerabilities found.
-
-
-soasme/flask-personal-access-token
-https://github.com/soasme/flask-personal-access-token
-Entry file: flask-personal-access-token/example.py
-Scanned: 2016-10-25 23:07:56.027994
-Vulnerability 1:
-File: flask-personal-access-token/flask_personal_access_token/admin.py
- > User input at line 18, trigger word "get(":
- render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_API_PREFIX')current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_PREFIX')current_app.config.get('DEBUG')
-File: flask-personal-access-token/flask_personal_access_token/admin.py
- > reaches line 23, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('/personal_access_token/index.html',render_data)
-
-
-
-gileez/flasker
-https://github.com/gileez/flasker
-Entry file: flasker/flasker/__init__.py
-Scanned: 2016-10-25 23:07:57.411753
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-shinycoo/flaskmvcsample
-https://github.com/shinycoo/flaskmvcsample
-Entry file: flaskmvcsample/app.py
-Scanned: 2016-10-25 23:08:01.953027
-No vulnerabilities found.
-
-
-alexwilkerson/flasktaskr
-https://github.com/alexwilkerson/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:08:02.538788
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sindhus/flaskr
-https://github.com/sindhus/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:08:06.053736
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flaskr.
-
-apeete/flasktaskr
-https://github.com/apeete/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:08:07.599551
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-slippers/flasksec
-https://github.com/slippers/flasksec
-Entry file: flasksec/main/__init__.py
-Scanned: 2016-10-25 23:08:09.910689
-No vulnerabilities found.
-
-
-rui7157/Flask-NvRay-Blog
-https://github.com/rui7157/Flask-NvRay-Blog
-Entry file: Flask-NvRay-Blog/app/__init__.py
-Scanned: 2016-10-25 23:08:14.345570
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Ineeza/FlaskAppBuilder
-https://github.com/Ineeza/FlaskAppBuilder
-Entry file: FlaskAppBuilder/src/classes/__init__.py
-Scanned: 2016-10-25 23:08:15.807833
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-junniepat/FlaskApp
-https://github.com/junniepat/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-25 23:08:17.076305
-No vulnerabilities found.
-
-
-YoungGer/FlaskApps
-https://github.com/YoungGer/FlaskApps
-Entry file: FlaskApps/helloWorld/hello.py
-Scanned: 2016-10-25 23:08:18.664462
-No vulnerabilities found.
-
-
-yasskh/FlaskProject
-https://github.com/yasskh/FlaskProject
-Entry file: FlaskProject/views.py
-Scanned: 2016-10-25 23:08:24.444066
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-DamithaPerera/FlaskApp
-https://github.com/DamithaPerera/FlaskApp
-Entry file: FlaskApp/app.py
-Scanned: 2016-10-25 23:08:25.771465
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-dreammis/Flask02
-https://github.com/dreammis/Flask02
-Entry file: Flask02/app/__init__.py
-Scanned: 2016-10-25 23:08:27.051136
-No vulnerabilities found.
-
-
-land-pack/flaskBlog
-https://github.com/land-pack/flaskBlog
-Entry file: flaskBlog/flaskr.py
-Scanned: 2016-10-25 23:08:28.342252
-No vulnerabilities found.
-
-
-deyoppe/FlaskFire
-https://github.com/deyoppe/FlaskFire
-Entry file: FlaskFire/core/system/app.py
-Scanned: 2016-10-25 23:08:29.829343
-No vulnerabilities found.
-
-
-Njsao/FlaskServer
-https://github.com/Njsao/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-25 23:08:31.255944
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-OscarMelin/learning-flask-bootstrap
-https://github.com/OscarMelin/learning-flask-bootstrap
-Entry file: learning-flask-bootstrap/__init__.py
-Scanned: 2016-10-25 23:08:35.718542
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/sre_compile.py
-
-allianRoman/flask-intro
-https://github.com/allianRoman/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:08:37.067365
-No vulnerabilities found.
-
-
-hunt3ri/temp-flask
-https://github.com/hunt3ri/temp-flask
-Entry file: temp-flask/app/__init__.py
-Scanned: 2016-10-25 23:08:38.492471
-No vulnerabilities found.
-
-
-noamoss/flask-blog
-https://github.com/noamoss/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:08:39.018661
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Jiezhi/HelloFlask
-https://github.com/Jiezhi/HelloFlask
-Entry file: HelloFlask/my_app/__init__.py
-Scanned: 2016-10-25 23:08:40.420018
-Vulnerability 1:
-File: HelloFlask/my_app/product/views.py
- > User input at line 16, trigger word "get(":
- product = PRODUCTS.get(key)
-File: HelloFlask/my_app/product/views.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('product.html',product=product)
-
-
-
-szhjia/flask-blog
-https://github.com/szhjia/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:08:40.964187
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-amybethx/flask-intro
-https://github.com/amybethx/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:08:42.283667
-No vulnerabilities found.
-
-
-terriwong/flask-intro
-https://github.com/terriwong/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:08:43.593363
-No vulnerabilities found.
-
-
-arkenidar/flask-example
-https://github.com/arkenidar/flask-example
-Entry file: flask-example/server.py
-Scanned: 2016-10-25 23:08:44.961630
-Vulnerability 1:
-File: flask-example/server.py
- > User input at line 8, trigger word "get(":
- query = request.args.get('query', '')
-Reassigned in:
- File: flask-example/server.py
- > Line 9: title = query == '''Search page''Search result for ' + query
- File: flask-example/server.py
- > Line 17: items = query == ''items[item for item in items]
- File: flask-example/server.py
- > Line 10: items = ['url''title''http://abc.com/''abc', 'url''title''http://xyz.com/''xyz', 'url''title''http://abcxyz.com/''abcxyz', 'url''title''http://123.com/''123', 'url''title''http://qwerty.com/''qwerty']
-File: flask-example/server.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('form.html',title=title, query=query, items=items)
-
-
-
-ztomazin/flask_exp
-https://github.com/ztomazin/flask_exp
-Entry file: flask_exp/app/__init__.py
-Scanned: 2016-10-25 23:08:51.783682
-No vulnerabilities found.
-
-
-ltaziri/Flask-Intro
-https://github.com/ltaziri/Flask-Intro
-Entry file: Flask-Intro/nice.py
-Scanned: 2016-10-25 23:08:53.249892
-No vulnerabilities found.
-
-
-alitsiya/flask-intro
-https://github.com/alitsiya/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:08:54.597074
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-taisa007/timeliner-flask
-https://github.com/taisa007/timeliner-flask
-Entry file: timeliner-flask/timeliner/timeliner/__init__.py
-Scanned: 2016-10-25 23:08:56.019066
-No vulnerabilities found.
-
-
-sandiego206/flask_microblog
-https://github.com/sandiego206/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-25 23:08:57.690793
-No vulnerabilities found.
-
-
-Odava/flask-jwt
-https://github.com/Odava/flask-jwt
-Entry file: flask-jwt/tests/conftest.py
-Scanned: 2016-10-25 23:08:59.344943
-No vulnerabilities found.
-
-
-nivanko/flask-catalog
-https://github.com/nivanko/flask-catalog
-Entry file: flask-catalog/application.py
-Scanned: 2016-10-25 23:09:05.000957
-Vulnerability 1:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 162, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username'))
-
-Vulnerability 2:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-Vulnerability 3:
-File: flask-catalog/application.py
- > User input at line 184, trigger word "form[":
- category = db_session.query(Category).filter_by(id=request.form['category_id']).one()
-Reassigned in:
- File: flask-catalog/application.py
- > Line 160: category = db_session.query(Category).filter_by(name=category_name).one()
- File: flask-catalog/application.py
- > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
- File: flask-catalog/application.py
- > Line 151: ret_MAYBE_FUNCTION_NAME = '
- ' % url_for('list_categories')
-File: flask-catalog/application.py
- > reaches line 186, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name))
-
-
-
-ajoshdee/flask-test
-https://github.com/ajoshdee/flask-test
-Entry file: flask-test/app.py
-Scanned: 2016-10-25 23:09:21.100386
-No vulnerabilities found.
-
-
-palden/flask-blog
-https://github.com/palden/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:09:21.629083
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-humaneu/flask_app
-https://github.com/humaneu/flask_app
-Entry file: None
-Scanned: 2016-10-25 23:09:29.402979
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cclittle13/flask-intro
-https://github.com/cclittle13/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:30.701528
-No vulnerabilities found.
-
-
-emlam/flask-intro
-https://github.com/emlam/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:31.980637
-No vulnerabilities found.
-
-
-spyapali/Flask-intro
-https://github.com/spyapali/Flask-intro
-Entry file: Flask-intro/nice.py
-Scanned: 2016-10-25 23:09:33.261153
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-celiawaggoner/flask-intro
-https://github.com/celiawaggoner/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:34.552919
-No vulnerabilities found.
-
-
-cachar/flask-intro
-https://github.com/cachar/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:35.823803
-No vulnerabilities found.
-
-
-KTAtkinson/flask-intro
-https://github.com/KTAtkinson/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:37.109719
-No vulnerabilities found.
-
-
-pasysxa/flask-mall
-https://github.com/pasysxa/flask-mall
-Entry file: flask-mall/myapp/__init__.py
-Scanned: 2016-10-25 23:09:38.388285
-No vulnerabilities found.
-
-
-fendouai/venv_flask
-https://github.com/fendouai/venv_flask
-Entry file: venv_flask/get.py
-Scanned: 2016-10-25 23:09:41.851273
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: venv_flask/venv/lib/python2.7/sre_compile.py
-
-leiyue/learning_flask
-https://github.com/leiyue/learning_flask
-Entry file: learning_flask/miniblog/miniblog.py
-Scanned: 2016-10-25 23:09:43.191097
-No vulnerabilities found.
-
-
-florenceloi/flask-intro
-https://github.com/florenceloi/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:44.482518
-No vulnerabilities found.
-
-
-DoriRunyon/flask-intro
-https://github.com/DoriRunyon/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:45.776644
-No vulnerabilities found.
-
-
-qistchan/WebhookFlask
-https://github.com/qistchan/WebhookFlask
-Entry file: WebhookFlask/WebHook_Listener.py
-Scanned: 2016-10-25 23:09:47.054154
-No vulnerabilities found.
-
-
-GeetikaBatra/Flask_intro
-https://github.com/GeetikaBatra/Flask_intro
-Entry file: None
-Scanned: 2016-10-25 23:09:52.964524
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kooder18/flask_Ecommerce
-https://github.com/kooder18/flask_Ecommerce
-Entry file: flask_Ecommerce/project.py
-Scanned: 2016-10-25 23:09:54.430191
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-alenakruchkova/flask-intro
-https://github.com/alenakruchkova/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:55.696198
-No vulnerabilities found.
-
-
-bekkam/flask-intro
-https://github.com/bekkam/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:56.970405
-No vulnerabilities found.
-
-
-anniehe/flask-intro
-https://github.com/anniehe/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:58.245114
-No vulnerabilities found.
-
-
-Vianey81/flask-intro
-https://github.com/Vianey81/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:09:59.522749
-No vulnerabilities found.
-
-
-mcbishop/flask-intro
-https://github.com/mcbishop/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:10:00.816932
-No vulnerabilities found.
-
-
-Bandurin/Test-flask
-https://github.com/Bandurin/Test-flask
-Entry file: Test-flask/db_app.py
-Scanned: 2016-10-25 23:10:03.936507
-No vulnerabilities found.
-
-
-0phelia/flask-app
-https://github.com/0phelia/flask-app
-Entry file: flask-app/flask_webserver.py
-Scanned: 2016-10-25 23:10:05.299727
-No vulnerabilities found.
-
-
-lauradebella/treinamentoFlask
-https://github.com/lauradebella/treinamentoFlask
-Entry file: treinamentoFlask/tutorialPythonClub/app.py
-Scanned: 2016-10-25 23:10:12.913813
-No vulnerabilities found.
-
-
-seanbehan/flask_websockets
-https://github.com/seanbehan/flask_websockets
-Entry file: flask_websockets/app.py
-Scanned: 2016-10-25 23:10:14.254870
-No vulnerabilities found.
-
-
-ssam123/flask-tutorial
-https://github.com/ssam123/flask-tutorial
-Entry file: flask-tutorial/hello.py
-Scanned: 2016-10-25 23:10:15.557254
-No vulnerabilities found.
-
-
-ziyoung/learningFlask
-https://github.com/ziyoung/learningFlask
-Entry file: learningFlask/hello.py
-Scanned: 2016-10-25 23:10:21.053381
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/sre_compile.py
-
-karayount/flask-intro
-https://github.com/karayount/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:10:23.386069
-No vulnerabilities found.
-
-
-go-bears/flask-intro
-https://github.com/go-bears/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:10:24.689743
-No vulnerabilities found.
-
-
-mlpeters12/flask-intro
-https://github.com/mlpeters12/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:10:31.123604
-No vulnerabilities found.
-
-
-arbonap/flask-intro
-https://github.com/arbonap/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:10:32.412428
-No vulnerabilities found.
-
-
-nimeshkverma/SolrFlask
-https://github.com/nimeshkverma/SolrFlask
-Entry file: SolrFlask/app/app_config.py
-Scanned: 2016-10-25 23:10:33.818511
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-gaozhidf/flask_websocket
-https://github.com/gaozhidf/flask_websocket
-Entry file: flask_websocket/websocket_py3_2/app.py
-Scanned: 2016-10-25 23:10:42.863977
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-hilyas/flask-blog
-https://github.com/hilyas/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:10:43.542768
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dimy407/NBC_Flask
-https://github.com/dimy407/NBC_Flask
-Entry file: NBC_Flask/flask_app.py
-Scanned: 2016-10-25 23:10:49.552512
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ltaziri/Flask-Shopping
-https://github.com/ltaziri/Flask-Shopping
-Entry file: Flask-Shopping/shoppingsite.py
-Scanned: 2016-10-25 23:10:51.316485
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jefersondaniel/notebook-api
-https://github.com/jefersondaniel/notebook-api
-Entry file: notebook-api/app/__init__.py
-Scanned: 2016-10-25 23:10:52.785124
-No vulnerabilities found.
-
-
-ddrsmile/flask-hello-world
-https://github.com/ddrsmile/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:10:53.319597
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-webon100/ross_flask01
-https://github.com/webon100/ross_flask01
-Entry file: None
-Scanned: 2016-10-25 23:10:53.842900
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-saviour123/flaskStudentData
-https://github.com/saviour123/flaskStudentData
-Entry file: flaskStudentData/app.py
-Scanned: 2016-10-25 23:10:55.136276
-Vulnerability 1:
-File: flaskStudentData/app.py
- > User input at line 29, trigger word "form[":
- name = request.form['nm']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-Vulnerability 2:
-File: flaskStudentData/app.py
- > User input at line 30, trigger word "form[":
- addr = request.form['add']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-Vulnerability 3:
-File: flaskStudentData/app.py
- > User input at line 31, trigger word "form[":
- city = request.form['city']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-Vulnerability 4:
-File: flaskStudentData/app.py
- > User input at line 32, trigger word "form[":
- pin = request.form['pin']
-File: flaskStudentData/app.py
- > reaches line 35, trigger word "execute(":
- cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin))
-
-
-
-QLGu/flask-zhihu-demo
-https://github.com/QLGu/flask-zhihu-demo
-Entry file: flask-zhihu-demo/www/__init__.py
-Scanned: 2016-10-25 23:10:57.164987
-Vulnerability 1:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 35, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 33: show_followed = False
- File: flask-zhihu-demo/www/main/views.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.signin'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',show_followed=show_followed, quoras=quoras, users=users)
-
-Vulnerability 2:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 312, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 313: pagination = user.followed.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 314: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 311: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 316, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注的人', endpoint='main.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 3:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 327, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 328: pagination = user.followers.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 329: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 326: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 331, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='的关注者', endpoint='main.followers', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 430, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 431: pagination = user.tags.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 432: following_tags = ['tag'item.tag_set for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 429: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 433, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('following_topics.html',user=user, title='关注的话题', endpoint='main.following_tag', pagination=pagination, following_tags=following_tags)
-
-Vulnerability 5:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 444, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 445: pagination = topic.users.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 446: tag_followers = ['user'item.user_set for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 443: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 447, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('topic_followers.html',topic=topic, title='人关注了该话题', endpoint='main.tag_followers', pagination=pagination, tag_followers=tag_followers)
-
-Vulnerability 6:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 500, trigger word ".data":
- question = Question(title=form.title.data, content=form.content.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 522, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id))
-
-Vulnerability 7:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 500, trigger word ".data":
- question = Question(title=form.title.data, content=form.content.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 522, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id))
-
-Vulnerability 8:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 563, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 564: pagination = user.user_questions.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 565: questions = pagination.items
- File: flask-zhihu-demo/www/main/views.py
- > Line 569: questions[j] = questions[j + 1]
- File: flask-zhihu-demo/www/main/views.py
- > Line 569: questions[j + 1] = questions[j]
- File: flask-zhihu-demo/www/main/views.py
- > Line 562: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 570, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('following_questions.html',user=user, endpoint='main.people_questions', pagination=pagination, questions=questions)
-
-Vulnerability 9:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 617, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 618: pagination = question.users.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 619: question_followers = ['user'item.q_user for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 616: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 620, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('question_followers.html',question=question, endpoint='main.question_followers', pagination=pagination, question_followers=question_followers)
-
-Vulnerability 10:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 705, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 706: pagination = user.user_answers.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 707: answers = pagination.items
- File: flask-zhihu-demo/www/main/views.py
- > Line 711: answers[j] = answers[j + 1]
- File: flask-zhihu-demo/www/main/views.py
- > Line 711: answers[j + 1] = answers[j]
- File: flask-zhihu-demo/www/main/views.py
- > Line 704: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 712, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('following_answers.html',user=user, endpoint='main.people_answers', pagination=pagination, answers=answers)
-
-Vulnerability 11:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 791, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 792: pagination = answer.users.paginate(page,per_page=100, error_out=False)
- File: flask-zhihu-demo/www/main/views.py
- > Line 793: answer_followers = ['user'item.a_user for item in pagination.items]
- File: flask-zhihu-demo/www/main/views.py
- > Line 790: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index'))
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 794, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('answer_followers.html',answer=answer, endpoint='main.answer_followers', pagination=pagination, answer_followers=answer_followers)
-
-Vulnerability 12:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 855, trigger word ".data":
- collection = Collection(title=form.title.data, desc=form.desc.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 864, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id))
-
-Vulnerability 13:
-File: flask-zhihu-demo/www/main/views.py
- > User input at line 855, trigger word ".data":
- collection = Collection(title=form.title.data, desc=form.desc.data)
-Reassigned in:
- File: flask-zhihu-demo/www/main/views.py
- > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form)
-File: flask-zhihu-demo/www/main/views.py
- > reaches line 864, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id))
-
-
-
-AndyMcLEOD/PythonFlaskApp
-https://github.com/AndyMcLEOD/PythonFlaskApp
-Entry file: PythonFlaskApp/app.py
-Scanned: 2016-10-25 23:11:01.011310
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mlsh2387/Ex_20160119_Flask-Intro
-https://github.com/mlsh2387/Ex_20160119_Flask-Intro
-Entry file: Ex_20160119_Flask-Intro/nice.py
-Scanned: 2016-10-25 23:11:02.559146
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jkravanja/paypal_flask_payment
-https://github.com/jkravanja/paypal_flask_payment
-Entry file: paypal_flask_payment/payment.py
-Scanned: 2016-10-25 23:11:03.880003
-Vulnerability 1:
-File: paypal_flask_payment/payment.py
- > User input at line 36, trigger word "get(":
- paymentId = request.args.get('paymentId')
-Reassigned in:
- File: paypal_flask_payment/payment.py
- > Line 40: payment = paypalrestsdk.Payment.find(paymentId)
- File: paypal_flask_payment/payment.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK paymentId: {} PayerID: {} '.format(paymentId, PayerID)
- File: paypal_flask_payment/payment.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error
-File: paypal_flask_payment/payment.py
- > reaches line 41, trigger word "execute(":
- if payment.execute('payer_id'PayerID):
-
-Vulnerability 2:
-File: paypal_flask_payment/payment.py
- > User input at line 37, trigger word "get(":
- PayerID = request.args.get('PayerID')
-Reassigned in:
- File: paypal_flask_payment/payment.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK paymentId: {} PayerID: {} '.format(paymentId, PayerID)
- File: paypal_flask_payment/payment.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error
-File: paypal_flask_payment/payment.py
- > reaches line 41, trigger word "execute(":
- if payment.execute('payer_id'PayerID):
-
-
-
-yalove/flask-nginx-gunicorn
-https://github.com/yalove/flask-nginx-gunicorn
-Entry file: flask-nginx-gunicorn/app/hello.py
-Scanned: 2016-10-25 23:11:05.244104
-No vulnerabilities found.
-
-
-tolmun/flask-ng-sample
-https://github.com/tolmun/flask-ng-sample
-Entry file: flask-ng-sample/project/__init__.py
-Scanned: 2016-10-25 23:11:07.002621
-Vulnerability 1:
-File: flask-ng-sample/project/api/views.py
- > User input at line 132, trigger word ".data":
- users = schema.dump(results,many=True).data
-File: flask-ng-sample/project/api/views.py
- > reaches line 133, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'users)
-
-Vulnerability 2:
-File: flask-ng-sample/project/api/views.py
- > User input at line 154, trigger word ".data":
- user = schema.dump(results).data
-File: flask-ng-sample/project/api/views.py
- > reaches line 155, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('user'user)
-
-
-
-Michotastico/NetworkInformationFlaskServer
-https://github.com/Michotastico/NetworkInformationFlaskServer
-Entry file: NetworkInformationFlaskServer/main.py
-Scanned: 2016-10-25 23:11:08.368114
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tjhakseth/Nice-Flask-Intro
-https://github.com/tjhakseth/Nice-Flask-Intro
-Entry file: Nice-Flask-Intro/nice.py
-Scanned: 2016-10-25 23:11:09.733666
-No vulnerabilities found.
-
-
-adamphillips/pi-flask-video-streaming
-https://github.com/adamphillips/pi-flask-video-streaming
-Entry file: pi-flask-video-streaming/app/main.py
-Scanned: 2016-10-25 23:11:11.090668
-No vulnerabilities found.
-
-
-AngelMunoz/Flask-Blueprints-Template
-https://github.com/AngelMunoz/Flask-Blueprints-Template
-Entry file: Flask-Blueprints-Template/app/__init__.py
-Scanned: 2016-10-25 23:11:12.377643
-Vulnerability 1:
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > User input at line 15, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > Line 17: session['user_id'] = user.id
-File: Flask-Blueprints-Template/app/mod_auth/controllers.py
- > reaches line 18, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-SeventhResolve/Flask-Intro-Nice-File
-https://github.com/SeventhResolve/Flask-Intro-Nice-File
-Entry file: Flask-Intro-Nice-File/nice.py
-Scanned: 2016-10-25 23:11:13.662625
-No vulnerabilities found.
-
-
-torykit/docker-flask-console
-https://github.com/torykit/docker-flask-console
-Entry file: docker-flask-console/start.py
-Scanned: 2016-10-25 23:11:15.057235
-No vulnerabilities found.
-
-
-koulanurag/Simple-Flask-Application
-https://github.com/koulanurag/Simple-Flask-Application
-Entry file: Simple-Flask-Application/app.py
-Scanned: 2016-10-25 23:11:16.362743
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-franklingu/flask_start_demo
-https://github.com/franklingu/flask_start_demo
-Entry file: flask_start_demo/hello.py
-Scanned: 2016-10-25 23:11:18.144310
-No vulnerabilities found.
-
-
-graphql-python/flask-graphql
-https://github.com/graphql-python/flask-graphql
-Entry file: flask-graphql/tests/app.py
-Scanned: 2016-10-25 23:11:21.621611
-Vulnerability 1:
-File: flask-graphql/tests/test_graphiqlview.py
- > User input at line 13, trigger word "get(":
- response = client.get(url_for('graphql'),headers='Accept''text/html')
-File: flask-graphql/tests/test_graphiqlview.py
- > reaches line 13, trigger word "url_for(":
- response = client.get(url_for('graphql'),headers='Accept''text/html')
-
-
-
-hhstore/flask-annotated
-https://github.com/hhstore/flask-annotated
-Entry file: flask-annotated/flask-0.5/flask/module.py
-Scanned: 2016-10-25 23:11:24.433796
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhiliang729/flask
-https://github.com/zhiliang729/flask
-Entry file: None
-Scanned: 2016-10-25 23:11:24.951086
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-prakxys/flask
-https://github.com/prakxys/flask
-Entry file: None
-Scanned: 2016-10-25 23:11:30.537637
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-galacticpy/flask
-https://github.com/galacticpy/flask
-Entry file: None
-Scanned: 2016-10-25 23:11:32.289348
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-iFe1er/flask
-https://github.com/iFe1er/flask
-Entry file: None
-Scanned: 2016-10-25 23:11:33.827738
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jarogers095/flask-hello-world
-https://github.com/jarogers095/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:11:34.357873
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-alex-paterson/Barebones-Flask-and-Caffe-Classifier
-https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier
-Entry file: Barebones-Flask-and-Caffe-Classifier/app.py
-Scanned: 2016-10-25 23:11:46.016748
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-drone-demos/drone-with-python
-https://github.com/drone-demos/drone-with-python
-Entry file: drone-with-python/dronedemo/main.py
-Scanned: 2016-10-25 23:11:47.410750
-No vulnerabilities found.
-
-
-amirziai/sklearnflask
-https://github.com/amirziai/sklearnflask
-Entry file: sklearnflask/main.py
-Scanned: 2016-10-25 23:11:51.979670
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sanghyunjooPurdue/flaskr
-https://github.com/sanghyunjooPurdue/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:11:52.496294
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanghyunjooPurdue/flaskr.
-
-becsully/flasktest
-https://github.com/becsully/flasktest
-Entry file: flasktest/mysite/__init__.py
-Scanned: 2016-10-25 23:12:11.252164
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tehasdf/flaskexample
-https://github.com/tehasdf/flaskexample
-Entry file: flaskexample/flaskexample/app.py
-Scanned: 2016-10-25 23:12:12.744795
-No vulnerabilities found.
-
-
-fengyc/flasky
-https://github.com/fengyc/flasky
-Entry file: None
-Scanned: 2016-10-25 23:12:13.261031
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sshimp/flasktaskr
-https://github.com/sshimp/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:12:13.797231
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sharma-abhi/flaskr
-https://github.com/sharma-abhi/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:12:14.317717
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sharma-abhi/flaskr.
-
-kwikiel/flaskr
-https://github.com/kwikiel/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:12:14.825964
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kwikiel/flaskr.
-
-SFurnace/flaskr
-https://github.com/SFurnace/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:12:15.352589
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SFurnace/flaskr.
-
-noamoss/flasktaskr
-https://github.com/noamoss/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:12:15.864134
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AxoSal/GAE-Flask-React-skeleton
-https://github.com/AxoSal/GAE-Flask-React-skeleton
-Entry file: GAE-Flask-React-skeleton/main.py
-Scanned: 2016-10-25 23:12:18.704599
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-jrballot/FlaskTaskr
-https://github.com/jrballot/FlaskTaskr
-Entry file: None
-Scanned: 2016-10-25 23:12:19.238456
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrballot/FlaskTaskr.
-
-AnshuOnGit/FlaskServices
-https://github.com/AnshuOnGit/FlaskServices
-Entry file: FlaskServices/read_file.py
-Scanned: 2016-10-25 23:12:23.731061
-Vulnerability 1:
-File: FlaskServices/read_file.py
- > User input at line 40, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/read_file.py
- > Line 44: filename = secure_filename(file.filename)
-File: FlaskServices/read_file.py
- > reaches line 50, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: FlaskServices/read_file.py
- > User input at line 40, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/read_file.py
- > Line 44: filename = secure_filename(file.filename)
-File: FlaskServices/read_file.py
- > reaches line 50, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 3:
-File: FlaskServices/uploads/read_file.py
- > User input at line 50, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/uploads/read_file.py
- > Line 54: filename = secure_filename(file.filename)
-File: FlaskServices/uploads/read_file.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 4:
-File: FlaskServices/uploads/read_file.py
- > User input at line 50, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: FlaskServices/uploads/read_file.py
- > Line 54: filename = secure_filename(file.filename)
-File: FlaskServices/uploads/read_file.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-ftanevski4/FlaskPycharm
-https://github.com/ftanevski4/FlaskPycharm
-Entry file: FlaskPycharm/FlaskPycharm.py
-Scanned: 2016-10-25 23:12:25.089683
-No vulnerabilities found.
-
-
-yasskh/FlaskProject
-https://github.com/yasskh/FlaskProject
-Entry file: FlaskProject/views.py
-Scanned: 2016-10-25 23:12:30.297453
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yukoga/flasksample1
-https://github.com/yukoga/flasksample1
-Entry file: flasksample1/hello.py
-Scanned: 2016-10-25 23:12:31.633295
-No vulnerabilities found.
-
-
-Njsao/FlaskServer
-https://github.com/Njsao/FlaskServer
-Entry file: FlaskServer/untitled.py
-Scanned: 2016-10-25 23:12:33.053571
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-feeman1989/backstage_flask
-https://github.com/feeman1989/backstage_flask
-Entry file: None
-Scanned: 2016-10-25 23:12:39.227321
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-charanjp/flask_blog
-https://github.com/charanjp/flask_blog
-Entry file: flask_blog/venv/Lib/site-packages/flask_sqlalchemy/__init__.py
-Scanned: 2016-10-25 23:12:44.597849
-No vulnerabilities found.
-
-
-jaleskinen/PythonFlask
-https://github.com/jaleskinen/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:12:52.995457
-Vulnerability 1:
-File: PythonFlask/app/routersi.py
- > User input at line 30, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routersi.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-maukka76/PythonFlask
-https://github.com/maukka76/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:13:00.049542
-No vulnerabilities found.
-
-
-Namelessi/PythonFlask
-https://github.com/Namelessi/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:13:06.440852
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mhgit1/PythonFlask
-https://github.com/mhgit1/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:13:12.349082
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jlents/discover-flask
-https://github.com/jlents/discover-flask
-Entry file: discover-flask/project/__init__.py
-Scanned: 2016-10-25 23:13:13.990767
-No vulnerabilities found.
-
-
-nimeshkverma/BootstrapFlask
-https://github.com/nimeshkverma/BootstrapFlask
-Entry file: None
-Scanned: 2016-10-25 23:13:16.474616
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ddrsmile/flask-blog
-https://github.com/ddrsmile/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:13:17.052025
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dasdachs/flask-blog
-https://github.com/dasdachs/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:13:17.595252
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-noamoss/flask-blog
-https://github.com/noamoss/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:13:18.107229
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hugoren/flask_login
-https://github.com/hugoren/flask_login
-Entry file: None
-Scanned: 2016-10-25 23:13:19.394086
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hugoren/flask_login.
-
-yuz989/uwsgi-flask
-https://github.com/yuz989/uwsgi-flask
-Entry file: uwsgi-flask/main.py
-Scanned: 2016-10-25 23:13:20.679783
-No vulnerabilities found.
-
-
-taisa007/timeliner-flask
-https://github.com/taisa007/timeliner-flask
-Entry file: timeliner-flask/timeliner/timeliner/__init__.py
-Scanned: 2016-10-25 23:13:22.097726
-No vulnerabilities found.
-
-
-ddrsmile/flask-taskr
-https://github.com/ddrsmile/flask-taskr
-Entry file: flask-taskr/views.py
-Scanned: 2016-10-25 23:13:23.777765
-No vulnerabilities found.
-
-
-Roconda/flask-bootstrap
-https://github.com/Roconda/flask-bootstrap
-Entry file: flask-bootstrap/src/api/__init__.py
-Scanned: 2016-10-25 23:13:25.170434
-No vulnerabilities found.
-
-
-maxcell/flask-workshop
-https://github.com/maxcell/flask-workshop
-Entry file: flask-workshop/hello_world/hello.py
-Scanned: 2016-10-25 23:13:26.974575
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sshimp/flask-blog
-https://github.com/sshimp/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:13:27.536936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-PavelMPD/flask_auth
-https://github.com/PavelMPD/flask_auth
-Entry file: flask_auth/web/server.py
-Scanned: 2016-10-25 23:13:29.308983
-No vulnerabilities found.
-
-
-seanwbarry/thinkful_flask
-https://github.com/seanwbarry/thinkful_flask
-Entry file: thinkful_flask/hello_world.py
-Scanned: 2016-10-25 23:13:33.238357
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-OrionsSuspenders/flask-blog
-https://github.com/OrionsSuspenders/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:13:33.826773
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DaTimsta/flask-test
-https://github.com/DaTimsta/flask-test
-Entry file: flask-test/flask_app.py
-Scanned: 2016-10-25 23:13:35.115047
-No vulnerabilities found.
-
-
-sstriatlon/PyFlask
-https://github.com/sstriatlon/PyFlask
-Entry file: PyFlask/app.py
-Scanned: 2016-10-25 23:13:39.723501
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlask/venv/lib/python2.7/sre_compile.py
-
-Vianey81/Flask-sql
-https://github.com/Vianey81/Flask-sql
-Entry file: Flask-sql/hackbright.py
-Scanned: 2016-10-25 23:13:41.548152
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-timoparv65/PythonFlask
-https://github.com/timoparv65/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:13:48.091962
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 38, trigger word ".data":
- user = Users.query.filter_by(email=login.email.data)
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 44: session['user_id'] = user[0].id
- File: PythonFlask/app/routers.py
- > Line 45: session['isLogged'] = True
- File: PythonFlask/app/routers.py
- > Line 49: friends = Friends.query.filter_by(user_id=user[0].id)
- File: PythonFlask/app/routers.py
- > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 58: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
-File: PythonFlask/app/routers.py
- > reaches line 51, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends)
-
-Vulnerability 2:
-File: PythonFlask/app/routers.py
- > User input at line 102, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 103, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-JRaisala/PythonFlask
-https://github.com/JRaisala/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:13:56.949964
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 22, trigger word ".data":
- user = Users.query.filter_by(email=login.email.data)
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 26: session['user_id'] = user[0].id
- File: PythonFlask/app/routers.py
- > Line 27: session['isLogged'] = True
- File: PythonFlask/app/routers.py
- > Line 29: friends = Friends.query.filter_by(user_id=user[0].id)
- File: PythonFlask/app/routers.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
-File: PythonFlask/app/routers.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends)
-
-Vulnerability 2:
-File: PythonFlask/app/routers.py
- > User input at line 76, trigger word "get(":
- user = Users.query.get(session['user_id'])
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 81: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True)
- File: PythonFlask/app/routers.py
- > Line 66: ret_MAYBE_FUNCTION_NAME = redirect('/')
- File: PythonFlask/app/routers.py
- > Line 69: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True)
-File: PythonFlask/app/routers.py
- > reaches line 78, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=user.friends)
-
-Vulnerability 3:
-File: PythonFlask/app/routers.py
- > User input at line 98, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-jraappan/PythonFlask
-https://github.com/jraappan/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:14:04.530431
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 27, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-hannu78/PythonFlask
-https://github.com/hannu78/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:14:10.951658
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 46, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 47, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_name.html',uname=name)
-
-
-
-marcosf63/flask_app
-https://github.com/marcosf63/flask_app
-Entry file: None
-Scanned: 2016-10-25 23:14:11.495774
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-maratkanov-a/flask_project
-https://github.com/maratkanov-a/flask_project
-Entry file: flask_project/flask_project.py
-Scanned: 2016-10-25 23:14:12.832351
-No vulnerabilities found.
-
-
-bellcliff/practice-flask
-https://github.com/bellcliff/practice-flask
-Entry file: practice-flask/hello.py
-Scanned: 2016-10-25 23:14:14.680977
-No vulnerabilities found.
-
-
-GeetikaBatra/Flask_intro
-https://github.com/GeetikaBatra/Flask_intro
-Entry file: None
-Scanned: 2016-10-25 23:14:15.215175
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-changddcn/dd-flask
-https://github.com/changddcn/dd-flask
-Entry file: None
-Scanned: 2016-10-25 23:14:16.842314
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/changddcn/dd-flask.
-
-Decus12/PythonFlask
-https://github.com/Decus12/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:14:28.538903
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 49, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 50, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-thiltunen78/PythonFlask
-https://github.com/thiltunen78/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:14:35.688652
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 22, trigger word ".data":
- user = Users.query.filter_by(email=login.email.data)
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 26: session['user_id'] = user[0].id
- File: PythonFlask/app/routers.py
- > Line 27: session['isLogged'] = True
- File: PythonFlask/app/routers.py
- > Line 29: friends = Friends.query.filter_by(user_id=user[0].id)
- File: PythonFlask/app/routers.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
-File: PythonFlask/app/routers.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends)
-
-Vulnerability 2:
-File: PythonFlask/app/routers.py
- > User input at line 75, trigger word "get(":
- user = Users.query.get(session['user_id'])
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 79: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True)
- File: PythonFlask/app/routers.py
- > Line 65: ret_MAYBE_FUNCTION_NAME = redirect('/')
- File: PythonFlask/app/routers.py
- > Line 68: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True)
-File: PythonFlask/app/routers.py
- > reaches line 76, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=user.friends)
-
-Vulnerability 3:
-File: PythonFlask/app/routers.py
- > User input at line 95, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 96, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-tere15/PythonFlask
-https://github.com/tere15/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:14:50.136152
-No vulnerabilities found.
-
-
-ttakkula/flask_example
-https://github.com/ttakkula/flask_example
-Entry file: flask_example/app/__init__.py
-Scanned: 2016-10-25 23:15:00.867208
-Vulnerability 1:
-File: flask_example/app/routers.py
- > User input at line 18, trigger word ".data":
- user = Users.query.filter_by(email=login.email.data)
-Reassigned in:
- File: flask_example/app/routers.py
- > Line 20: session['user_id'] = user[0].id
- File: flask_example/app/routers.py
- > Line 21: session['isLogged'] = True
- File: flask_example/app/routers.py
- > Line 23: friends = Friends.query.filter_by(user_id=user[0].id)
- File: flask_example/app/routers.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=login, isLogged=False)
- File: flask_example/app/routers.py
- > Line 32: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=login, isLogged=False)
- File: flask_example/app/routers.py
- > Line 14: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=login, isLogged=False)
-File: flask_example/app/routers.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('friends.html',isLogged=True, friends=friends)
-
-Vulnerability 2:
-File: flask_example/app/routers.py
- > User input at line 61, trigger word "get(":
- friend = Users.query.get(session['user_id'])
-Reassigned in:
- File: flask_example/app/routers.py
- > Line 59: ret_MAYBE_FUNCTION_NAME = redirect('/')
-File: flask_example/app/routers.py
- > reaches line 62, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('friends.html',isLogged=True, friends=friend.friends)
-
-Vulnerability 3:
-File: flask_example/app/routers.py
- > User input at line 79, trigger word "get(":
- name = request.args.get('name')
-File: flask_example/app/routers.py
- > reaches line 82, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name, browser=agent, preflang=preflang)
-
-Vulnerability 4:
-File: flask_example/app/routers.py
- > User input at line 80, trigger word "get(":
- agent = request.headers.get('User-Agent')
-File: flask_example/app/routers.py
- > reaches line 82, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name, browser=agent, preflang=preflang)
-
-Vulnerability 5:
-File: flask_example/app/routers.py
- > User input at line 81, trigger word "get(":
- preflang = request.headers.get('Accept-Language')
-File: flask_example/app/routers.py
- > reaches line 82, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name, browser=agent, preflang=preflang)
-
-
-
-satyadevi-nyros/werckers_flask
-https://github.com/satyadevi-nyros/werckers_flask
-Entry file: werckers_flask/app.py
-Scanned: 2016-10-25 23:15:03.098054
-No vulnerabilities found.
-
-
-ltaziri/SQL-Flask
-https://github.com/ltaziri/SQL-Flask
-Entry file: SQL-Flask/hackbright.py
-Scanned: 2016-10-25 23:15:04.411898
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-psavela/PythonFlask
-https://github.com/psavela/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:15:13.417739
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 21, trigger word ".data":
- user = Users.query.filter_by(email=login.email.data)
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 25: session['user_id'] = user[0].id
- File: PythonFlask/app/routers.py
- > Line 26: session['isLogged'] = True
- File: PythonFlask/app/routers.py
- > Line 28: friends = Friends.query.filter_by(user_id=user[0].id)
- File: PythonFlask/app/routers.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
-File: PythonFlask/app/routers.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends)
-
-Vulnerability 2:
-File: PythonFlask/app/routers.py
- > User input at line 70, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-KariR61/PythonFlask
-https://github.com/KariR61/PythonFlask
-Entry file: PythonFlask/app/__init__.py
-Scanned: 2016-10-25 23:15:19.490401
-Vulnerability 1:
-File: PythonFlask/app/routers.py
- > User input at line 19, trigger word ".data":
- user = Users.query.filter_by(email=login.email.data)
-Reassigned in:
- File: PythonFlask/app/routers.py
- > Line 22: session['user_id'] = user[0].id
- File: PythonFlask/app/routers.py
- > Line 23: session['isLogged'] = True
- File: PythonFlask/app/routers.py
- > Line 25: friends = Friends.query.filter_by(user_id=user[0].id)
- File: PythonFlask/app/routers.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
- File: PythonFlask/app/routers.py
- > Line 14: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False)
-File: PythonFlask/app/routers.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends)
-
-Vulnerability 2:
-File: PythonFlask/app/routers.py
- > User input at line 45, trigger word "get(":
- name = request.args.get('name')
-File: PythonFlask/app/routers.py
- > reaches line 46, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name)
-
-
-
-dhruvsrivastava/flask-intro
-https://github.com/dhruvsrivastava/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-25 23:15:23.742653
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-cjohns38/flask-intro
-https://github.com/cjohns38/flask-intro
-Entry file: flask-intro/__init__.py
-Scanned: 2016-10-25 23:15:25.308002
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-notaweelos/openshift_flask
-https://github.com/notaweelos/openshift_flask
-Entry file: openshift_flask/helloflask.py
-Scanned: 2016-10-25 23:15:26.595207
-No vulnerabilities found.
-
-
-jkeung/flask_microblog
-https://github.com/jkeung/flask_microblog
-Entry file: flask_microblog/app/__init__.py
-Scanned: 2016-10-25 23:15:28.311771
-No vulnerabilities found.
-
-
-shank7485/Flask-APIs
-https://github.com/shank7485/Flask-APIs
-Entry file: Flask-APIs/APIs/__init__.py
-Scanned: 2016-10-25 23:15:29.748537
-Vulnerability 1:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 49, trigger word "get(":
- from_address = request.args.get('f_addr')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 53, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 2:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 50, trigger word "get(":
- to_address = request.args.get('t_addr')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 53, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 3:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 58, trigger word "get(":
- from_latitude = request.args.get('f_lat')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 4:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 59, trigger word "get(":
- from_longitude = request.args.get('f_long')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 5:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 60, trigger word "get(":
- to_latitude = request.args.get('t_lat')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-Vulnerability 6:
-File: Flask-APIs/APIs/main_URLs.py
- > User input at line 61, trigger word "get(":
- to_longitude = request.args.get('t_long')
-Reassigned in:
- File: Flask-APIs/APIs/main_URLs.py
- > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key)
-File: Flask-APIs/APIs/main_URLs.py
- > reaches line 64, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices())
-
-
-
-mattyait/Flask_webapp
-https://github.com/mattyait/Flask_webapp
-Entry file: Flask_webapp/routes.py
-Scanned: 2016-10-25 23:15:31.160467
-Vulnerability 1:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 2:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 3:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 73, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 4:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 78, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 5:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 6:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 89, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 7:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 95, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 8:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-
-
-nntndfrk/untitled
-https://github.com/nntndfrk/untitled
-Entry file: untitled/untitled.py
-Scanned: 2016-10-25 23:15:32.463720
-No vulnerabilities found.
-
-
-jrballot/FlaskBlogApp
-https://github.com/jrballot/FlaskBlogApp
-Entry file: FlaskBlogApp/blog.py
-Scanned: 2016-10-25 23:15:33.750716
-No vulnerabilities found.
-
-
-jgabrielfreitas/FlaskAndParse
-https://github.com/jgabrielfreitas/FlaskAndParse
-Entry file: FlaskAndParse/hello_flask.py
-Scanned: 2016-10-25 23:15:35.047731
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-bernaerdik/Flask_on_CF
-https://github.com/bernaerdik/Flask_on_CF
-Entry file: Flask_on_CF/hello.py
-Scanned: 2016-10-25 23:15:36.325185
-No vulnerabilities found.
-
-
-go-bears/sql-with-flask
-https://github.com/go-bears/sql-with-flask
-Entry file: sql-with-flask/hackbright.py
-Scanned: 2016-10-25 23:15:37.630463
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-anniehe/project-tracker-flask
-https://github.com/anniehe/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:38.936213
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-knoxilla/web-flask-dockerized
-https://github.com/knoxilla/web-flask-dockerized
-Entry file: web-flask-dockerized/app.py
-Scanned: 2016-10-25 23:15:40.224489
-No vulnerabilities found.
-
-
-julyano/MiniCursoFlaskPETCC
-https://github.com/julyano/MiniCursoFlaskPETCC
-Entry file: MiniCursoFlaskPETCC/routes.py
-Scanned: 2016-10-25 23:15:41.513425
-No vulnerabilities found.
-
-
-neonbadger/project-tracker-flask
-https://github.com/neonbadger/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:42.815557
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-DoriRunyon/Project-tracker-flask
-https://github.com/DoriRunyon/Project-tracker-flask
-Entry file: Project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:44.106486
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-emlam/project-tracker-flask
-https://github.com/emlam/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:45.450561
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Buuntu/TicTacToe-Flask
-https://github.com/Buuntu/TicTacToe-Flask
-Entry file: TicTacToe-Flask/tictactoe.py
-Scanned: 2016-10-25 23:15:46.875899
-No vulnerabilities found.
-
-
-EdilvoLima/CursoPythonFlask
-https://github.com/EdilvoLima/CursoPythonFlask
-Entry file: CursoPythonFlask/app.py
-Scanned: 2016-10-25 23:15:48.285028
-No vulnerabilities found.
-
-
-dternyak/Flask-Postgres-Docker
-https://github.com/dternyak/Flask-Postgres-Docker
-Entry file: Flask-Postgres-Docker/web/index.py
-Scanned: 2016-10-25 23:15:50.162125
-No vulnerabilities found.
-
-
-info3180/python-flask-example
-https://github.com/info3180/python-flask-example
-Entry file: python-flask-example/hello.py
-Scanned: 2016-10-25 23:15:51.457518
-Vulnerability 1:
-File: python-flask-example/hello.py
- > User input at line 17, trigger word "get(":
- name = request.args.get('name')
-File: python-flask-example/hello.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('process.html',name=name)
-
-
-
-janeygak/Hackbright--SQL-with-Flask
-https://github.com/janeygak/Hackbright--SQL-with-Flask
-Entry file: Hackbright--SQL-with-Flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:52.860277
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-SeventhResolve/Project-Tracker-Flask
-https://github.com/SeventhResolve/Project-Tracker-Flask
-Entry file: Project-Tracker-Flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:54.292064
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-alitsiya/project-tracker-flask
-https://github.com/alitsiya/project-tracker-flask
-Entry file: project-tracker-flask/hackbright-web.py
-Scanned: 2016-10-25 23:15:55.693501
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ThomasMarcel/gae-tomalcala-flask
-https://github.com/ThomasMarcel/gae-tomalcala-flask
-Entry file: gae-tomalcala-flask/main.py
-Scanned: 2016-10-25 23:15:57.107355
-No vulnerabilities found.
-
-
-ContinuumIO/flask-kerberos-login
-https://github.com/ContinuumIO/flask-kerberos-login
-Entry file: flask-kerberos-login/examples/simple.py
-Scanned: 2016-10-25 23:15:58.514703
-No vulnerabilities found.
-
-
-badspelr/flask-hello-world
-https://github.com/badspelr/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:16:02.075095
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yoophi/flask-appointment-peewee
-https://github.com/yoophi/flask-appointment-peewee
-Entry file: flask-appointment-peewee/sched/app.py
-Scanned: 2016-10-25 23:16:05.515634
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-c1rno/Flask_auth_example
-https://github.com/c1rno/Flask_auth_example
-Entry file: Flask_auth_example/app/__init__.py
-Scanned: 2016-10-25 23:16:15.388339
-No vulnerabilities found.
-
-
-billdwalters/Flask
-https://github.com/billdwalters/Flask
-Entry file: None
-Scanned: 2016-10-25 23:16:26.126361
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-prakxys/flask
-https://github.com/prakxys/flask
-Entry file: None
-Scanned: 2016-10-25 23:16:27.705370
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-galacticpy/flask
-https://github.com/galacticpy/flask
-Entry file: None
-Scanned: 2016-10-25 23:16:29.347089
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-OneBitSoftware/Office365-SharePoint-Python-Flask-Sample
-https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample
-Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py
-Scanned: 2016-10-25 23:16:32.020096
-No vulnerabilities found.
-
-
-NJIT-SIG-WEBDEV/flask-intro
-https://github.com/NJIT-SIG-WEBDEV/flask-intro
-Entry file: flask-intro/Session1/app.py
-Scanned: 2016-10-25 23:16:33.425721
-No vulnerabilities found.
-
-
-imperio-wxm/flask-learn
-https://github.com/imperio-wxm/flask-learn
-Entry file: None
-Scanned: 2016-10-25 23:16:33.996220
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ptrierweiler/myblog
-https://github.com/ptrierweiler/myblog
-Entry file: None
-Scanned: 2016-10-25 23:16:34.550119
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-drone-demos/drone-with-python
-https://github.com/drone-demos/drone-with-python
-Entry file: drone-with-python/dronedemo/main.py
-Scanned: 2016-10-25 23:16:36.962684
-No vulnerabilities found.
-
-
-msopentechcn/aad-graphapi-flask-demo
-https://github.com/msopentechcn/aad-graphapi-flask-demo
-Entry file: aad-graphapi-flask-demo/app.py
-Scanned: 2016-10-25 23:16:38.261686
-Vulnerability 1:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 100, trigger word "get(":
- error_code = messages.get('error_code')
-File: aad-graphapi-flask-demo/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message)
-
-Vulnerability 2:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 101, trigger word "get(":
- error_message = messages.get('error_message')
-File: aad-graphapi-flask-demo/app.py
- > reaches line 102, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message)
-
-Vulnerability 3:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 108, trigger word "get(":
- error_code = errors.get('code')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 4:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 109, trigger word "get(":
- error_message = errors.get('message').get('value')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 5:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 108, trigger word "get(":
- error_code = errors.get('code')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-Vulnerability 6:
-File: aad-graphapi-flask-demo/app.py
- > User input at line 109, trigger word "get(":
- error_message = errors.get('message').get('value')
-Reassigned in:
- File: aad-graphapi-flask-demo/app.py
- > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message)
- File: aad-graphapi-flask-demo/app.py
- > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user'))
-File: aad-graphapi-flask-demo/app.py
- > reaches line 111, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages))
-
-
-
-amirziai/sklearnflask
-https://github.com/amirziai/sklearnflask
-Entry file: sklearnflask/main.py
-Scanned: 2016-10-25 23:16:39.770002
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-SticksInHand/flaskr
-https://github.com/SticksInHand/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:40.294868
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SticksInHand/flaskr.
-
-jayShepard/Flasky
-https://github.com/jayShepard/Flasky
-Entry file: None
-Scanned: 2016-10-25 23:16:40.847401
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jayShepard/Flasky.
-
-vineethtw/flaskexamples
-https://github.com/vineethtw/flaskexamples
-Entry file: flaskexamples/api/simulations.py
-Scanned: 2016-10-25 23:16:43.260017
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kmosho/flaskr
-https://github.com/kmosho/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:43.848093
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kmosho/flaskr.
-
-Duncodes/flasky
-https://github.com/Duncodes/flasky
-Entry file: None
-Scanned: 2016-10-25 23:16:45.354567
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-menglong81/flaskr
-https://github.com/menglong81/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:46.869868
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/menglong81/flaskr.
-
-chadelder/flasktaskr
-https://github.com/chadelder/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:48.399265
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-diegogslomp/flaskr
-https://github.com/diegogslomp/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:51.457886
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/diegogslomp/flaskr.
-
-xu00wei/flasky
-https://github.com/xu00wei/flasky
-Entry file: None
-Scanned: 2016-10-25 23:16:52.972011
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-playgrdstar/flasktaskr
-https://github.com/playgrdstar/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:53.496147
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-toricor/flaskr
-https://github.com/toricor/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:55.023518
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/toricor/flaskr.
-
-Lazyppl/Flaskblog
-https://github.com/Lazyppl/Flaskblog
-Entry file: Flaskblog/app/__init__.py
-Scanned: 2016-10-25 23:16:57.432885
-No vulnerabilities found.
-
-
-zeratullich/flaskr
-https://github.com/zeratullich/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:16:57.949015
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeratullich/flaskr.
-
-noamoss/flasktaskr
-https://github.com/noamoss/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:17:02.469801
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arose13/HerokuCondaScipyFlaskApp
-https://github.com/arose13/HerokuCondaScipyFlaskApp
-Entry file: HerokuCondaScipyFlaskApp/Web/app.py
-Scanned: 2016-10-25 23:17:05.916123
-No vulnerabilities found.
-
-
-jrballot/FlaskTaskr
-https://github.com/jrballot/FlaskTaskr
-Entry file: None
-Scanned: 2016-10-25 23:17:06.450306
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrballot/FlaskTaskr.
-
-awind/FlaskRestful
-https://github.com/awind/FlaskRestful
-Entry file: FlaskRestful/app/__init__.py
-Scanned: 2016-10-25 23:17:15.897907
-Vulnerability 1:
-File: FlaskRestful/app/apis.py
- > User input at line 48, trigger word "get(":
- user = User.query.get(userid)
-File: FlaskRestful/app/apis.py
- > reaches line 51, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = user_schema.jsonify(user)
-
-
-
-jgabrielfreitas/FlaskFirebase
-https://github.com/jgabrielfreitas/FlaskFirebase
-Entry file: FlaskFirebase/runner.py
-Scanned: 2016-10-25 23:17:22.217026
-No vulnerabilities found.
-
-
-scarabcoder/FlaskSite
-https://github.com/scarabcoder/FlaskSite
-Entry file: FlaskSite/app/__init__.py
-Scanned: 2016-10-25 23:17:25.871051
-No vulnerabilities found.
-
-
-aetherwu/FlaskDocker
-https://github.com/aetherwu/FlaskDocker
-Entry file: FlaskDocker/app/app.py
-Scanned: 2016-10-25 23:17:27.497719
-No vulnerabilities found.
-
-
-angeloski/flask-sandbox
-https://github.com/angeloski/flask-sandbox
-Entry file: flask-sandbox/intro_to_flask/__init__.py
-Scanned: 2016-10-25 23:17:28.795512
-No vulnerabilities found.
-
-
-jonnybazookatone/flask-watchman
-https://github.com/jonnybazookatone/flask-watchman
-Entry file: None
-Scanned: 2016-10-25 23:17:30.172554
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jonnybazookatone/flask-watchman.
-
-Lucky0604/flask-blog
-https://github.com/Lucky0604/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:17:31.722923
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-arvind-iyer/flask-101
-https://github.com/arvind-iyer/flask-101
-Entry file: flask-101/app/__init__.py
-Scanned: 2016-10-25 23:17:34.130589
-No vulnerabilities found.
-
-
-vbalien/flask-skeleton
-https://github.com/vbalien/flask-skeleton
-Entry file: flask-skeleton/app/__init__.py
-Scanned: 2016-10-25 23:17:35.524055
-No vulnerabilities found.
-
-
-anniee/flask-intro
-https://github.com/anniee/flask-intro
-Entry file: flask-intro/server.py
-Scanned: 2016-10-25 23:17:36.861445
-No vulnerabilities found.
-
-
-dritux/flask-spark
-https://github.com/dritux/flask-spark
-Entry file: flask-spark/spark/__init__.py
-Scanned: 2016-10-25 23:17:38.150479
-No vulnerabilities found.
-
-
-robbintt/flask-template
-https://github.com/robbintt/flask-template
-Entry file: flask-template/controller.py
-Scanned: 2016-10-25 23:17:40.040281
-No vulnerabilities found.
-
-
-felipemfp/flask-microblog
-https://github.com/felipemfp/flask-microblog
-Entry file: None
-Scanned: 2016-10-25 23:17:40.569992
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/felipemfp/flask-microblog.
-
-bronka/flask-blog
-https://github.com/bronka/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:17:41.112344
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-genagain/learning-flask
-https://github.com/genagain/learning-flask
-Entry file: learning-flask/app/hello.py
-Scanned: 2016-10-25 23:17:47.565510
-No vulnerabilities found.
-
-
-acknowledge/flask-api
-https://github.com/acknowledge/flask-api
-Entry file: None
-Scanned: 2016-10-25 23:17:48.611297
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/acknowledge/flask-api.
-
-JunQian-Andy/flask_mail
-https://github.com/JunQian-Andy/flask_mail
-Entry file: flask_mail/app/__init__.py
-Scanned: 2016-10-25 23:17:49.915215
-No vulnerabilities found.
-
-
-fabricekwizera/flask_intro
-https://github.com/fabricekwizera/flask_intro
-Entry file: flask_intro/first_app.py
-Scanned: 2016-10-25 23:17:51.307378
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py
-
-relman/flask-srv
-https://github.com/relman/flask-srv
-Entry file: flask-srv/service.py
-Scanned: 2016-10-25 23:17:52.856737
-No vulnerabilities found.
-
-
-volgoweb/flask_api
-https://github.com/volgoweb/flask_api
-Entry file: flask_api/application.py
-Scanned: 2016-10-25 23:17:54.167549
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-leiyue/tutorial_flask
-https://github.com/leiyue/tutorial_flask
-Entry file: tutorial_flask/base/app.py
-Scanned: 2016-10-25 23:17:55.596378
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sharma-mohit/flask-mongo
-https://github.com/sharma-mohit/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-25 23:17:57.463311
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-samgclarke/flask-starter
-https://github.com/samgclarke/flask-starter
-Entry file: None
-Scanned: 2016-10-25 23:17:58.007689
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/samgclarke/flask-starter.
-
-hbldh/flask-pybankid
-https://github.com/hbldh/flask-pybankid
-Entry file: flask-pybankid/flask_pybankid.py
-Scanned: 2016-10-25 23:18:03.482201
-Vulnerability 1:
-File: flask-pybankid/flask_pybankid.py
- > User input at line 130, trigger word "get(":
- text_to_sign = request.args.get('userVisibleData', '')
-Reassigned in:
- File: flask-pybankid/flask_pybankid.py
- > Line 132: response = self.client.sign(text_to_sign, personal_number)
- File: flask-pybankid/flask_pybankid.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError.create_from_pybankid_exception(e))
- File: flask-pybankid/flask_pybankid.py
- > Line 136: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError(str(e), 500))
-File: flask-pybankid/flask_pybankid.py
- > reaches line 138, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-krlex/flask-resume
-https://github.com/krlex/flask-resume
-Entry file: flask-resume/manage.py
-Scanned: 2016-10-25 23:18:05.909073
-No vulnerabilities found.
-
-
-doobeh/flask-lister
-https://github.com/doobeh/flask-lister
-Entry file: flask-lister/app/core.py
-Scanned: 2016-10-25 23:18:08.210911
-No vulnerabilities found.
-
-
-dfitzgerald3/sg_flask
-https://github.com/dfitzgerald3/sg_flask
-Entry file: sg_flask/__init__.py
-Scanned: 2016-10-25 23:18:32.765844
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: sg_flask/venv/lib/python2.7/sre_compile.py
-
-Tmingh/learn_flask
-https://github.com/Tmingh/learn_flask
-Entry file: learn_flask/learn_flask/flaskr.py
-Scanned: 2016-10-25 23:18:34.164082
-No vulnerabilities found.
-
-
-qiuhaoling/my_flask
-https://github.com/qiuhaoling/my_flask
-Entry file: my_flask/app/__init__.py
-Scanned: 2016-10-25 23:18:35.586790
-No vulnerabilities found.
-
-
-ahsanwtc/flask-project
-https://github.com/ahsanwtc/flask-project
-Entry file: flask-project/hello.py
-Scanned: 2016-10-25 23:18:36.868420
-No vulnerabilities found.
-
-
-chadelder/flask-blog
-https://github.com/chadelder/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:18:37.410914
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rdrsh/flask-hello
-https://github.com/rdrsh/flask-hello
-Entry file: flask-hello/main.py
-Scanned: 2016-10-25 23:18:39.162433
-No vulnerabilities found.
-
-
-Forumouth/flask-simple
-https://github.com/Forumouth/flask-simple
-Entry file: flask-simple/tests/data/testapp.py
-Scanned: 2016-10-25 23:18:40.571791
-No vulnerabilities found.
-
-
-mattyait/Flask_webapp
-https://github.com/mattyait/Flask_webapp
-Entry file: Flask_webapp/routes.py
-Scanned: 2016-10-25 23:18:41.988579
-Vulnerability 1:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 2:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 69, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 3:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 73, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 4:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 78, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 5:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 85, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 6:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 89, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-Vulnerability 7:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 95, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message)
-
-Vulnerability 8:
-File: Flask_webapp/routes.py
- > User input at line 43, trigger word "form[":
- user_name = request.form['username'].strip()
-Reassigned in:
- File: Flask_webapp/routes.py
- > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges'
- File: Flask_webapp/routes.py
- > Line 72: errors = 'User ' + user_name + ' already exist.'
- File: Flask_webapp/routes.py
- > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges'
- File: Flask_webapp/routes.py
- > Line 84: message = 'User' + user_name + ' modified successfully'
- File: Flask_webapp/routes.py
- > Line 88: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 94: message = 'User' + user_name + ' deleted successfully'
- File: Flask_webapp/routes.py
- > Line 98: errors = 'User ' + user_name + ' not exist.'
- File: Flask_webapp/routes.py
- > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html')
- File: Flask_webapp/routes.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
- File: Flask_webapp/routes.py
- > Line 57: errors = 'Please enter the fields values.'
-File: Flask_webapp/routes.py
- > reaches line 99, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors)
-
-
-
-playgrdstar/flask-blog
-https://github.com/playgrdstar/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:18:42.538549
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rx3bp/flask-freeze
-https://github.com/rx3bp/flask-freeze
-Entry file: flask-freeze/app.py
-Scanned: 2016-10-25 23:18:44.427567
-No vulnerabilities found.
-
-
-worthlesspenny7/tumblelogFlask
-https://github.com/worthlesspenny7/tumblelogFlask
-Entry file: tumblelogFlask/__init__.py
-Scanned: 2016-10-25 23:18:46.225977
-No vulnerabilities found.
-
-
-NaoYamaguchi/flask_login
-https://github.com/NaoYamaguchi/flask_login
-Entry file: None
-Scanned: 2016-10-25 23:18:46.771175
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/NaoYamaguchi/flask_login.
-
-njnr/onece
-https://github.com/njnr/onece
-Entry file: onece/app/__init__.py
-Scanned: 2016-10-25 23:18:48.352859
-Vulnerability 1:
-File: onece/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 26: posts = pagination.items
- File: onece/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: onece/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: onece/app/main/views.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 43: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: onece/app/main/views.py
- > Line 45: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 48: comments = pagination.items
- File: onece/app/main/views.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: onece/app/main/views.py
- > reaches line 49, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 3:
-File: onece/app/main/views.py
- > User input at line 54, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 55: pagination = Location.query.order_by(Location.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 58: locations = pagination.items
-File: onece/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('locations.html',locations=locations, pagination=pagination)
-
-Vulnerability 4:
-File: onece/app/main/views.py
- > User input at line 117, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 118: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 121: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: onece/app/main/views.py
- > Line 116: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: onece/app/main/views.py
- > reaches line 123, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: onece/app/main/views.py
- > User input at line 134, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: onece/app/main/views.py
- > Line 135: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: onece/app/main/views.py
- > Line 138: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: onece/app/main/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: onece/app/main/views.py
- > reaches line 140, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-rmaheshkumarblr/FlaskTestingApp
-https://github.com/rmaheshkumarblr/FlaskTestingApp
-Entry file: FlaskTestingApp/testingFlaskScript.py
-Scanned: 2016-10-25 23:18:52.346343
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jrballot/FlaskBlogApp
-https://github.com/jrballot/FlaskBlogApp
-Entry file: FlaskBlogApp/blog.py
-Scanned: 2016-10-25 23:18:53.647926
-No vulnerabilities found.
-
-
-worthlesspenny7/FlaskYoutubeTutorial
-https://github.com/worthlesspenny7/FlaskYoutubeTutorial
-Entry file: FlaskYoutubeTutorial/application.py
-Scanned: 2016-10-25 23:18:57.569543
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/sre_compile.py
-
-joyzhaoyang/FlaskDirectUploader
-https://github.com/joyzhaoyang/FlaskDirectUploader
-Entry file: FlaskDirectUploader/application.py
-Scanned: 2016-10-25 23:18:59.266086
-No vulnerabilities found.
-
-
-apiarian/RPi-GPIO-flask
-https://github.com/apiarian/RPi-GPIO-flask
-Entry file: RPi-GPIO-flask/server.py
-Scanned: 2016-10-25 23:19:00.605769
-No vulnerabilities found.
-
-
-IvanBodnar/fromzero_flask_blog
-https://github.com/IvanBodnar/fromzero_flask_blog
-Entry file: fromzero_flask_blog/__init__.py
-Scanned: 2016-10-25 23:19:02.348710
-Vulnerability 1:
-File: fromzero_flask_blog/author/views.py
- > User input at line 27, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: fromzero_flask_blog/author/views.py
- > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
- File: fromzero_flask_blog/author/views.py
- > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error)
-File: fromzero_flask_blog/author/views.py
- > reaches line 29, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 2:
-File: fromzero_flask_blog/blog/views.py
- > User input at line 100, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: fromzero_flask_blog/blog/views.py
- > Line 102: slug = slugify(title)
- File: fromzero_flask_blog/blog/views.py
- > Line 103: post = Post(blog, author, title, body, category, filename, slug)
- File: fromzero_flask_blog/blog/views.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: fromzero_flask_blog/blog/views.py
- > reaches line 108, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-Vulnerability 3:
-File: fromzero_flask_blog/blog/views.py
- > User input at line 100, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: fromzero_flask_blog/blog/views.py
- > Line 102: slug = slugify(title)
- File: fromzero_flask_blog/blog/views.py
- > Line 103: post = Post(blog, author, title, body, category, filename, slug)
- File: fromzero_flask_blog/blog/views.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: fromzero_flask_blog/blog/views.py
- > reaches line 108, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-
-
-alexarnautu/simple-flask-blog
-https://github.com/alexarnautu/simple-flask-blog
-Entry file: simple-flask-blog/blog.py
-Scanned: 2016-10-25 23:19:04.078496
-No vulnerabilities found.
-
-
-mhgit1/PythonFlask_oma
-https://github.com/mhgit1/PythonFlask_oma
-Entry file: PythonFlask_oma/app/__init__.py
-Scanned: 2016-10-25 23:19:11.553437
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-MuriloFerraz/intel_edison_flask
-https://github.com/MuriloFerraz/intel_edison_flask
-Entry file: intel_edison_flask/flask_example/contole.py
-Scanned: 2016-10-25 23:19:13.069146
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-bernaerdik/Flask_on_CF
-https://github.com/bernaerdik/Flask_on_CF
-Entry file: Flask_on_CF/hello.py
-Scanned: 2016-10-25 23:19:14.362762
-No vulnerabilities found.
-
-
-astianseb/flask-simple-distributed-applicaiton
-https://github.com/astianseb/flask-simple-distributed-applicaiton
-Entry file: flask-simple-distributed-applicaiton/Flasktest/__init__.py
-Scanned: 2016-10-25 23:19:15.680546
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tomov/flask-heroku-backend
-https://github.com/tomov/flask-heroku-backend
-Entry file: flask-heroku-backend/app/__init__.py
-Scanned: 2016-10-25 23:19:17.068501
-No vulnerabilities found.
-
-
-knoxilla/web-flask-dockerized
-https://github.com/knoxilla/web-flask-dockerized
-Entry file: web-flask-dockerized/app.py
-Scanned: 2016-10-25 23:19:18.364511
-No vulnerabilities found.
-
-
-akaak/flask-mega-tutorial
-https://github.com/akaak/flask-mega-tutorial
-Entry file: flask-mega-tutorial/part-iii-forms/app.py
-Scanned: 2016-10-25 23:19:20.013795
-No vulnerabilities found.
-
-
-thechad12/Flask-Item-Catalog
-https://github.com/thechad12/Flask-Item-Catalog
-Entry file: Flask-Item-Catalog/application.py
-Scanned: 2016-10-25 23:19:21.829619
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-javicacheiro/rest_api_flask
-https://github.com/javicacheiro/rest_api_flask
-Entry file: rest_api_flask/rest/app/__init__.py
-Scanned: 2016-10-25 23:19:23.740283
-No vulnerabilities found.
-
-
-florenceloi/flask-intro-redo
-https://github.com/florenceloi/flask-intro-redo
-Entry file: flask-intro-redo/nice.py
-Scanned: 2016-10-25 23:19:35.575331
-No vulnerabilities found.
-
-
-eric-boone/python-flask-round1
-https://github.com/eric-boone/python-flask-round1
-Entry file: python-flask-round1/app/__init__.py
-Scanned: 2016-10-25 23:19:37.972896
-No vulnerabilities found.
-
-
-playgrdstar/flask-hello-world
-https://github.com/playgrdstar/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:19:39.041943
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-iceskel/flask-restful-api
-https://github.com/iceskel/flask-restful-api
-Entry file: flask-restful-api/api.py
-Scanned: 2016-10-25 23:19:41.457333
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-apiaas/gae-flask-base
-https://github.com/apiaas/gae-flask-base
-Entry file: gae-flask-base/src/main.py
-Scanned: 2016-10-25 23:19:44.272487
-No vulnerabilities found.
-
-
-ddrsmile/flask-taskr-with-blueprint
-https://github.com/ddrsmile/flask-taskr-with-blueprint
-Entry file: flask-taskr-with-blueprint/project/__init__.py
-Scanned: 2016-10-25 23:19:45.877655
-No vulnerabilities found.
-
-
-austinbrovick/flask-book_review_website
-https://github.com/austinbrovick/flask-book_review_website
-Entry file: flask-book_review_website/app/models/User.py
-Scanned: 2016-10-25 23:19:47.327127
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-oscarvazquez/flask_mysql_migrations
-https://github.com/oscarvazquez/flask_mysql_migrations
-Entry file: None
-Scanned: 2016-10-25 23:19:50.873158
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bethesdamd/python_flask_pharma
-https://github.com/bethesdamd/python_flask_pharma
-Entry file: python_flask_pharma/app.py
-Scanned: 2016-10-25 23:19:52.853090
-No vulnerabilities found.
-
-
-billdwalters/Flask
-https://github.com/billdwalters/Flask
-Entry file: None
-Scanned: 2016-10-25 23:19:54.884694
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rlsharpton/flask
-https://github.com/rlsharpton/flask
-Entry file: None
-Scanned: 2016-10-25 23:19:55.396725
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ccapudev/flask
-https://github.com/ccapudev/flask
-Entry file: None
-Scanned: 2016-10-25 23:19:58.458974
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hezx/flask
-https://github.com/hezx/flask
-Entry file: None
-Scanned: 2016-10-25 23:19:59.993110
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-its-dirg/Flask-pyoidc
-https://github.com/its-dirg/Flask-pyoidc
-Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py
-Scanned: 2016-10-25 23:20:03.080923
-No vulnerabilities found.
-
-
-NJIT-SIG-WEBDEV/flask-intro
-https://github.com/NJIT-SIG-WEBDEV/flask-intro
-Entry file: flask-intro/Session1/app.py
-Scanned: 2016-10-25 23:20:04.526181
-No vulnerabilities found.
-
-
-KDmytro/flasktaskr
-https://github.com/KDmytro/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:20:05.105708
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dreamtiger2016/flaskr
-https://github.com/dreamtiger2016/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:20:12.672105
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dreamtiger2016/flaskr.
-
-karanj112294/flasktutorial
-https://github.com/karanj112294/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 23:20:14.192597
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/karanj112294/flasktutorial.
-
-chadelder/flasktaskr
-https://github.com/chadelder/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:20:15.704239
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jocelynaladin/flaskworkspace
-https://github.com/jocelynaladin/flaskworkspace
-Entry file: flaskworkspace/__init__.py
-Scanned: 2016-10-25 23:20:21.123720
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-davetromp/flasksqlapi
-https://github.com/davetromp/flasksqlapi
-Entry file: flasksqlapi/runapi.py
-Scanned: 2016-10-25 23:20:22.697295
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-xu00wei/flasky
-https://github.com/xu00wei/flasky
-Entry file: None
-Scanned: 2016-10-25 23:20:23.210569
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zzclynn/flaskr
-https://github.com/zzclynn/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:20:23.724980
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zzclynn/flaskr.
-
-psykos/flaskloginskeleton
-https://github.com/psykos/flaskloginskeleton
-Entry file: flaskloginskeleton/app/__init__.py
-Scanned: 2016-10-25 23:20:25.079028
-No vulnerabilities found.
-
-
-AndrewGoldstein/flaskapp
-https://github.com/AndrewGoldstein/flaskapp
-Entry file: None
-Scanned: 2016-10-25 23:20:25.590589
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp.
-
-JamesMilnerUK/Loxo
-https://github.com/JamesMilnerUK/Loxo
-Entry file: Loxo/loxoapi.py
-Scanned: 2016-10-25 23:20:42.353657
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-nescode/punchstarter
-https://github.com/nescode/punchstarter
-Entry file: punchstarter/punchstarter/__init__.py
-Scanned: 2016-10-25 23:20:43.789924
-Vulnerability 1:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 31, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 36, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550)
- File: punchstarter/punchstarter/__init__.py
- > Line 43: image_filename = uploaded_image['public_id']
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 45, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 31, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 36, trigger word "files[":
- cover_photo = request.files['cover_photo']
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550)
- File: punchstarter/punchstarter/__init__.py
- > Line 43: image_filename = uploaded_image['public_id']
- File: punchstarter/punchstarter/__init__.py
- > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 6:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 45, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: punchstarter/punchstarter/__init__.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: punchstarter/punchstarter/__init__.py
- > reaches line 60, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 7:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 64, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 8:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 77, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 9:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 93, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 10:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 72, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: punchstarter/punchstarter/__init__.py
- > reaches line 93, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 11:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 97, trigger word "get(":
- query = request.args.get('q') or ''
-File: punchstarter/punchstarter/__init__.py
- > reaches line 98, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 12:
-File: punchstarter/punchstarter/__init__.py
- > User input at line 97, trigger word "get(":
- query = request.args.get('q') or ''
-File: punchstarter/punchstarter/__init__.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count)
-
-
-
-edwardszczepanski/FlaskApplication
-https://github.com/edwardszczepanski/FlaskApplication
-Entry file: FlaskApplication/app.py
-Scanned: 2016-10-25 23:20:47.208035
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskApplication/venv/lib/python2.7/sre_compile.py
-
-AllyW/flaskyDeb
-https://github.com/AllyW/flaskyDeb
-Entry file: flaskyDeb/app/__init__.py
-Scanned: 2016-10-25 23:20:49.179464
-Vulnerability 1:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskyDeb/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 55: posts = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskyDeb/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 45: show_followed = False
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskyDeb/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 67: posts = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flaskyDeb/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskyDeb/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 134: comments = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskyDeb/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flaskyDeb/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flaskyDeb/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flaskyDeb/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 246: comments = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-chrismontone/flasktaskr2
-https://github.com/chrismontone/flasktaskr2
-Entry file: flasktaskr2/project/__init__.py
-Scanned: 2016-10-25 23:20:50.839800
-No vulnerabilities found.
-
-
-jgabrielfreitas/FlaskFirebase
-https://github.com/jgabrielfreitas/FlaskFirebase
-Entry file: FlaskFirebase/runner.py
-Scanned: 2016-10-25 23:20:52.142579
-No vulnerabilities found.
-
-
-scarabcoder/FlaskSite
-https://github.com/scarabcoder/FlaskSite
-Entry file: FlaskSite/app/__init__.py
-Scanned: 2016-10-25 23:20:53.770298
-No vulnerabilities found.
-
-
-musicalfish/FlaskApp
-https://github.com/musicalfish/FlaskApp
-Entry file: FlaskApp/FlaskApp/__init__.py
-Scanned: 2016-10-25 23:20:55.091360
-No vulnerabilities found.
-
-
-oscarmeanwell/FlaskMusic
-https://github.com/oscarmeanwell/FlaskMusic
-Entry file: FlaskMusic/app/routesun.py
-Scanned: 2016-10-25 23:20:57.879253
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-TwilioDevEd/eta-notifications-flask
-https://github.com/TwilioDevEd/eta-notifications-flask
-Entry file: eta-notifications-flask/eta_notifications_flask/__init__.py
-Scanned: 2016-10-25 23:21:00.992912
-Vulnerability 1:
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > User input at line 29, trigger word "get(":
- order = Order.query.get(order_id)
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > reaches line 31, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order)
-
-Vulnerability 2:
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > User input at line 63, trigger word "get(":
- order = Order.query.get(order_id)
-File: eta-notifications-flask/eta_notifications_flask/views.py
- > reaches line 67, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order)
-
-
-
-johnsliao/flask-sqlite3-chartjs-toy
-https://github.com/johnsliao/flask-sqlite3-chartjs-toy
-Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py
-Scanned: 2016-10-25 23:21:02.668942
-No vulnerabilities found.
-
-
-QsBBQ/flask_test
-https://github.com/QsBBQ/flask_test
-Entry file: flask_test/flask_test.py
-Scanned: 2016-10-25 23:21:04.024232
-Vulnerability 1:
-File: flask_test/flask_test.py
- > User input at line 18, trigger word "get(":
- age = ages.get(user)
-File: flask_test/flask_test.py
- > reaches line 19, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users.html',user=user, age=age)
-
-
-
-pedrocarvalhodev/flask-intro
-https://github.com/pedrocarvalhodev/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-25 23:21:05.578688
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lawrencexia/flask_notecards
-https://github.com/lawrencexia/flask_notecards
-Entry file: flask_notecards/app/__init__.py
-Scanned: 2016-10-25 23:21:06.931580
-No vulnerabilities found.
-
-
-ameya0909/Flask-Blog
-https://github.com/ameya0909/Flask-Blog
-Entry file: Flask-Blog/__init__.py
-Scanned: 2016-10-25 23:21:08.234087
-No vulnerabilities found.
-
-
-chrismontone/flask-blog
-https://github.com/chrismontone/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:21:08.762129
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ziggear/wechat-flask
-https://github.com/ziggear/wechat-flask
-Entry file: wechat-flask/src/myapp.py
-Scanned: 2016-10-25 23:21:10.197152
-No vulnerabilities found.
-
-
-yetship/flask-usages
-https://github.com/yetship/flask-usages
-Entry file: flask-usages/application/__init__.py
-Scanned: 2016-10-25 23:21:11.614704
-Vulnerability 1:
-File: flask-usages/application/controllers/todo.py
- > User input at line 12, trigger word "get(":
- todo_id = request.args.get('todo_id')
-Reassigned in:
- File: flask-usages/application/controllers/todo.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify()
-File: flask-usages/application/controllers/todo.py
- > reaches line 15, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content)
-
-Vulnerability 2:
-File: flask-usages/application/controllers/todo.py
- > User input at line 21, trigger word "get(":
- todo = Todo(content=data.get('content'))
-File: flask-usages/application/controllers/todo.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content)
-
-
-
-drmalex07/flask-helloworld
-https://github.com/drmalex07/flask-helloworld
-Entry file: flask-helloworld/helloworld/app.py
-Scanned: 2016-10-25 23:21:13.187911
-No vulnerabilities found.
-
-
-Oracleli/flask-try
-https://github.com/Oracleli/flask-try
-Entry file: None
-Scanned: 2016-10-25 23:21:15.953471
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Oracleli/flask-try.
-
-al4/flask-tokenauth
-https://github.com/al4/flask-tokenauth
-Entry file: flask-tokenauth/example.py
-Scanned: 2016-10-25 23:21:17.253589
-No vulnerabilities found.
-
-
-marcosomma/first_flask
-https://github.com/marcosomma/first_flask
-Entry file: first_flask/app/__init__.py
-Scanned: 2016-10-25 23:21:19.689501
-No vulnerabilities found.
-
-
-miracleluchen/blog-flask
-https://github.com/miracleluchen/blog-flask
-Entry file: blog-flask/server.py
-Scanned: 2016-10-25 23:21:20.996461
-No vulnerabilities found.
-
-
-meyersj/bootstrap-flask
-https://github.com/meyersj/bootstrap-flask
-Entry file: bootstrap-flask/app/__init__.py
-Scanned: 2016-10-25 23:21:23.286920
-No vulnerabilities found.
-
-
-sharma-mohit/flask-mongo
-https://github.com/sharma-mohit/flask-mongo
-Entry file: flask-mongo/mainapp/__init__.py
-Scanned: 2016-10-25 23:21:25.252249
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jarogers095/flask-blog
-https://github.com/jarogers095/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:21:25.799380
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Jelly-Yu/learningFlask
-https://github.com/Jelly-Yu/learningFlask
-Entry file: learningFlask/app/__init__.py
-Scanned: 2016-10-25 23:21:27.207361
-No vulnerabilities found.
-
-
-doobeh/flask-lister
-https://github.com/doobeh/flask-lister
-Entry file: flask-lister/app/core.py
-Scanned: 2016-10-25 23:21:36.620643
-No vulnerabilities found.
-
-
-ratherbsurfing/flask-cms
-https://github.com/ratherbsurfing/flask-cms
-Entry file: None
-Scanned: 2016-10-25 23:21:49.359354
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-philtrep/Flask-Skeleton
-https://github.com/philtrep/Flask-Skeleton
-Entry file: None
-Scanned: 2016-10-25 23:21:51.211074
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/philtrep/Flask-Skeleton.
-
-cynrick/kickstarter-flask
-https://github.com/cynrick/kickstarter-flask
-Entry file: kickstarter-flask/kickstarter/__init__.py
-Scanned: 2016-10-25 23:21:52.629108
-Vulnerability 1:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 29, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 2:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 32, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 3:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 29, trigger word "get(":
- time_end = request.form.get('funding_end_date')
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d')
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 4:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 32, trigger word "get(":
- new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 46, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id))
-
-Vulnerability 5:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 50, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project)
-
-Vulnerability 6:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 59, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 65, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project)
-
-Vulnerability 7:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 59, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 79, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 8:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 59, trigger word "get(":
- project = db.session.query(Project).get(project_id)
-Reassigned in:
- File: kickstarter-flask/kickstarter/__init__.py
- > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now())
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 79, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id))
-
-Vulnerability 9:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 83, trigger word "get(":
- query = request.args.get('q') or ''
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 84, trigger word "filter(":
- projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all()
-
-Vulnerability 10:
-File: kickstarter-flask/kickstarter/__init__.py
- > User input at line 83, trigger word "get(":
- query = request.args.get('q') or ''
-File: kickstarter-flask/kickstarter/__init__.py
- > reaches line 92, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count)
-
-
-
-kessiacastro/flask-blog
-https://github.com/kessiacastro/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:21:53.167171
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rjturek/flask-etf
-https://github.com/rjturek/flask-etf
-Entry file: flask-etf/flask_etf_main.py
-Scanned: 2016-10-25 23:21:54.448142
-No vulnerabilities found.
-
-
-worthlesspenny7/tumblelogFlask
-https://github.com/worthlesspenny7/tumblelogFlask
-Entry file: tumblelogFlask/__init__.py
-Scanned: 2016-10-25 23:21:55.756823
-No vulnerabilities found.
-
-
-axontrust/alexa-flask
-https://github.com/axontrust/alexa-flask
-Entry file: alexa-flask/app/__init__.py
-Scanned: 2016-10-25 23:21:57.056707
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-asjedh/flask_tutorial
-https://github.com/asjedh/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:21:57.625126
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/asjedh/flask_tutorial.
-
-robb216/MyFlask
-https://github.com/robb216/MyFlask
-Entry file: MyFlask/MyFlask.py
-Scanned: 2016-10-25 23:22:00.072074
-No vulnerabilities found.
-
-
-rogerpence/flask-blueprint
-https://github.com/rogerpence/flask-blueprint
-Entry file: flask-blueprint/application/__init__.py
-Scanned: 2016-10-25 23:22:02.794734
-No vulnerabilities found.
-
-
-androidzhibinw/flask-bootstrap
-https://github.com/androidzhibinw/flask-bootstrap
-Entry file: flask-bootstrap/app/__init__.py
-Scanned: 2016-10-25 23:22:04.489653
-No vulnerabilities found.
-
-
-ytanno/PlotFlask
-https://github.com/ytanno/PlotFlask
-Entry file: PlotFlask/FlaskTest1/FlaskTest1/__init__.py
-Scanned: 2016-10-25 23:22:11.161986
-No vulnerabilities found.
-
-
-psykos/psilex-flask
-https://github.com/psykos/psilex-flask
-Entry file: psilex-flask/app/__init__.py
-Scanned: 2016-10-25 23:22:12.600346
-No vulnerabilities found.
-
-
-Hank02/flask_example
-https://github.com/Hank02/flask_example
-Entry file: flask_example/hello_world.py
-Scanned: 2016-10-25 23:22:16.390902
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-VerdigrisReader/flask-workshop
-https://github.com/VerdigrisReader/flask-workshop
-Entry file: flask-workshop/app/__init__.py
-Scanned: 2016-10-25 23:22:18.077424
-No vulnerabilities found.
-
-
-rogerpence/flask-skeleton
-https://github.com/rogerpence/flask-skeleton
-Entry file: flask-skeleton/application/__init__.py
-Scanned: 2016-10-25 23:22:19.514526
-No vulnerabilities found.
-
-
-rodcox89/FlaskDynamoStarterKit
-https://github.com/rodcox89/FlaskDynamoStarterKit
-Entry file: FlaskDynamoStarterKit/main.py
-Scanned: 2016-10-25 23:22:24.564538
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskDynamoStarterKit/venv/lib/python2.7/sre_compile.py
-
-pulysak/FlaskServer-Tests
-https://github.com/pulysak/FlaskServer-Tests
-Entry file: FlaskServer-Tests/server.py
-Scanned: 2016-10-25 23:22:28.859536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskServer-Tests/flask_env/lib/python2.7/sre_compile.py
-
-rbtoner/FlaskWebApp
-https://github.com/rbtoner/FlaskWebApp
-Entry file: FlaskWebApp/FanGuardFlask/__init__.py
-Scanned: 2016-10-25 23:22:30.997707
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-worthlesspenny7/FlaskYoutubeTutorial
-https://github.com/worthlesspenny7/FlaskYoutubeTutorial
-Entry file: FlaskYoutubeTutorial/application.py
-Scanned: 2016-10-25 23:22:34.305130
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/sre_compile.py
-
-MGago/flaskBasicApp1
-https://github.com/MGago/flaskBasicApp1
-Entry file: flaskBasicApp1/app/__init__.py
-Scanned: 2016-10-25 23:22:42.819224
-No vulnerabilities found.
-
-
-skpdvidby0/Flask-Python-App
-https://github.com/skpdvidby0/Flask-Python-App
-Entry file: Flask-Python-App/flaskapp.py
-Scanned: 2016-10-25 23:22:46.054431
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Python-App/virtenv/lib/python2.7/sre_compile.py
-
-sindhus/flask-mega-tutorial
-https://github.com/sindhus/flask-mega-tutorial
-Entry file: None
-Scanned: 2016-10-25 23:22:48.342250
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flask-mega-tutorial.
-
-mbreisch/real-python-flask-bdd
-https://github.com/mbreisch/real-python-flask-bdd
-Entry file: real-python-flask-bdd/flaskr.py
-Scanned: 2016-10-25 23:22:50.172043
-No vulnerabilities found.
-
-
-MuriloFerraz/intel_edison_flask
-https://github.com/MuriloFerraz/intel_edison_flask
-Entry file: intel_edison_flask/flask_example/contole.py
-Scanned: 2016-10-25 23:22:51.570868
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-PiyushGoyal443/studentLogin_API_Flask
-https://github.com/PiyushGoyal443/studentLogin_API_Flask
-Entry file: studentLogin_API_Flask/server.py
-Scanned: 2016-10-25 23:22:53.480265
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-GertjanvanhetHof/helloworld_with_flask
-https://github.com/GertjanvanhetHof/helloworld_with_flask
-Entry file: helloworld_with_flask/mypython.py
-Scanned: 2016-10-25 23:22:54.806519
-No vulnerabilities found.
-
-
-taromurao/flask-python-logger-experiment
-https://github.com/taromurao/flask-python-logger-experiment
-Entry file: flask-python-logger-experiment/app.py
-Scanned: 2016-10-25 23:22:56.105054
-No vulnerabilities found.
-
-
-mikicaivosevic/flask-simple-todo
-https://github.com/mikicaivosevic/flask-simple-todo
-Entry file: flask-simple-todo/app.py
-Scanned: 2016-10-25 23:22:57.342807
-No vulnerabilities found.
-
-
-KDmytro/flask-hello-world
-https://github.com/KDmytro/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:22:57.881971
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bepetersn/flask-permissions-ex
-https://github.com/bepetersn/flask-permissions-ex
-Entry file: flask-permissions-ex/ex/__init__.py
-Scanned: 2016-10-25 23:22:59.844703
-No vulnerabilities found.
-
-
-EricSchles/db_migrations_flask
-https://github.com/EricSchles/db_migrations_flask
-Entry file: db_migrations_flask/app/__init__.py
-Scanned: 2016-10-25 23:23:02.243067
-No vulnerabilities found.
-
-
-yyssjj33/flask-menu-application
-https://github.com/yyssjj33/flask-menu-application
-Entry file: flask-menu-application/project.py
-Scanned: 2016-10-25 23:23:03.708857
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-androidzhibinw/flask-app-builder-example
-https://github.com/androidzhibinw/flask-app-builder-example
-Entry file: flask-app-builder-example/myapp/app/__init__.py
-Scanned: 2016-10-25 23:23:05.597806
-No vulnerabilities found.
-
-
-jmcevoy1984/Flask-Restful-Tutorial
-https://github.com/jmcevoy1984/Flask-Restful-Tutorial
-Entry file: Flask-Restful-Tutorial/app.py
-Scanned: 2016-10-25 23:23:06.924535
-No vulnerabilities found.
-
-
-kessiacastro/flask-hello-world
-https://github.com/kessiacastro/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:23:07.529510
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tim1978/flask-hello-world
-https://github.com/tim1978/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:23:12.067859
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jigen7/python_flask_tutorial
-https://github.com/jigen7/python_flask_tutorial
-Entry file: python_flask_tutorial/app/__init__.py
-Scanned: 2016-10-25 23:23:20.022458
-No vulnerabilities found.
-
-
-danieltl/python_flask_final
-https://github.com/danieltl/python_flask_final
-Entry file: python_flask_final/application.py
-Scanned: 2016-10-25 23:23:21.462480
-No vulnerabilities found.
-
-
-devizier/flask-hello-world
-https://github.com/devizier/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:23:22.003281
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tomov/flask-location-survey-psych
-https://github.com/tomov/flask-location-survey-psych
-Entry file: flask-location-survey-psych/app/__init__.py
-Scanned: 2016-10-25 23:23:23.418045
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-rakou1986/flask-mvt-min
-https://github.com/rakou1986/flask-mvt-min
-Entry file: flask-mvt-min/webapp/app.py
-Scanned: 2016-10-25 23:23:24.698771
-No vulnerabilities found.
-
-
-mbreisch/real-python-reverse-flask
-https://github.com/mbreisch/real-python-reverse-flask
-Entry file: None
-Scanned: 2016-10-25 23:23:26.013491
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mbreisch/real-python-reverse-flask.
-
-jeet4320/PythonFlask-IBMBluemix
-https://github.com/jeet4320/PythonFlask-IBMBluemix
-Entry file: PythonFlask-IBMBluemix/welcome.py
-Scanned: 2016-10-25 23:23:33.120885
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-junniepat/Python-flask-app
-https://github.com/junniepat/Python-flask-app
-Entry file: Python-flask-app/app.py
-Scanned: 2016-10-25 23:23:34.501674
-No vulnerabilities found.
-
-
-Kwpolska/flask-demo-app
-https://github.com/Kwpolska/flask-demo-app
-Entry file: flask-demo-app/flaskapp.py
-Scanned: 2016-10-25 23:23:35.799200
-No vulnerabilities found.
-
-
-tiangolo/uwsgi-nginx-flask-docker
-https://github.com/tiangolo/uwsgi-nginx-flask-docker
-Entry file: uwsgi-nginx-flask-docker/example-flask-index-upload/app/main.py
-Scanned: 2016-10-25 23:23:48.157201
-No vulnerabilities found.
-
-
-chrisvasey/flask
-https://github.com/chrisvasey/flask
-Entry file: None
-Scanned: 2016-10-25 23:23:49.172727
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bobdorff/flask
-https://github.com/bobdorff/flask
-Entry file: None
-Scanned: 2016-10-25 23:23:49.694584
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rlsharpton/flask
-https://github.com/rlsharpton/flask
-Entry file: None
-Scanned: 2016-10-25 23:23:51.235023
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wildjan/Flask
-https://github.com/wildjan/Flask
-Entry file: None
-Scanned: 2016-10-25 23:23:52.830044
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-smltc/Flask
-https://github.com/smltc/Flask
-Entry file: None
-Scanned: 2016-10-25 23:23:54.350825
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mikelkl/flasky
-https://github.com/mikelkl/flasky
-Entry file: None
-Scanned: 2016-10-25 23:23:55.862088
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-besimaltnok/Flask-Examples
-https://github.com/besimaltnok/Flask-Examples
-Entry file: Flask-Examples/fileupload.py
-Scanned: 2016-10-25 23:23:58.782713
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-luo-jialin/flask-
-https://github.com/luo-jialin/flask-
-Entry file: flask-/flaskr.py
-Scanned: 2016-10-25 23:24:00.198973
-No vulnerabilities found.
-
-
-MLH/my-mlh-flask-example
-https://github.com/MLH/my-mlh-flask-example
-Entry file: my-mlh-flask-example/app.py
-Scanned: 2016-10-25 23:24:02.405295
-No vulnerabilities found.
-
-
-ubbochum/hb2_flask
-https://github.com/ubbochum/hb2_flask
-Entry file: hb2_flask/hb2_flask.py
-Scanned: 2016-10-25 23:24:04.758101
-Vulnerability 1:
-File: hb2_flask/hb2_flask.py
- > User input at line 362, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 369: index_solr = Solr(start=page - 1 * 10, query=current_user.email, facet='false')
- File: hb2_flask/hb2_flask.py
- > Line 372: records = index_solr.results
- File: hb2_flask/hb2_flask.py
- > Line 376: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 379: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 361: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 363: records = []
- File: hb2_flask/hb2_flask.py
- > Line 365: index_solr = ''
- File: hb2_flask/hb2_flask.py
- > Line 366: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 380, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',header=lazy_gettext('Home'), site=theme(request.access_route), numFound=num_found, records=records, pagination=pagination, offset=mystart - 1)
-
-Vulnerability 2:
-File: hb2_flask/hb2_flask.py
- > User input at line 416, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 417: duplicates_solr = Solr(start=page - 1 * 10, fquery=['dedupid:[* TO *]'], group='true', group_field='dedupid', group_limit=100, facet='false')
- File: hb2_flask/hb2_flask.py
- > Line 424: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('duplicate groups'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 427: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 415: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 423: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 428, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('duplicates.html',groups=duplicates_solr.results, pagination=pagination, header=lazy_gettext('Duplicates'), site=theme(request.access_route), offset=mystart - 1)
-
-Vulnerability 3:
-File: hb2_flask/hb2_flask.py
- > User input at line 433, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons'))
- File: hb2_flask/hb2_flask.py
- > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 434: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 446, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now())
-
-Vulnerability 4:
-File: hb2_flask/hb2_flask.py
- > User input at line 433, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons'))
- File: hb2_flask/hb2_flask.py
- > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 434: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 455, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), del_redirect='persons')
-
-Vulnerability 5:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 6:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 7:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 8:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 9:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 10:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 490, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype')))
-
-Vulnerability 11:
-File: hb2_flask/hb2_flask.py
- > User input at line 472, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 471: pagination = ''
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 12:
-File: hb2_flask/hb2_flask.py
- > User input at line 474, trigger word "get(":
- query = request.args.get('q', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 477: query = '*:*'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 13:
-File: hb2_flask/hb2_flask.py
- > User input at line 480, trigger word "get(":
- sorting = request.args.get('sort', '')
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 482: sorting = ''
- File: hb2_flask/hb2_flask.py
- > Line 484: sorting = 'fdate desc'
- File: hb2_flask/hb2_flask.py
- > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS)
- File: hb2_flask/hb2_flask.py
- > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 499, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery)
-
-Vulnerability 14:
-File: hb2_flask/hb2_flask.py
- > User input at line 742, trigger word "get(":
- bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json()
-File: hb2_flask/hb2_flask.py
- > reaches line 744, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value')))
-
-Vulnerability 15:
-File: hb2_flask/hb2_flask.py
- > User input at line 749, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 787: dashboard_solr = Solr(start=page - 1 * 10, query=query, sort='recordCreationDate asc', json_facet=DASHBOARD_FACETS, fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 795: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 798: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 750: mystart = 0
- File: hb2_flask/hb2_flask.py
- > Line 791: pagination = ''
-File: hb2_flask/hb2_flask.py
- > reaches line 801, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('dashboard.html',records=dashboard_solr.results, facet_data=dashboard_solr.facets, header=lazy_gettext('Dashboard'), site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), target='dashboard', del_redirect='dashboard')
-
-Vulnerability 16:
-File: hb2_flask/hb2_flask.py
- > User input at line 826, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 827: locked_solr = Solr(core='hb2', fquery=['locked:true', 'recordChangeDate:[* TO NOW-1HOUR]'], sort='recordChangeDate asc', start=page - 1 * 10)
- File: hb2_flask/hb2_flask.py
- > Line 831: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('records'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 834: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 824: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage'))
-File: hb2_flask/hb2_flask.py
- > reaches line 841, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('superadmin.html',locked_records=locked_solr.results, header=lazy_gettext('Superadmin Board'), import_records=solr_dumps.results, offset=mystart - 1, pagination=pagination, del_redirect='superadmin', form=form, site=theme(request.access_route))
-
-Vulnerability 17:
-File: hb2_flask/hb2_flask.py
- > User input at line 912, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units'))
- File: hb2_flask/hb2_flask.py
- > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 913: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 925, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now())
-
-Vulnerability 18:
-File: hb2_flask/hb2_flask.py
- > User input at line 912, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery)
- File: hb2_flask/hb2_flask.py
- > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units'))
- File: hb2_flask/hb2_flask.py
- > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page
- File: hb2_flask/hb2_flask.py
- > Line 913: mystart = 0
-File: hb2_flask/hb2_flask.py
- > reaches line 933, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now())
-
-Vulnerability 19:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1110, trigger word "replace(":
- solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z')
-
-Vulnerability 20:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1112, trigger word "replace(":
- solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z')
-
-Vulnerability 21:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype)
-
-Vulnerability 22:
-File: hb2_flask/hb2_flask.py
- > User input at line 1095, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1103: wtf = json.dumps(form.data)
- File: hb2_flask/hb2_flask.py
- > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200)
-File: hb2_flask/hb2_flask.py
- > reaches line 1160, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data)
-
-Vulnerability 23:
-File: hb2_flask/hb2_flask.py
- > User input at line 1167, trigger word "get(":
- is_part_of = show_record_solr.results[0].get('is_part_of')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 24:
-File: hb2_flask/hb2_flask.py
- > User input at line 1168, trigger word "get(":
- has_part = show_record_solr.results[0].get('has_part')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 25:
-File: hb2_flask/hb2_flask.py
- > User input at line 1169, trigger word "get(":
- other_version = show_record_solr.results[0].get('other_version')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 26:
-File: hb2_flask/hb2_flask.py
- > User input at line 1171, trigger word "get(":
- thedata = json.loads(show_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1173: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 27:
-File: hb2_flask/hb2_flask.py
- > User input at line 1172, trigger word "get(":
- locked = show_record_solr.results[0].get('locked')
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 28:
-File: hb2_flask/hb2_flask.py
- > User input at line 1173, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1175, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version)
-
-Vulnerability 29:
-File: hb2_flask/hb2_flask.py
- > User input at line 1189, trigger word "get(":
- thedata = json.loads(show_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1190: form = PersonAdminForm.from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1192, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('name'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=person_id, pubtype='person', del_redirect='persons')
-
-Vulnerability 30:
-File: hb2_flask/hb2_flask.py
- > User input at line 1200, trigger word "get(":
- thedata = json.loads(show_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1201: form = OrgaAdminForm.from_json(thedata)
-File: hb2_flask/hb2_flask.py
- > reaches line 1203, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('pref_label'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=orga_id, pubtype='organisation', del_redirect='organisations')
-
-Vulnerability 31:
-File: hb2_flask/hb2_flask.py
- > User input at line 1213, trigger word "get(":
- thedata = json.loads(edit_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1218: form = OrgaAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas'))
- File: hb2_flask/hb2_flask.py
- > Line 1216: form = OrgaAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1223, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update')
-
-Vulnerability 32:
-File: hb2_flask/hb2_flask.py
- > User input at line 1213, trigger word "get(":
- thedata = json.loads(edit_orga_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1218: form = OrgaAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas'))
- File: hb2_flask/hb2_flask.py
- > Line 1216: form = OrgaAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1231, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(orga)s',orga=form.data.get('pref_label')), site=theme(request.access_route), action='https://github.com/update', pubtype='organisation')
-
-Vulnerability 33:
-File: hb2_flask/hb2_flask.py
- > User input at line 1242, trigger word "get(":
- thedata = json.loads(edit_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1247: form = PersonAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons'))
- File: hb2_flask/hb2_flask.py
- > Line 1245: form = PersonAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1253, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update')
-
-Vulnerability 34:
-File: hb2_flask/hb2_flask.py
- > User input at line 1242, trigger word "get(":
- thedata = json.loads(edit_person_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1247: form = PersonAdminForm.from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons'))
- File: hb2_flask/hb2_flask.py
- > Line 1245: form = PersonAdminForm()
-File: hb2_flask/hb2_flask.py
- > reaches line 1261, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(person)s',person=form.data.get('name')), site=theme(request.access_route), action='https://github.com/update', pubtype='person')
-
-Vulnerability 35:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 36:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 37:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1299, trigger word "flash(":
- flash(Markup(lazy_gettext('
The following data are incompatible with this publication type
')) + _diff_struct(thedata, form.data), 'error')
-
-Vulnerability 38:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 39:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 40:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1310, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype)
-
-Vulnerability 41:
-File: hb2_flask/hb2_flask.py
- > User input at line 1286, trigger word "get(":
- thedata = json.loads(edit_record_solr.results[0].get('wtf_json'))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 42:
-File: hb2_flask/hb2_flask.py
- > User input at line 1289, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype)()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 43:
-File: hb2_flask/hb2_flask.py
- > User input at line 1291, trigger word "get(":
- form = PUBTYPE2FORM.get(pubtype).from_json(thedata)
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1289: form = PUBTYPE2FORM.get(pubtype)()
- File: hb2_flask/hb2_flask.py
- > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard'))
-File: hb2_flask/hb2_flask.py
- > reaches line 1321, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id)
-
-Vulnerability 44:
-File: hb2_flask/hb2_flask.py
- > User input at line 1491, trigger word "form[":
- target = request.form['next']
-File: hb2_flask/hb2_flask.py
- > reaches line 1493, trigger word "url_for(":
- target = url_for(endpoint,values)
-
-Vulnerability 45:
-File: hb2_flask/hb2_flask.py
- > User input at line 1491, trigger word "form[":
- target = request.form['next']
-File: hb2_flask/hb2_flask.py
- > reaches line 1494, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(target)
-
-Vulnerability 46:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 47:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 48:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 49:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1532, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 50:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 51:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 52:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 53:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1565, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage'))
-
-Vulnerability 54:
-File: hb2_flask/hb2_flask.py
- > User input at line 1505, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1571: next = get_redirect_target()
-File: hb2_flask/hb2_flask.py
- > reaches line 1573, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route))
-
-Vulnerability 55:
-File: hb2_flask/hb2_flask.py
- > User input at line 1571, trigger word "get(":
- next = get_redirect_target()
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1505: next = get_redirect_target()
- File: hb2_flask/hb2_flask.py
- > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login')
- File: hb2_flask/hb2_flask.py
- > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login')
-File: hb2_flask/hb2_flask.py
- > reaches line 1573, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route))
-
-Vulnerability 56:
-File: hb2_flask/hb2_flask.py
- > User input at line 1627, trigger word "get(":
- page = int(request.args.get('page', 1))
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1628: solr_dumps = Solr(core='hb2_users', query='id:*.json', facet='false', start=page - 1 * 10)
- File: hb2_flask/hb2_flask.py
- > Line 1631: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('dumps'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}'))
- File: hb2_flask/hb2_flask.py
- > Line 1634: mystart = 1 + pagination.page - 1 * pagination.per_page
-File: hb2_flask/hb2_flask.py
- > reaches line 1636, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('solr_dumps.html',records=solr_dumps.results, offset=mystart - 1, pagination=pagination, header=lazy_gettext('Import Dump'), del_redirect='import/solr_dumps', form=form)
-
-Vulnerability 57:
-File: hb2_flask/hb2_flask.py
- > User input at line 1652, trigger word "get(":
- thedata = json.loads(import_solr.results[0].get('dump')[0])
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1645: thedata = ''
- File: hb2_flask/hb2_flask.py
- > Line 1656: thedata = json.loads(form.file.data.stream.read())
-File: hb2_flask/hb2_flask.py
- > reaches line 1665, trigger word "flash(":
- flash('%s records imported!' % len(thedata), 'success')
-
-Vulnerability 58:
-File: hb2_flask/hb2_flask.py
- > User input at line 1656, trigger word ".data":
- thedata = json.loads(form.file.data.stream.read())
-Reassigned in:
- File: hb2_flask/hb2_flask.py
- > Line 1645: thedata = ''
- File: hb2_flask/hb2_flask.py
- > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0])
-File: hb2_flask/hb2_flask.py
- > reaches line 1665, trigger word "flash(":
- flash('%s records imported!' % len(thedata), 'success')
-
-Vulnerability 59:
-File: hb2_flask/processors/mods_parser.py
- > User input at line 123, trigger word "get(":
- pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '')
-Reassigned in:
- File: hb2_flask/processors/mods_parser.py
- > Line 120: pnd = ''
-File: hb2_flask/processors/mods_parser.py
- > reaches line 123, trigger word "replace(":
- pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '')
-
-
-
-Vertabelo/flask-oauth-demo-app
-https://github.com/Vertabelo/flask-oauth-demo-app
-Entry file: flask-oauth-demo-app/models.py
-Scanned: 2016-10-25 23:24:07.407556
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-waharnum/inlibraries.com
-https://github.com/waharnum/inlibraries.com
-Entry file: None
-Scanned: 2016-10-25 23:24:07.951437
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-billyfung/flask_shortener
-https://github.com/billyfung/flask_shortener
-Entry file: flask_shortener/app.py
-Scanned: 2016-10-25 23:24:09.369681
-Vulnerability 1:
-File: flask_shortener/app.py
- > User input at line 41, trigger word "form[":
- url_to_parse = request.form['input-url']
-Reassigned in:
- File: flask_shortener/app.py
- > Line 42: parts = urlparse.urlparse(url_to_parse)
- File: flask_shortener/app.py
- > Line 47: short_id = shorten(url_to_parse)
-File: flask_shortener/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id)
-
-Vulnerability 2:
-File: flask_shortener/app.py
- > User input at line 52, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(link_target)
-
-Vulnerability 3:
-File: flask_shortener/app.py
- > User input at line 60, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-Vulnerability 4:
-File: flask_shortener/app.py
- > User input at line 63, trigger word "get(":
- click_count = int(redis.get('click-count:' + short_id) or 0)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-
-
-jarogers095/flasktaskr
-https://github.com/jarogers095/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:24:10.415966
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Anddor/flaskr
-https://github.com/Anddor/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:24:14.444205
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Anddor/flaskr.
-
-hammygoonan/Flaskify
-https://github.com/hammygoonan/Flaskify
-Entry file: Flaskify/project/__init__.py
-Scanned: 2016-10-25 23:24:21.990556
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-anujspatel/flaskr
-https://github.com/anujspatel/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:24:22.523946
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/anujspatel/flaskr.
-
-williamcaban/flaskrcloud
-https://github.com/williamcaban/flaskrcloud
-Entry file: flaskrcloud/flaskr.py
-Scanned: 2016-10-25 23:24:23.930061
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-crazyqipython/flaskdemo
-https://github.com/crazyqipython/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 23:24:24.471372
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pythondude325/flaskr
-https://github.com/pythondude325/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:24:25.995501
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pythondude325/flaskr.
-
-fenske/flasky
-https://github.com/fenske/flasky
-Entry file: None
-Scanned: 2016-10-25 23:24:30.507509
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fakegit/flasky
-https://github.com/fakegit/flasky
-Entry file: None
-Scanned: 2016-10-25 23:24:34.019401
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zzclynn/flaskr
-https://github.com/zzclynn/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:24:45.052942
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zzclynn/flaskr.
-
-johnpwillman/flasktest
-https://github.com/johnpwillman/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 23:24:48.351511
-No vulnerabilities found.
-
-
-scottmarinoff/Flasky
-https://github.com/scottmarinoff/Flasky
-Entry file: None
-Scanned: 2016-10-25 23:24:48.875448
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/scottmarinoff/Flasky.
-
-JamesMilnerUK/Loxo
-https://github.com/JamesMilnerUK/Loxo
-Entry file: Loxo/loxoapi.py
-Scanned: 2016-10-25 23:24:52.845371
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhou18520786640/FlaskWeb
-https://github.com/zhou18520786640/FlaskWeb
-Entry file: FlaskWeb/hello.py
-Scanned: 2016-10-25 23:24:56.025219
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venv/lib/python2.7/sre_compile.py
-
-LaRueGT/FlaskBlog
-https://github.com/LaRueGT/FlaskBlog
-Entry file: FlaskBlog/blog.py
-Scanned: 2016-10-25 23:24:57.473596
-No vulnerabilities found.
-
-
-ethanphunter/FlaskExperiment
-https://github.com/ethanphunter/FlaskExperiment
-Entry file: FlaskExperiment/main.py
-Scanned: 2016-10-25 23:24:59.090318
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-rkholoniuk/FlaskAPI
-https://github.com/rkholoniuk/FlaskAPI
-Entry file: None
-Scanned: 2016-10-25 23:25:00.395183
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI.
-
-AllyW/flaskyDeb
-https://github.com/AllyW/flaskyDeb
-Entry file: flaskyDeb/app/__init__.py
-Scanned: 2016-10-25 23:25:02.423863
-Vulnerability 1:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flaskyDeb/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flaskyDeb/app/api_1_0/posts.py
- > Line 19: next = None
-File: flaskyDeb/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 20: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 23: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flaskyDeb/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flaskyDeb/app/api_1_0/users.py
- > Line 42: prev = None
- File: flaskyDeb/app/api_1_0/users.py
- > Line 45: next = None
-File: flaskyDeb/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 18: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flaskyDeb/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flaskyDeb/app/api_1_0/comments.py
- > Line 46: next = None
-File: flaskyDeb/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flaskyDeb/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 55: posts = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flaskyDeb/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 45: show_followed = False
- File: flaskyDeb/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flaskyDeb/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 67: posts = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flaskyDeb/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskyDeb/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 134: comments = pagination.items
- File: flaskyDeb/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskyDeb/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flaskyDeb/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flaskyDeb/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskyDeb/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskyDeb/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flaskyDeb/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskyDeb/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskyDeb/app/main/views.py
- > Line 246: comments = pagination.items
-File: flaskyDeb/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-jmcerv/FlaskTutorial
-https://github.com/jmcerv/FlaskTutorial
-Entry file: FlaskTutorial/app/__init__.py
-Scanned: 2016-10-25 23:25:13.012865
-No vulnerabilities found.
-
-
-asimonia/FlaskJeopardy
-https://github.com/asimonia/FlaskJeopardy
-Entry file: FlaskJeopardy/app/__init__.py
-Scanned: 2016-10-25 23:25:20.823693
-Vulnerability 1:
-File: FlaskJeopardy/app/main/views.py
- > User input at line 17, trigger word ".data":
- show_number = form.show_number.data
-Reassigned in:
- File: FlaskJeopardy/app/main/views.py
- > Line 32: questions = Questionbank.objects(show_number=show_number, current_round='Jeopardy!')
- File: FlaskJeopardy/app/main/views.py
- > Line 33: init_game = Game(state='playing', show_number=show_number, current_round='Jeopardy!')
- File: FlaskJeopardy/app/main/views.py
- > Line 12: ret_MAYBE_FUNCTION_NAME = render_template('questions/index.html',form=form)
-File: FlaskJeopardy/app/main/views.py
- > reaches line 54, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('questions/game_board.html',game=init_game)
-
-
-
-motleytech/flaskPlate
-https://github.com/motleytech/flaskPlate
-Entry file: flaskPlate/app/app.py
-Scanned: 2016-10-25 23:25:22.644251
-No vulnerabilities found.
-
-
-ciricihq/wkhtmltopdf-flask-aas
-https://github.com/ciricihq/wkhtmltopdf-flask-aas
-Entry file: wkhtmltopdf-flask-aas/app.py
-Scanned: 2016-10-25 23:25:24.190998
-No vulnerabilities found.
-
-
-cr8ivecodesmith/save22-flask-course-src
-https://github.com/cr8ivecodesmith/save22-flask-course-src
-Entry file: save22-flask-course-src/05-combination/app/app.py
-Scanned: 2016-10-25 23:25:25.694284
-No vulnerabilities found.
-
-
-johnsliao/flask-sqlite3-chartjs-toy
-https://github.com/johnsliao/flask-sqlite3-chartjs-toy
-Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py
-Scanned: 2016-10-25 23:25:26.991750
-No vulnerabilities found.
-
-
-raticate/flask-tutorial
-https://github.com/raticate/flask-tutorial
-Entry file: flask-tutorial/app/__init__.py
-Scanned: 2016-10-25 23:25:34.230910
-No vulnerabilities found.
-
-
-yetship/flask-usages
-https://github.com/yetship/flask-usages
-Entry file: flask-usages/application/__init__.py
-Scanned: 2016-10-25 23:25:35.666105
-Vulnerability 1:
-File: flask-usages/application/controllers/todo.py
- > User input at line 12, trigger word "get(":
- todo_id = request.args.get('todo_id')
-Reassigned in:
- File: flask-usages/application/controllers/todo.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify()
-File: flask-usages/application/controllers/todo.py
- > reaches line 15, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content)
-
-Vulnerability 2:
-File: flask-usages/application/controllers/todo.py
- > User input at line 21, trigger word "get(":
- todo = Todo(content=data.get('content'))
-File: flask-usages/application/controllers/todo.py
- > reaches line 24, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content)
-
-
-
-MaximeGir/flask_skeleton
-https://github.com/MaximeGir/flask_skeleton
-Entry file: None
-Scanned: 2016-10-25 23:25:36.992403
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MaximeGir/flask_skeleton.
-
-josepablob/flask-blog
-https://github.com/josepablob/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:25:37.531769
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-johnsliao/flask-bp
-https://github.com/johnsliao/flask-bp
-Entry file: flask-bp/flaskApp.py
-Scanned: 2016-10-25 23:25:38.822827
-No vulnerabilities found.
-
-
-devmtnaing/python_flask
-https://github.com/devmtnaing/python_flask
-Entry file: python_flask/app/__init__.py
-Scanned: 2016-10-25 23:25:40.231153
-Vulnerability 1:
-File: python_flask/app/mod_auth/controllers.py
- > User input at line 30, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: python_flask/app/mod_auth/controllers.py
- > Line 34: session['user_id'] = user.id
-File: python_flask/app/mod_auth/controllers.py
- > reaches line 36, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-faraday-effect/spectacle-flask
-https://github.com/faraday-effect/spectacle-flask
-Entry file: spectacle-flask/app/__init__.py
-Scanned: 2016-10-25 23:25:41.654408
-No vulnerabilities found.
-
-
-swkaen/Flask_LED
-https://github.com/swkaen/Flask_LED
-Entry file: Flask_LED/hello.py
-Scanned: 2016-10-25 23:25:42.972098
-No vulnerabilities found.
-
-
-al4/flask-tokenauth
-https://github.com/al4/flask-tokenauth
-Entry file: flask-tokenauth/example.py
-Scanned: 2016-10-25 23:25:44.368938
-No vulnerabilities found.
-
-
-jgoret/flask-dataset
-https://github.com/jgoret/flask-dataset
-Entry file: flask-dataset/flask_dataset/__init__.py
-Scanned: 2016-10-25 23:25:46.159107
-No vulnerabilities found.
-
-
-cnds/flask_web
-https://github.com/cnds/flask_web
-Entry file: flask_web/app/__init__.py
-Scanned: 2016-10-25 23:25:51.330903
-Vulnerability 1:
-File: flask_web/app/api_1_0/posts.py
- > User input at line 16, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/api_1_0/posts.py
- > Line 17: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False)
- File: flask_web/app/api_1_0/posts.py
- > Line 20: posts = pagination.items
- File: flask_web/app/api_1_0/posts.py
- > Line 21: prev = None
- File: flask_web/app/api_1_0/posts.py
- > Line 24: next = None
-File: flask_web/app/api_1_0/posts.py
- > reaches line 23, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flask_web/app/api_1_0/posts.py
- > User input at line 16, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/api_1_0/posts.py
- > Line 17: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False)
- File: flask_web/app/api_1_0/posts.py
- > Line 20: posts = pagination.items
- File: flask_web/app/api_1_0/posts.py
- > Line 21: prev = None
- File: flask_web/app/api_1_0/posts.py
- > Line 24: next = None
-File: flask_web/app/api_1_0/posts.py
- > reaches line 26, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flask_web/app/api_1_0/posts.py
- > User input at line 16, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/api_1_0/posts.py
- > Line 17: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False)
- File: flask_web/app/api_1_0/posts.py
- > Line 20: posts = pagination.items
- File: flask_web/app/api_1_0/posts.py
- > Line 21: prev = None
- File: flask_web/app/api_1_0/posts.py
- > Line 24: next = None
-File: flask_web/app/api_1_0/posts.py
- > reaches line 27, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flask_web/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False)
- File: flask_web/app/main/views.py
- > Line 34: posts = pagination.items
- File: flask_web/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_web/app/main/views.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 5:
-File: flask_web/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ' '))
-Reassigned in:
- File: flask_web/app/main/views.py
- > Line 23: show_followed = False
- File: flask_web/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_web/app/main/views.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 6:
-File: flask_web/app/main/views.py
- > User input at line 110, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/main/views.py
- > Line 112: page = (post.comments.count() - 1, current_app.config['FLASKBLOG_COMMENTS_PER_PAGE'] + 1)
- File: flask_web/app/main/views.py
- > Line 114: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKBLOG_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_web/app/main/views.py
- > Line 116: comments = pagination.items
- File: flask_web/app/main/views.py
- > Line 109: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask_web/app/main/views.py
- > reaches line 117, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 7:
-File: flask_web/app/main/views.py
- > User input at line 159, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/main/views.py
- > Line 160: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKBLOG_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_web/app/main/views.py
- > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_web/app/main/views.py
- > Line 158: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_web/app/main/views.py
- > reaches line 164, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 8:
-File: flask_web/app/main/views.py
- > User input at line 190, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_web/app/main/views.py
- > Line 191: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKBLOG_COMMENT_PER_PAGE'], error_out=False)
- File: flask_web/app/main/views.py
- > Line 194: comments = pagination.items
-File: flask_web/app/main/views.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-fenfir/flask_test
-https://github.com/fenfir/flask_test
-Entry file: flask_test/test.py
-Scanned: 2016-10-25 23:25:52.636955
-No vulnerabilities found.
-
-
-danjamin/flask-guide
-https://github.com/danjamin/flask-guide
-Entry file: flask-guide/app/server.py
-Scanned: 2016-10-25 23:25:53.945894
-No vulnerabilities found.
-
-
-stevejgoodman/flask-app
-https://github.com/stevejgoodman/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-25 23:25:55.245733
-No vulnerabilities found.
-
-
-devizier/flask-blog
-https://github.com/devizier/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:25:55.771110
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rafaelgotts/flask_rest
-https://github.com/rafaelgotts/flask_rest
-Entry file: flask_rest/flask_rest/app.py
-Scanned: 2016-10-25 23:25:57.054592
-No vulnerabilities found.
-
-
-Orlandohub/flask-tutorial
-https://github.com/Orlandohub/flask-tutorial
-Entry file: flask-tutorial/hello-world.py
-Scanned: 2016-10-25 23:25:58.348179
-No vulnerabilities found.
-
-
-python-0/flask_blog
-https://github.com/python-0/flask_blog
-Entry file: flask_blog/app/__init__.py
-Scanned: 2016-10-25 23:25:59.909674
-No vulnerabilities found.
-
-
-bdero/flask-sleep
-https://github.com/bdero/flask-sleep
-Entry file: flask-sleep/flasksleep.py
-Scanned: 2016-10-25 23:26:01.304697
-No vulnerabilities found.
-
-
-miracleluchen/blog-flask
-https://github.com/miracleluchen/blog-flask
-Entry file: blog-flask/server.py
-Scanned: 2016-10-25 23:26:02.890202
-No vulnerabilities found.
-
-
-IvanBodnar/flask_relevamientos
-https://github.com/IvanBodnar/flask_relevamientos
-Entry file: flask_relevamientos/app.py
-Scanned: 2016-10-25 23:26:04.533997
-No vulnerabilities found.
-
-
-ravivooda/flask-server
-https://github.com/ravivooda/flask-server
-Entry file: None
-Scanned: 2016-10-25 23:26:05.937536
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ravivooda/flask-server.
-
-wipatrick/flask-restapi
-https://github.com/wipatrick/flask-restapi
-Entry file: flask-restapi/api.py
-Scanned: 2016-10-25 23:26:07.252484
-No vulnerabilities found.
-
-
-yogeshralhan/flask_1
-https://github.com/yogeshralhan/flask_1
-Entry file: flask_1/request.py
-Scanned: 2016-10-25 23:26:09.332948
-No vulnerabilities found.
-
-
-YeWang0/Flask_Blog
-https://github.com/YeWang0/Flask_Blog
-Entry file: Flask_Blog/main_db.py
-Scanned: 2016-10-25 23:26:14.833031
-No vulnerabilities found.
-
-
-krol3/python-flask
-https://github.com/krol3/python-flask
-Entry file: python-flask/app.py
-Scanned: 2016-10-25 23:26:22.149589
-No vulnerabilities found.
-
-
-ialamin/flask_hello
-https://github.com/ialamin/flask_hello
-Entry file: flask_hello/hello_world.py
-Scanned: 2016-10-25 23:26:26.415456
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ramhiser/flask-docker
-https://github.com/ramhiser/flask-docker
-Entry file: flask-docker/app.py
-Scanned: 2016-10-25 23:26:27.719776
-No vulnerabilities found.
-
-
-jyameo/Flask-Blog
-https://github.com/jyameo/Flask-Blog
-Entry file: Flask-Blog/blog.py
-Scanned: 2016-10-25 23:26:32.063751
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Blog/env/lib/python2.7/sre_compile.py
-
-Vasiliy-tech/flask_httpserver
-https://github.com/Vasiliy-tech/flask_httpserver
-Entry file: flask_httpserver/simple_http.py
-Scanned: 2016-10-25 23:26:33.527067
-No vulnerabilities found.
-
-
-chuan137/flask_bess
-https://github.com/chuan137/flask_bess
-Entry file: flask_bess/main.py
-Scanned: 2016-10-25 23:26:36.189616
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-windery/flask-blog
-https://github.com/windery/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:26:38.761968
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kgandhi37/flask_blog
-https://github.com/kgandhi37/flask_blog
-Entry file: flask_blog/__init__.py
-Scanned: 2016-10-25 23:26:55.544790
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_blog/venv/lib/python3.4/operator.py
-
-Yuhuishishishi/Flask_toy
-https://github.com/Yuhuishishishi/Flask_toy
-Entry file: Flask_toy/MenuApp.py
-Scanned: 2016-10-25 23:26:56.930602
-No vulnerabilities found.
-
-
-heyericnelson/flask_apps
-https://github.com/heyericnelson/flask_apps
-Entry file: flask_apps/flaskr/flaskr.py
-Scanned: 2016-10-25 23:26:58.327784
-No vulnerabilities found.
-
-
-datakiss/flask-miguel
-https://github.com/datakiss/flask-miguel
-Entry file: flask-miguel/app/__init__.py
-Scanned: 2016-10-25 23:26:59.750878
-No vulnerabilities found.
-
-
-timotk/flask-login
-https://github.com/timotk/flask-login
-Entry file: flask-login/app/__init__.py
-Scanned: 2016-10-25 23:27:01.112652
-No vulnerabilities found.
-
-
-johnsliao/flask-toy
-https://github.com/johnsliao/flask-toy
-Entry file: flask-toy/flaskr/flaskr.py
-Scanned: 2016-10-25 23:27:02.795182
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jan26th/flask_test
-https://github.com/jan26th/flask_test
-Entry file: None
-Scanned: 2016-10-25 23:27:05.790909
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dawran6/flask-blog
-https://github.com/dawran6/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:27:06.302953
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-msapkota/Flask_Blog
-https://github.com/msapkota/Flask_Blog
-Entry file: Flask_Blog/blog.py
-Scanned: 2016-10-25 23:27:09.433514
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wish007/MyFlask
-https://github.com/wish007/MyFlask
-Entry file: MyFlask/app/__init__.py
-Scanned: 2016-10-25 23:27:10.766923
-No vulnerabilities found.
-
-
-rogerpence/flask-skeleton
-https://github.com/rogerpence/flask-skeleton
-Entry file: flask-skeleton/application/__init__.py
-Scanned: 2016-10-25 23:27:12.186291
-No vulnerabilities found.
-
-
-chungsquared/flask-introduction
-https://github.com/chungsquared/flask-introduction
-Entry file: flask-introduction/app.py
-Scanned: 2016-10-25 23:27:14.105141
-No vulnerabilities found.
-
-
-zachbpd/microblog
-https://github.com/zachbpd/microblog
-Entry file: None
-Scanned: 2016-10-25 23:27:14.668629
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zachbpd/microblog.
-
-josepablob/flask-hello-world
-https://github.com/josepablob/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:27:15.216213
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Tribe216/microblog
-https://github.com/Tribe216/microblog
-Entry file: None
-Scanned: 2016-10-25 23:27:15.729947
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Tribe216/microblog.
-
-ipsha21/My-flask-application
-https://github.com/ipsha21/My-flask-application
-Entry file: My-flask-application/app.py
-Scanned: 2016-10-25 23:27:17.039097
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-laaroussiBadr/FlaskWebProject
-https://github.com/laaroussiBadr/FlaskWebProject
-Entry file: FlaskWebProject/FlaskWebProject2/FlaskWebProject2/__init__.py
-Scanned: 2016-10-25 23:27:19.398868
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-DonBeck69/FlaskWebProject2
-https://github.com/DonBeck69/FlaskWebProject2
-Entry file: None
-Scanned: 2016-10-25 23:27:21.643518
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sasha-ruby/flask2spark
-https://github.com/sasha-ruby/flask2spark
-Entry file: flask2spark/flask2spark.py
-Scanned: 2016-10-25 23:27:22.934002
-No vulnerabilities found.
-
-
-rjmAmaro/flaskr_flask_tutorial
-https://github.com/rjmAmaro/flaskr_flask_tutorial
-Entry file: flaskr_flask_tutorial/flaskr/flaskr.py
-Scanned: 2016-10-25 23:27:24.328575
-No vulnerabilities found.
-
-
-embasa/FLASK
-https://github.com/embasa/FLASK
-Entry file: FLASK/app.py
-Scanned: 2016-10-25 23:27:27.062945
-No vulnerabilities found.
-
-
-damionlowers/flask
-https://github.com/damionlowers/flask
-Entry file: None
-Scanned: 2016-10-25 23:27:27.605116
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-smltc/Flask
-https://github.com/smltc/Flask
-Entry file: None
-Scanned: 2016-10-25 23:27:29.121712
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rakeshhegishte/Flask
-https://github.com/rakeshhegishte/Flask
-Entry file: None
-Scanned: 2016-10-25 23:27:32.657098
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-RayneHwang/Flask
-https://github.com/RayneHwang/Flask
-Entry file: None
-Scanned: 2016-10-25 23:27:35.173346
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-RoseOu/flasky
-https://github.com/RoseOu/flasky
-Entry file: None
-Scanned: 2016-10-25 23:27:37.720744
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-materialsvirtuallab/flamyngo
-https://github.com/materialsvirtuallab/flamyngo
-Entry file: flamyngo/flamyngo/app.py
-Scanned: 2016-10-25 23:27:40.601063
-Vulnerability 1:
-File: flamyngo/flamyngo/views.py
- > User input at line 95, trigger word "get(":
- cname = request.args.get('collection')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 96: settings = CSETTINGS[cname]
- File: flamyngo/flamyngo/views.py
- > Line 98: projection = [t[0] for t in settings['summary']]
- File: flamyngo/flamyngo/views.py
- > Line 105: criteria = process_search_string(search_string, settings)
-File: flamyngo/flamyngo/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message))
-
-Vulnerability 2:
-File: flamyngo/flamyngo/views.py
- > User input at line 97, trigger word "get(":
- search_string = request.args.get('search_string')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 105: criteria = process_search_string(search_string, settings)
-File: flamyngo/flamyngo/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message))
-
-Vulnerability 3:
-File: flamyngo/flamyngo/views.py
- > User input at line 142, trigger word "get(":
- cname = request.args.get('collection')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 4:
-File: flamyngo/flamyngo/views.py
- > User input at line 145, trigger word "get(":
- plot_type = request.args.get('plot_type') or 'scatter'
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 5:
-File: flamyngo/flamyngo/views.py
- > User input at line 146, trigger word "get(":
- search_string = request.args.get('search_string')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 6:
-File: flamyngo/flamyngo/views.py
- > User input at line 147, trigger word "get(":
- xaxis = request.args.get('xaxis')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-Vulnerability 7:
-File: flamyngo/flamyngo/views.py
- > User input at line 148, trigger word "get(":
- yaxis = request.args.get('yaxis')
-Reassigned in:
- File: flamyngo/flamyngo/views.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES))
-File: flamyngo/flamyngo/views.py
- > reaches line 149, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True))
-
-
-
-jonafato/Flask-Copilot
-https://github.com/jonafato/Flask-Copilot
-Entry file: Flask-Copilot/example/app.py
-Scanned: 2016-10-25 23:27:41.998471
-No vulnerabilities found.
-
-
-Upflask/Upflask
-https://github.com/Upflask/Upflask
-Entry file: Upflask/server.py
-Scanned: 2016-10-25 23:27:43.769411
-Vulnerability 1:
-File: Upflask/server.py
- > User input at line 161, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Upflask/server.py
- > Line 165: filename = secure_filename(file.filename)
-File: Upflask/server.py
- > reaches line 171, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: Upflask/server.py
- > User input at line 161, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Upflask/server.py
- > Line 165: filename = secure_filename(file.filename)
-File: Upflask/server.py
- > reaches line 171, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-PrettyPrinted/flask-wtforms
-https://github.com/PrettyPrinted/flask-wtforms
-Entry file: flask-wtforms/main.py
-Scanned: 2016-10-25 23:27:57.098667
-No vulnerabilities found.
-
-
-MLH/my-mlh-flask-example
-https://github.com/MLH/my-mlh-flask-example
-Entry file: my-mlh-flask-example/app.py
-Scanned: 2016-10-25 23:27:58.425076
-No vulnerabilities found.
-
-
-billyfung/flask_shortener
-https://github.com/billyfung/flask_shortener
-Entry file: flask_shortener/app.py
-Scanned: 2016-10-25 23:27:59.830221
-Vulnerability 1:
-File: flask_shortener/app.py
- > User input at line 41, trigger word "form[":
- url_to_parse = request.form['input-url']
-Reassigned in:
- File: flask_shortener/app.py
- > Line 42: parts = urlparse.urlparse(url_to_parse)
- File: flask_shortener/app.py
- > Line 47: short_id = shorten(url_to_parse)
-File: flask_shortener/app.py
- > reaches line 48, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id)
-
-Vulnerability 2:
-File: flask_shortener/app.py
- > User input at line 52, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 56, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(link_target)
-
-Vulnerability 3:
-File: flask_shortener/app.py
- > User input at line 60, trigger word "get(":
- link_target = redis.get('url-target:' + short_id)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-Vulnerability 4:
-File: flask_shortener/app.py
- > User input at line 63, trigger word "get(":
- click_count = int(redis.get('click-count:' + short_id) or 0)
-File: flask_shortener/app.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target)
-
-
-
-msapkota/flasktaskr
-https://github.com/msapkota/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:28:00.362808
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Narcissist1/flasktest
-https://github.com/Narcissist1/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 23:28:03.069747
-No vulnerabilities found.
-
-
-super452/flasky
-https://github.com/super452/flasky
-Entry file: None
-Scanned: 2016-10-25 23:28:03.601626
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-boydjohnson/flasktwilio
-https://github.com/boydjohnson/flasktwilio
-Entry file: flasktwilio/app.py
-Scanned: 2016-10-25 23:28:07.903861
-Vulnerability 1:
-File: flasktwilio/app.py
- > User input at line 14, trigger word "form[":
- number = request.form['number']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-Vulnerability 2:
-File: flasktwilio/app.py
- > User input at line 15, trigger word "form[":
- lat = request.form['latitude']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-Vulnerability 3:
-File: flasktwilio/app.py
- > User input at line 16, trigger word "form[":
- lon = request.form['longitude']
-File: flasktwilio/app.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon)
-
-
-
-yizhianiu/flasky
-https://github.com/yizhianiu/flasky
-Entry file: None
-Scanned: 2016-10-25 23:28:08.421152
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ifcheung2012/flaskanalysis
-https://github.com/ifcheung2012/flaskanalysis
-Entry file: flaskanalysis/manage.py
-Scanned: 2016-10-25 23:28:11.848350
-No vulnerabilities found.
-
-
-wdxfairy/flaskblog
-https://github.com/wdxfairy/flaskblog
-Entry file: None
-Scanned: 2016-10-25 23:28:12.378502
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wdxfairy/flaskblog.
-
-wish007/flasktest
-https://github.com/wish007/flasktest
-Entry file: flasktest/hello.py
-Scanned: 2016-10-25 23:28:13.789278
-No vulnerabilities found.
-
-
-wildjan/Flaskr
-https://github.com/wildjan/Flaskr
-Entry file: None
-Scanned: 2016-10-25 23:28:15.306114
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pnilan/flaskr
-https://github.com/pnilan/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:28:15.837393
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pnilan/flaskr.
-
-scottmarinoff/Flasky
-https://github.com/scottmarinoff/Flasky
-Entry file: None
-Scanned: 2016-10-25 23:28:16.361751
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/scottmarinoff/Flasky.
-
-cutedogspark/Flask-SocketIO
-https://github.com/cutedogspark/Flask-SocketIO
-Entry file: Flask-SocketIO/server/app/__init__.py
-Scanned: 2016-10-25 23:28:19.719166
-No vulnerabilities found.
-
-
-EvenYan/FlaskTest
-https://github.com/EvenYan/FlaskTest
-Entry file: FlaskTest/app.py
-Scanned: 2016-10-25 23:28:21.541455
-No vulnerabilities found.
-
-
-jll90/flaskAng
-https://github.com/jll90/flaskAng
-Entry file: flaskAng/app.py
-Scanned: 2016-10-25 23:28:25.389330
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskAng/lib/python2.7/sre_compile.py
-
-rkholoniuk/FlaskAPI
-https://github.com/rkholoniuk/FlaskAPI
-Entry file: None
-Scanned: 2016-10-25 23:28:25.948133
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI.
-
-VitPN/FlaskRPi
-https://github.com/VitPN/FlaskRPi
-Entry file: FlaskRPi/go.py
-Scanned: 2016-10-25 23:28:27.268907
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-edgewood/webfaction-flask0.10-boilerplate
-https://github.com/edgewood/webfaction-flask0.10-boilerplate
-Entry file: None
-Scanned: 2016-10-25 23:28:29.189625
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/edgewood/webfaction-flask0.10-boilerplate.
-
-shidante/notes-flask
-https://github.com/shidante/notes-flask
-Entry file: notes-flask/hello.py
-Scanned: 2016-10-25 23:28:30.481450
-No vulnerabilities found.
-
-
-maixianyu/flask_tennis
-https://github.com/maixianyu/flask_tennis
-Entry file: None
-Scanned: 2016-10-25 23:28:36.090458
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-s-kovacevic/elearning-flask
-https://github.com/s-kovacevic/elearning-flask
-Entry file: elearning-flask/main.py
-Scanned: 2016-10-25 23:28:37.559247
-Vulnerability 1:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 71, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi())
-
-Vulnerability 2:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()])
-
-Vulnerability 3:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 99, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi())
-
-Vulnerability 4:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 102, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()])
-
-Vulnerability 5:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 131, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi())
-
-Vulnerability 6:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 134, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()])
-
-Vulnerability 7:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 163, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi())
-
-Vulnerability 8:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 166, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()])
-
-Vulnerability 9:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 195, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi())
-
-Vulnerability 10:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 198, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()])
-
-
-
-saalmerol/cds-flask
-https://github.com/saalmerol/cds-flask
-Entry file: None
-Scanned: 2016-10-25 23:28:41.392624
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-trileg/HelloFlask
-https://github.com/trileg/HelloFlask
-Entry file: HelloFlask/FlaskApp/app.py
-Scanned: 2016-10-25 23:28:42.710173
-No vulnerabilities found.
-
-
-M1lan/flask_helloworld
-https://github.com/M1lan/flask_helloworld
-Entry file: flask_helloworld/flask_helloworld.py
-Scanned: 2016-10-25 23:28:44.112940
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-xpleaf/flask_catalog
-https://github.com/xpleaf/flask_catalog
-Entry file: flask_catalog/my_app/__init__.py
-Scanned: 2016-10-25 23:28:46.032698
-Vulnerability 1:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 41, trigger word "get(":
- products = [redis.get(k) for k in keys_alive]
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('products'products)
-
-Vulnerability 2:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 66, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 79, trigger word "flash(":
- flash('The product %s has been created' % name, 'success')
-
-Vulnerability 3:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 66, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 4:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 67, trigger word ".data":
- price = form.price.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 5:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 68, trigger word ".data":
- category = Category.query.get_or_404(form.category.data)
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 6:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 71, trigger word "files[":
- image = request.files['image']
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 74: filename = secure_filename(image.filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
- File: flask_catalog/my_app/catalog/views.py
- > Line 72: filename = ''
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 7:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 66, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 8:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 67, trigger word ".data":
- price = form.price.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 9:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 68, trigger word ".data":
- category = Category.query.get_or_404(form.category.data)
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 10:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 71, trigger word "files[":
- image = request.files['image']
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 74: filename = secure_filename(image.filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 76: product = Product(name, price, category, filename)
- File: flask_catalog/my_app/catalog/views.py
- > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form)
- File: flask_catalog/my_app/catalog/views.py
- > Line 72: filename = ''
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 80, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id))
-
-Vulnerability 11:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 93, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 94: category = Category(name)
- File: flask_catalog/my_app/catalog/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 97, trigger word "flash(":
- flash('The category %s has been created' % name, 'success')
-
-Vulnerability 12:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 93, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 94: category = Category(name)
- File: flask_catalog/my_app/catalog/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 99, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id))
-
-Vulnerability 13:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 93, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 94: category = Category(name)
- File: flask_catalog/my_app/catalog/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form)
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 99, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id))
-
-Vulnerability 14:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 15:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 16:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 17:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 142, trigger word "filter(":
- products = products.filter(Product.name.like('%' + name + '%'))
-
-Vulnerability 18:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 19:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 20:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 21:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 144, trigger word "filter(":
- products = products.filter(Product.price == price)
-
-Vulnerability 22:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 23:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 24:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 25:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 146, trigger word "filter(":
- products = products.filter(Product.company.like('%' + company + '%'))
-
-Vulnerability 26:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 27:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 28:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 29:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 148, trigger word "filter(":
- products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%'))
-
-Vulnerability 30:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 136, trigger word "get(":
- name = request.args.get('name')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-Vulnerability 31:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 137, trigger word "get(":
- price = request.args.get('price')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-Vulnerability 32:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 138, trigger word "get(":
- company = request.args.get('company')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-Vulnerability 33:
-File: flask_catalog/my_app/catalog/views.py
- > User input at line 139, trigger word "get(":
- category = request.args.get('category')
-Reassigned in:
- File: flask_catalog/my_app/catalog/views.py
- > Line 140: products = Product.query
-File: flask_catalog/my_app/catalog/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10))
-
-
-
-yizhianiu/flask-blog
-https://github.com/yizhianiu/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:28:46.571657
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-garderobin/HelloFlask
-https://github.com/garderobin/HelloFlask
-Entry file: HelloFlask/HelloFlask.py
-Scanned: 2016-10-25 23:28:57.915961
-No vulnerabilities found.
-
-
-codybousc/flask_practice-
-https://github.com/codybousc/flask_practice-
-Entry file: flask_practice-/app.py
-Scanned: 2016-10-25 23:29:01.005230
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_practice-/venv/lib/python2.7/sre_compile.py
-
-zhuwei05/flask-blog
-https://github.com/zhuwei05/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:29:01.540097
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fenfir/flask_test
-https://github.com/fenfir/flask_test
-Entry file: None
-Scanned: 2016-10-25 23:29:02.055815
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tim1978/flask-blog
-https://github.com/tim1978/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:29:02.592867
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-junhl/Flask_Test
-https://github.com/junhl/Flask_Test
-Entry file: Flask_Test/app/__init__.py
-Scanned: 2016-10-25 23:29:06.788825
-No vulnerabilities found.
-
-
-anupam0601/flask_off
-https://github.com/anupam0601/flask_off
-Entry file: flask_off/appmongo.py
-Scanned: 2016-10-25 23:29:13.250785
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-cdhop/flask_exercises
-https://github.com/cdhop/flask_exercises
-Entry file: flask_exercises/chapter_5/hello.py
-Scanned: 2016-10-25 23:29:14.803133
-No vulnerabilities found.
-
-
-AmeetSM/AngularFlask
-https://github.com/AmeetSM/AngularFlask
-Entry file: AngularFlask/app.py
-Scanned: 2016-10-25 23:29:16.591432
-No vulnerabilities found.
-
-
-zhiweicai/flask-hello
-https://github.com/zhiweicai/flask-hello
-Entry file: flask-hello/flask-hello.py
-Scanned: 2016-10-25 23:29:17.913645
-No vulnerabilities found.
-
-
-slacksec/flask_blog
-https://github.com/slacksec/flask_blog
-Entry file: flask_blog/__init__.py
-Scanned: 2016-10-25 23:29:19.710074
-Vulnerability 1:
-File: flask_blog/author/views.py
- > User input at line 25, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flask_blog/author/views.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
- File: flask_blog/author/views.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error)
-File: flask_blog/author/views.py
- > reaches line 27, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 2:
-File: flask_blog/blog/views.py
- > User input at line 84, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: flask_blog/blog/views.py
- > Line 86: slug = slugify(title)
- File: flask_blog/blog/views.py
- > Line 87: post = Post(blog, author, title, body, category, filename, slug)
- File: flask_blog/blog/views.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: flask_blog/blog/views.py
- > reaches line 90, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-Vulnerability 3:
-File: flask_blog/blog/views.py
- > User input at line 84, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: flask_blog/blog/views.py
- > Line 86: slug = slugify(title)
- File: flask_blog/blog/views.py
- > Line 87: post = Post(blog, author, title, body, category, filename, slug)
- File: flask_blog/blog/views.py
- > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: flask_blog/blog/views.py
- > reaches line 90, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-
-
-GreenDragonSoft/refundmytrain-flask
-https://github.com/GreenDragonSoft/refundmytrain-flask
-Entry file: refundmytrain-flask/app.py
-Scanned: 2016-10-25 23:29:21.143874
-No vulnerabilities found.
-
-
-Desmonddai583/flask-blog
-https://github.com/Desmonddai583/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:29:21.666389
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-seabrookmx/flask-demo
-https://github.com/seabrookmx/flask-demo
-Entry file: flask-demo/flaskdemo.py
-Scanned: 2016-10-25 23:29:22.985892
-No vulnerabilities found.
-
-
-a358003542/flask-examples
-https://github.com/a358003542/flask-examples
-Entry file: flask-examples/session_flash.py
-Scanned: 2016-10-25 23:29:24.435829
-Vulnerability 1:
-File: flask-examples/session_flash.py
- > User input at line 32, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-examples/session_flash.py
- > Line 37: session['username'] = username
-File: flask-examples/session_flash.py
- > reaches line 34, trigger word "filter(":
- target = db.session.query(User).filter(User.username == username).first()
-
-Vulnerability 2:
-File: flask-examples/upload.py
- > User input at line 34, trigger word "files[":
- fileobj = request.files['file']
-Reassigned in:
- File: flask-examples/upload.py
- > Line 41: filename = fileobj.filename
- File: flask-examples/upload.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = '
- Upload new file
-
Upload new File
-
- '
- File: flask-examples/upload.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: flask-examples/upload.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: flask-examples/upload.py
- > reaches line 43, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 3:
-File: flask-examples/upload.py
- > User input at line 34, trigger word "files[":
- fileobj = request.files['file']
-Reassigned in:
- File: flask-examples/upload.py
- > Line 41: filename = fileobj.filename
- File: flask-examples/upload.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = '
- Upload new file
-
Upload new File
-
- '
- File: flask-examples/upload.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
- File: flask-examples/upload.py
- > Line 39: ret_MAYBE_FUNCTION_NAME = redirect(request.url)
-File: flask-examples/upload.py
- > reaches line 43, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 4:
-File: flask-examples/session.py
- > User input at line 32, trigger word "get(":
- username = request.form.get('username')
-Reassigned in:
- File: flask-examples/session.py
- > Line 37: session['username'] = username
-File: flask-examples/session.py
- > reaches line 34, trigger word "filter(":
- target = db.session.query(User).filter(User.username == username).first()
-
-
-
-Yuhuishishishi/Flask_toy
-https://github.com/Yuhuishishishi/Flask_toy
-Entry file: Flask_toy/MenuApp.py
-Scanned: 2016-10-25 23:29:25.731410
-No vulnerabilities found.
-
-
-heyericnelson/flask_apps
-https://github.com/heyericnelson/flask_apps
-Entry file: flask_apps/flaskr/flaskr.py
-Scanned: 2016-10-25 23:29:27.031908
-No vulnerabilities found.
-
-
-abunuwas/flask_experiments
-https://github.com/abunuwas/flask_experiments
-Entry file: None
-Scanned: 2016-10-25 23:29:28.353212
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/abunuwas/flask_experiments.
-
-ykchat/gundam-flask
-https://github.com/ykchat/gundam-flask
-Entry file: gundam-flask/server.py
-Scanned: 2016-10-25 23:29:29.650250
-No vulnerabilities found.
-
-
-datakiss/flask-miguel
-https://github.com/datakiss/flask-miguel
-Entry file: flask-miguel/app/__init__.py
-Scanned: 2016-10-25 23:29:31.077499
-No vulnerabilities found.
-
-
-eltonto187/learn_flask
-https://github.com/eltonto187/learn_flask
-Entry file: learn_flask/flaskr.py
-Scanned: 2016-10-25 23:29:32.389356
-No vulnerabilities found.
-
-
-NickyThreeNames/flask_blog
-https://github.com/NickyThreeNames/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-25 23:29:33.674873
-No vulnerabilities found.
-
-
-netkicorp/flask-jwe
-https://github.com/netkicorp/flask-jwe
-Entry file: flask-jwe/server.py
-Scanned: 2016-10-25 23:29:35.129050
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-chungsquared/flask-introduction
-https://github.com/chungsquared/flask-introduction
-Entry file: flask-introduction/app.py
-Scanned: 2016-10-25 23:29:37.931297
-No vulnerabilities found.
-
-
-dengshilong/flask_example
-https://github.com/dengshilong/flask_example
-Entry file: flask_example/flaskr.py
-Scanned: 2016-10-25 23:29:39.417590
-No vulnerabilities found.
-
-
-nathanielcompton/flask-tutorial
-https://github.com/nathanielcompton/flask-tutorial
-Entry file: flask-tutorial/flask-tutorial/app.py
-Scanned: 2016-10-25 23:29:44.050088
-No vulnerabilities found.
-
-
-JesseLabruyere/flask_api
-https://github.com/JesseLabruyere/flask_api
-Entry file: flask_api/flask_project/routes.py
-Scanned: 2016-10-25 23:29:48.592365
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_api/flask_project/venv/lib/python2.7/sre_compile.py
-
-leon740gk/flask_quick_start
-https://github.com/leon740gk/flask_quick_start
-Entry file: flask_quick_start/hello.py
-Scanned: 2016-10-25 23:29:49.946465
-No vulnerabilities found.
-
-
-dommert/test.dommert.xyz
-https://github.com/dommert/test.dommert.xyz
-Entry file: None
-Scanned: 2016-10-25 23:29:51.365807
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dommert/test.dommert.xyz.
-
-poppuyo/FlaskUrlShortener
-https://github.com/poppuyo/FlaskUrlShortener
-Entry file: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
-Scanned: 2016-10-25 23:30:01.086895
-Vulnerability 1:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 95, trigger word "replace(":
- requested_shortened = requested_shortened.replace(request.url_root, '')
-
-Vulnerability 2:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 98, trigger word "execute(":
- cur.execute('SELECT url FROM urls where shortened=%s', [requested_shortened])
-
-Vulnerability 3:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 100, trigger word "execute(":
- cur = g.db.execute('SELECT url FROM urls where shortened=?', [requested_shortened])
-
-Vulnerability 4:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 93, trigger word "get(":
- requested_shortened = request.args.get('shortened')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 97: cur = g.db.cursor()
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 104, trigger word "url_for(":
- short_url = request.url_root.rstrip('/') + url_for('find_shortened',shortened=requested_shortened)
-
-Vulnerability 5:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 149, trigger word "execute(":
- cur.execute('WITH new_values (url, shortened) as ( values (%s, %s) ), ' + 'upsert as ' + '( update urls u set url = nv.url, shortened = nv.shortened ' + ' FROM new_values nv WHERE u.url = nv.url RETURNING u.* )' + ' INSERT INTO urls (url, shortened) ' + ' SELECT url, shortened FROM new_values WHERE NOT EXISTS ' + ' (SELECT 1 FROM upsert up WHERE up.url = new_values.url)', [stripped_url, untrimmed_shortened[leftstring_length]])
-
-Vulnerability 6:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 160, trigger word "execute(":
- g.db.execute('UPDATE urls SET url=?, shortened=? WHERE url=?', [stripped_url, untrimmed_shortened[leftstring_length], stripped_url])
-
-Vulnerability 7:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 162, trigger word "execute(":
- g.db.execute('INSERT OR IGNORE INTO urls (url, shortened) VALUES (?, ?)', [stripped_url, untrimmed_shortened[leftstring_length]])
-
-Vulnerability 8:
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > User input at line 114, trigger word "form[":
- stripped_url = request.form['url'].rstrip(' ').rstrip('/')
-Reassigned in:
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 116: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 130: stripped_url = 'http://' + stripped_url
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 131: parsed_url = urlparse(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 140: untrimmed_shortened = shorten(stripped_url)
- File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length]
-File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py
- > reaches line 166, trigger word "flash(":
- flash(Markup('' + short_url + '' + ' now redirects to the following URL: ' + '' + stripped_url + ''))
-
-
-
-DonBeck69/FlaskWebProject2
-https://github.com/DonBeck69/FlaskWebProject2
-Entry file: None
-Scanned: 2016-10-25 23:30:01.637396
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-j1wu/wechat-enterprise-bot
-https://github.com/j1wu/wechat-enterprise-bot
-Entry file: None
-Scanned: 2016-10-25 23:30:03.841450
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/j1wu/wechat-enterprise-bot.
-
-chamambom/flask_sqlalchemy_crud
-https://github.com/chamambom/flask_sqlalchemy_crud
-Entry file: flask_sqlalchemy_crud/sqlcrud.py
-Scanned: 2016-10-25 23:30:05.293192
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pyd-testing/flask-docker-workflow
-https://github.com/pyd-testing/flask-docker-workflow
-Entry file: flask-docker-workflow/app/app.py
-Scanned: 2016-10-25 23:30:06.978141
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-HYL13/flask_project_0
-https://github.com/HYL13/flask_project_0
-Entry file: flask_project_0/app/__init__.py
-Scanned: 2016-10-25 23:30:08.655282
-Vulnerability 1:
-File: flask_project_0/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_project_0/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_project_0/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_project_0/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flask_project_0/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_project_0/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_project_0/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_project_0/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flask_project_0/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_project_0/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_project_0/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_project_0/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flask_project_0/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_project_0/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_project_0/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_project_0/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flask_project_0/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_project_0/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_project_0/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_project_0/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flask_project_0/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 55: posts = pagination.items
- File: flask_project_0/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flask_project_0/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 45: show_followed = False
- File: flask_project_0/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flask_project_0/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 67: posts = pagination.items
-File: flask_project_0/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flask_project_0/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask_project_0/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 134: comments = pagination.items
- File: flask_project_0/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask_project_0/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flask_project_0/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_project_0/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flask_project_0/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_project_0/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_project_0/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flask_project_0/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_project_0/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_project_0/app/main/views.py
- > Line 246: comments = pagination.items
-File: flask_project_0/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-EsmondMoe/flask-globalcache-http-api
-https://github.com/EsmondMoe/flask-globalcache-http-api
-Entry file: flask-globalcache-http-api/app.py
-Scanned: 2016-10-25 23:30:15.325226
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pbsugg/flask_testbed_server
-https://github.com/pbsugg/flask_testbed_server
-Entry file: flask_testbed_server/main.py
-Scanned: 2016-10-25 23:30:16.652225
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-gr8shivam/Flask---Handling-File-Uploads
-https://github.com/gr8shivam/Flask---Handling-File-Uploads
-Entry file: Flask---Handling-File-Uploads/app/__init__.py
-Scanned: 2016-10-25 23:30:18.473777
-No vulnerabilities found.
-
-
-anthonybrown/Flask-web-API-demo
-https://github.com/anthonybrown/Flask-web-API-demo
-Entry file: Flask-web-API-demo/app.py
-Scanned: 2016-10-25 23:30:22.638415
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-web-API-demo/venv/lib/python2.7/sre_compile.py
-
-myCSprojects/PythonFlask-IBMBluemix
-https://github.com/myCSprojects/PythonFlask-IBMBluemix
-Entry file: PythonFlask-IBMBluemix/welcome.py
-Scanned: 2016-10-25 23:30:29.783091
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Kriordan/flask-hello-world
-https://github.com/Kriordan/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:30:30.351865
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-mdublin/Flask-SPA-API-Template
-https://github.com/mdublin/Flask-SPA-API-Template
-Entry file: Flask-SPA-API-Template/posts/__init__.py
-Scanned: 2016-10-25 23:30:35.275258
-Vulnerability 1:
-File: Flask-SPA-API-Template/posts/api.py
- > User input at line 32, trigger word "get(":
- title_like = request.args.get('title_like')
-Reassigned in:
- File: Flask-SPA-API-Template/posts/api.py
- > Line 37: posts = posts.order_by(models.Post.id)
- File: Flask-SPA-API-Template/posts/api.py
- > Line 47: data = json.dumps([post.as_dictionary() for post in posts])
- File: Flask-SPA-API-Template/posts/api.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json')
- File: Flask-SPA-API-Template/posts/api.py
- > Line 34: posts = session.query(models.Post)
-File: Flask-SPA-API-Template/posts/api.py
- > reaches line 36, trigger word "filter(":
- posts = posts.filter(models.Post.title.contains(title_like))
-
-
-
-dwisulfahnur/My-flask-app
-https://github.com/dwisulfahnur/My-flask-app
-Entry file: None
-Scanned: 2016-10-25 23:30:36.739470
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dwisulfahnur/My-flask-app.
-
-andreffs18/flask-template-project
-https://github.com/andreffs18/flask-template-project
-Entry file: flask-template-project/project/__init__.py
-Scanned: 2016-10-25 23:30:38.301437
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-MatthewHodgson/flask-by-example
-https://github.com/MatthewHodgson/flask-by-example
-Entry file: flask-by-example/app.py
-Scanned: 2016-10-25 23:30:45.264813
-No vulnerabilities found.
-
-
-ssam123/flask-blog-tutorial
-https://github.com/ssam123/flask-blog-tutorial
-Entry file: flask-blog-tutorial/__init__.py
-Scanned: 2016-10-25 23:30:46.752792
-Vulnerability 1:
-File: flask-blog-tutorial/author/views.py
- > User input at line 31, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flask-blog-tutorial/author/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
- File: flask-blog-tutorial/author/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error)
-File: flask-blog-tutorial/author/views.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 2:
-File: flask-blog-tutorial/blog/views.py
- > User input at line 127, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: flask-blog-tutorial/blog/views.py
- > Line 129: slug = slugify(title)
- File: flask-blog-tutorial/blog/views.py
- > Line 130: post = Post(blog, author, title, body, category, filename, slug)
- File: flask-blog-tutorial/blog/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: flask-blog-tutorial/blog/views.py
- > reaches line 133, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-Vulnerability 3:
-File: flask-blog-tutorial/blog/views.py
- > User input at line 127, trigger word ".data":
- title = form.title.data
-Reassigned in:
- File: flask-blog-tutorial/blog/views.py
- > Line 129: slug = slugify(title)
- File: flask-blog-tutorial/blog/views.py
- > Line 130: post = Post(blog, author, title, body, category, filename, slug)
- File: flask-blog-tutorial/blog/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new')
-File: flask-blog-tutorial/blog/views.py
- > reaches line 133, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug))
-
-
-
-kevinlondon/flask-hello-world
-https://github.com/kevinlondon/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:30:47.273320
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yun70/flask-rest-api
-https://github.com/yun70/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-25 23:30:49.383924
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-valexandersaulys/flask_microblog_tutorial
-https://github.com/valexandersaulys/flask_microblog_tutorial
-Entry file: flask_microblog_tutorial/app/__init__.py
-Scanned: 2016-10-25 23:30:50.820131
-No vulnerabilities found.
-
-
-kfiras/cloudfoundry-flask-webservice
-https://github.com/kfiras/cloudfoundry-flask-webservice
-Entry file: cloudfoundry-flask-webservice/app.py
-Scanned: 2016-10-25 23:30:52.230571
-Vulnerability 1:
-File: cloudfoundry-flask-webservice/app.py
- > User input at line 80, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: cloudfoundry-flask-webservice/app.py
- > reaches line 87, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201)
-
-
-
-MrLeeh/flask-mega-tutorial
-https://github.com/MrLeeh/flask-mega-tutorial
-Entry file: None
-Scanned: 2016-10-25 23:30:52.742825
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MrLeeh/flask-mega-tutorial.
-
-wenzhihong2003/awesome-flask-todo
-https://github.com/wenzhihong2003/awesome-flask-todo
-Entry file: awesome-flask-todo/app/__init__.py
-Scanned: 2016-10-25 23:30:54.030668
-No vulnerabilities found.
-
-
-viney-shih/Flask_App_Template
-https://github.com/viney-shih/Flask_App_Template
-Entry file: Flask_App_Template/app/__init__.py
-Scanned: 2016-10-25 23:30:55.342116
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-davehalladay/openr-flask-api
-https://github.com/davehalladay/openr-flask-api
-Entry file: openr-flask-api/main.py
-Scanned: 2016-10-25 23:30:56.768170
-No vulnerabilities found.
-
-
-momotaro98/flask-for-test
-https://github.com/momotaro98/flask-for-test
-Entry file: flask-for-test/app.py
-Scanned: 2016-10-25 23:30:58.059484
-No vulnerabilities found.
-
-
-andela-mochieng/flask-practice-tutorial
-https://github.com/andela-mochieng/flask-practice-tutorial
-Entry file: flask-practice-tutorial/app/__init__.py
-Scanned: 2016-10-25 23:30:59.349394
-No vulnerabilities found.
-
-
-GreenDragonSoft/flask-heroku-template
-https://github.com/GreenDragonSoft/flask-heroku-template
-Entry file: flask-heroku-template/app.py
-Scanned: 2016-10-25 23:31:00.762990
-No vulnerabilities found.
-
-
-mahfuzsust/flask-heroku-intro
-https://github.com/mahfuzsust/flask-heroku-intro
-Entry file: flask-heroku-intro/app.py
-Scanned: 2016-10-25 23:31:02.637057
-No vulnerabilities found.
-
-
-MoodyLyrics/flask
-https://github.com/MoodyLyrics/flask
-Entry file: None
-Scanned: 2016-10-25 23:31:04.936269
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sunshine-sjd/Flask
-https://github.com/sunshine-sjd/Flask
-Entry file: None
-Scanned: 2016-10-25 23:31:05.464422
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-unikatsieben/flask
-https://github.com/unikatsieben/flask
-Entry file: None
-Scanned: 2016-10-25 23:31:05.998167
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Mei-Lin-Chen/Flask
-https://github.com/Mei-Lin-Chen/Flask
-Entry file: None
-Scanned: 2016-10-25 23:31:06.570573
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kakshi3242/Flask
-https://github.com/kakshi3242/Flask
-Entry file: None
-Scanned: 2016-10-25 23:31:08.094369
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dannyec/flask
-https://github.com/dannyec/flask
-Entry file: None
-Scanned: 2016-10-25 23:31:14.617481
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Abirdcfly/flask-blog
-https://github.com/Abirdcfly/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:31:17.632692
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rainyear/MathModeBot
-https://github.com/rainyear/MathModeBot
-Entry file: MathModeBot/main.py
-Scanned: 2016-10-25 23:31:19.054659
-No vulnerabilities found.
-
-
-jrhuerta/flask-api
-https://github.com/jrhuerta/flask-api
-Entry file: None
-Scanned: 2016-10-25 23:31:19.579272
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrhuerta/flask-api.
-
-josepablob/flasktaskr
-https://github.com/josepablob/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:31:24.140381
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wangduanyang/flasky
-https://github.com/wangduanyang/flasky
-Entry file: None
-Scanned: 2016-10-25 23:31:31.154357
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-srbhtest/flaskwebsite
-https://github.com/srbhtest/flaskwebsite
-Entry file: flaskwebsite/__init__.py
-Scanned: 2016-10-25 23:31:37.508478
-No vulnerabilities found.
-
-
-super452/flasky
-https://github.com/super452/flasky
-Entry file: None
-Scanned: 2016-10-25 23:31:38.030668
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-huachen0216/flaskdemo
-https://github.com/huachen0216/flaskdemo
-Entry file: None
-Scanned: 2016-10-25 23:31:39.565847
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MrLokans/flaskr
-https://github.com/MrLokans/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:31:46.084928
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MrLokans/flaskr.
-
-citizen-stig/flaskone
-https://github.com/citizen-stig/flaskone
-Entry file: flaskone/flask_one.py
-Scanned: 2016-10-25 23:31:48.385644
-No vulnerabilities found.
-
-
-ifcheung2012/flaskanalysis
-https://github.com/ifcheung2012/flaskanalysis
-Entry file: flaskanalysis/manage.py
-Scanned: 2016-10-25 23:31:49.693949
-No vulnerabilities found.
-
-
-Robotwing/flaskweb
-https://github.com/Robotwing/flaskweb
-Entry file: None
-Scanned: 2016-10-25 23:31:50.229193
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-neo1218/m2m
-https://github.com/neo1218/m2m
-Entry file: m2m/m2m/app/__init__.py
-Scanned: 2016-10-25 23:31:52.641496
-No vulnerabilities found.
-
-
-fhamami/flaskone
-https://github.com/fhamami/flaskone
-Entry file: flaskone/app/__init__.py
-Scanned: 2016-10-25 23:31:54.164063
-No vulnerabilities found.
-
-
-windery/flasky
-https://github.com/windery/flasky
-Entry file: None
-Scanned: 2016-10-25 23:31:54.691259
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kcunning/flask-class-c9
-https://github.com/kcunning/flask-class-c9
-Entry file: flask-class-c9/flaskclass/app/__init__.py
-Scanned: 2016-10-25 23:31:56.142231
-Vulnerability 1:
-File: flask-class-c9/flaskclass/app/views.py
- > User input at line 38, trigger word ".data":
- numbers = form.numbers.data
-Reassigned in:
- File: flask-class-c9/flaskclass/app/views.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
- File: flask-class-c9/flaskclass/app/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
-File: flask-class-c9/flaskclass/app/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins)
-
-
-
-MarHelen/FlaskLogin
-https://github.com/MarHelen/FlaskLogin
-Entry file: FlaskLogin/sql_declarative.py
-Scanned: 2016-10-25 23:32:00.413793
-Vulnerability 1:
-File: FlaskLogin/first.py
- > User input at line 63, trigger word "get(":
- email = request.form.get('email')
-Reassigned in:
- File: FlaskLogin/first.py
- > Line 70: user = User(email, request.form.get('pw'))
-File: FlaskLogin/first.py
- > reaches line 65, trigger word "filter(":
- temp_user_set = User.query.filter(User.email == email).first()
-
-
-
-tangza/FlaskAPP
-https://github.com/tangza/FlaskAPP
-Entry file: None
-Scanned: 2016-10-25 23:32:00.980488
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-louiskun/flaskGIT
-https://github.com/louiskun/flaskGIT
-Entry file: flaskGIT/sessionmail.py
-Scanned: 2016-10-25 23:32:05.561376
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flaskGIT/venv/lib/python2.7/sre_compile.py
-
-narakai/FlaskDemo
-https://github.com/narakai/FlaskDemo
-Entry file: FlaskDemo/flask_demo.py
-Scanned: 2016-10-25 23:32:06.927031
-No vulnerabilities found.
-
-
-sethblack/python-flask-pixel-tracking
-https://github.com/sethblack/python-flask-pixel-tracking
-Entry file: python-flask-pixel-tracking/pfpt/main.py
-Scanned: 2016-10-25 23:32:08.427040
-No vulnerabilities found.
-
-
-kloudsec/py-webkit2png-flask-api
-https://github.com/kloudsec/py-webkit2png-flask-api
-Entry file: py-webkit2png-flask-api/api/app.py
-Scanned: 2016-10-25 23:32:10.367772
-Vulnerability 1:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 25, trigger word "get(":
- url = request.args.get('url', None)
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 2:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 26, trigger word "get(":
- width = int(request.args.get('width', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 3:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 27, trigger word "get(":
- height = int(request.args.get('height', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 4:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 28, trigger word "get(":
- scale = float(request.args.get('scale', 0.5))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 46, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 5:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 25, trigger word "get(":
- url = request.args.get('url', None)
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 6:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 26, trigger word "get(":
- width = int(request.args.get('width', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 7:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 27, trigger word "get(":
- height = int(request.args.get('height', 400))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-Vulnerability 8:
-File: py-webkit2png-flask-api/api/web.py
- > User input at line 28, trigger word "get(":
- scale = float(request.args.get('scale', 0.5))
-Reassigned in:
- File: py-webkit2png-flask-api/api/web.py
- > Line 33: x_width = int(width / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 34: x_height = int(height / scale)
- File: py-webkit2png-flask-api/api/web.py
- > Line 36: params = 'url''width''height''scale'urlwidthheightscale
- File: py-webkit2png-flask-api/api/web.py
- > Line 43: cache_filename = slugify(json.dumps(params))
- File: py-webkit2png-flask-api/api/web.py
- > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename)
- File: py-webkit2png-flask-api/api/web.py
- > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png')
- File: py-webkit2png-flask-api/api/web.py
- > Line 79: worked_image = img.crop((0, 0, x_width, x_height))
- File: py-webkit2png-flask-api/api/web.py
- > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS)
-File: py-webkit2png-flask-api/api/web.py
- > reaches line 83, trigger word "send_file(":
- ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png')
-
-
-
-jeffreybergman/flask-blog
-https://github.com/jeffreybergman/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:32:10.904669
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-s-kovacevic/elearning-flask
-https://github.com/s-kovacevic/elearning-flask
-Entry file: elearning-flask/main.py
-Scanned: 2016-10-25 23:32:12.360126
-Vulnerability 1:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 71, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi())
-
-Vulnerability 2:
-File: elearning-flask/main.py
- > User input at line 84, trigger word ".data":
- user = User(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 69: user = User()
- File: elearning-flask/main.py
- > Line 73: user = User()
- File: elearning-flask/main.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 74, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()])
-
-Vulnerability 3:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 99, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi())
-
-Vulnerability 4:
-File: elearning-flask/main.py
- > User input at line 116, trigger word ".data":
- question = Question(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 97: question = Question()
- File: elearning-flask/main.py
- > Line 101: question = Question()
- File: elearning-flask/main.py
- > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 102, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()])
-
-Vulnerability 5:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 131, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi())
-
-Vulnerability 6:
-File: elearning-flask/main.py
- > User input at line 148, trigger word ".data":
- category = Category(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 129: category = Category()
- File: elearning-flask/main.py
- > Line 133: category = Category()
- File: elearning-flask/main.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 134, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()])
-
-Vulnerability 7:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 163, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi())
-
-Vulnerability 8:
-File: elearning-flask/main.py
- > User input at line 180, trigger word ".data":
- answer = Answer(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 161: answer = Answer()
- File: elearning-flask/main.py
- > Line 165: answer = Answer()
- File: elearning-flask/main.py
- > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 166, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()])
-
-Vulnerability 9:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 195, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi())
-
-Vulnerability 10:
-File: elearning-flask/main.py
- > User input at line 212, trigger word ".data":
- score = Score(json_obj=request.data)
-Reassigned in:
- File: elearning-flask/main.py
- > Line 193: score = Score()
- File: elearning-flask/main.py
- > Line 197: score = Score()
- File: elearning-flask/main.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
- File: elearning-flask/main.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify()
- File: elearning-flask/main.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error')
-File: elearning-flask/main.py
- > reaches line 198, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()])
-
-
-
-logicalicy/flask_boostrap
-https://github.com/logicalicy/flask_boostrap
-Entry file: flask_boostrap/app/__init__.py
-Scanned: 2016-10-25 23:32:13.773549
-No vulnerabilities found.
-
-
-MrLokans/discover_flask
-https://github.com/MrLokans/discover_flask
-Entry file: discover_flask/app.py
-Scanned: 2016-10-25 23:32:15.447476
-No vulnerabilities found.
-
-
-Karambir-K/Flask-Intro
-https://github.com/Karambir-K/Flask-Intro
-Entry file: Flask-Intro/app.py
-Scanned: 2016-10-25 23:32:16.887925
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-xiazhe/flask-demo
-https://github.com/xiazhe/flask-demo
-Entry file: flask-demo/app/__init__.py
-Scanned: 2016-10-25 23:32:18.313791
-No vulnerabilities found.
-
-
-nikoheikkila/flask-blog
-https://github.com/nikoheikkila/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:32:18.842352
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Vatsalgame/flask-try
-https://github.com/Vatsalgame/flask-try
-Entry file: None
-Scanned: 2016-10-25 23:32:19.378933
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Vatsalgame/flask-try.
-
-bbozhev/flask-test
-https://github.com/bbozhev/flask-test
-Entry file: flask-test/app/__init__.py
-Scanned: 2016-10-25 23:32:26.566102
-No vulnerabilities found.
-
-
-tim1978/flask-blog
-https://github.com/tim1978/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:32:30.708451
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-danielcodes/flask-practice
-https://github.com/danielcodes/flask-practice
-Entry file: flask-practice/flask-file-upload/app.py
-Scanned: 2016-10-25 23:32:32.455430
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhiweicai/flask-hello
-https://github.com/zhiweicai/flask-hello
-Entry file: flask-hello/flask-hello.py
-Scanned: 2016-10-25 23:32:37.745232
-No vulnerabilities found.
-
-
-GreenDragonSoft/refundmytrain-flask
-https://github.com/GreenDragonSoft/refundmytrain-flask
-Entry file: refundmytrain-flask/app.py
-Scanned: 2016-10-25 23:32:39.156938
-No vulnerabilities found.
-
-
-keithleit/flask-demo
-https://github.com/keithleit/flask-demo
-Entry file: flask-demo/app.py
-Scanned: 2016-10-25 23:32:40.522616
-Vulnerability 1:
-File: flask-demo/app.py
- > User input at line 17, trigger word "get(":
- stocks = request.args.get('stock')
-Reassigned in:
- File: flask-demo/app.py
- > Line 19: stocks = 'goog, fb'
-File: flask-demo/app.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',script=script, div=div, code=stocks, checks=checks, error=error)
-
-
-
-wstcpyt/flask-demo
-https://github.com/wstcpyt/flask-demo
-Entry file: flask-demo/app.py
-Scanned: 2016-10-25 23:32:47.856101
-Vulnerability 1:
-File: flask-demo/app.py
- > User input at line 36, trigger word "form[":
- stock_sticker = 'WIKI/' + request.form['stocksticker']
-Reassigned in:
- File: flask-demo/app.py
- > Line 47: stockdata = Quandl.get(stock_sticker,returns='numpy', trim_start=firstdaystr, trim_end=lastdaystr)
- File: flask-demo/app.py
- > Line 60: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errormessage=errormessage)
-File: flask-demo/app.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, text=stock_sticker)
-
-
-
-geraldmc/flask-template
-https://github.com/geraldmc/flask-template
-Entry file: flask-template/app/__init__.py
-Scanned: 2016-10-25 23:32:50.068624
-No vulnerabilities found.
-
-
-jordo1ken/flask-fibonacci
-https://github.com/jordo1ken/flask-fibonacci
-Entry file: flask-fibonacci/Fibonacci.py
-Scanned: 2016-10-25 23:32:51.462270
-No vulnerabilities found.
-
-
-bodzio2k/flask-blueprint
-https://github.com/bodzio2k/flask-blueprint
-Entry file: flask-blueprint/run.py
-Scanned: 2016-10-25 23:32:52.751492
-No vulnerabilities found.
-
-
-PeachDew/flask_tutorialwebapp
-https://github.com/PeachDew/flask_tutorialwebapp
-Entry file: flask_tutorialwebapp/app.py
-Scanned: 2016-10-25 23:32:57.853991
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-ktomlee/flask_init
-https://github.com/ktomlee/flask_init
-Entry file: flask_init/hello.py
-Scanned: 2016-10-25 23:32:59.173678
-No vulnerabilities found.
-
-
-abunuwas/flask_experiments
-https://github.com/abunuwas/flask_experiments
-Entry file: None
-Scanned: 2016-10-25 23:33:00.198289
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/abunuwas/flask_experiments.
-
-Joryang/flask_videos
-https://github.com/Joryang/flask_videos
-Entry file: flask_videos/videos.py
-Scanned: 2016-10-25 23:33:02.295813
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-AvijitGhosh82/appengine_flask
-https://github.com/AvijitGhosh82/appengine_flask
-Entry file: appengine_flask/main.py
-Scanned: 2016-10-25 23:33:05.244295
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-sadev1/flask-demo
-https://github.com/sadev1/flask-demo
-Entry file: flask-demo/app.py
-Scanned: 2016-10-25 23:33:06.604904
-No vulnerabilities found.
-
-
-markleung1969/flask-base
-https://github.com/markleung1969/flask-base
-Entry file: flask-base/init.py
-Scanned: 2016-10-25 23:33:07.940756
-Vulnerability 1:
-File: flask-base/apps/auth/views.py
- > User input at line 112, trigger word "get(":
- user_id = session.get('user_id')
-Reassigned in:
- File: flask-base/apps/auth/views.py
- > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus
-File: flask-base/apps/auth/views.py
- > reaches line 129, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(resp)
-
-Vulnerability 2:
-File: flask-base/apps/auth/views.py
- > User input at line 113, trigger word "get(":
- username = session.get('username')
-Reassigned in:
- File: flask-base/apps/auth/views.py
- > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus
-File: flask-base/apps/auth/views.py
- > reaches line 129, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(resp)
-
-Vulnerability 3:
-File: flask-base/apps/auth/views.py
- > User input at line 114, trigger word "get(":
- email = session.get('email')
-Reassigned in:
- File: flask-base/apps/auth/views.py
- > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus
-File: flask-base/apps/auth/views.py
- > reaches line 129, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(resp)
-
-Vulnerability 4:
-File: flask-base/apps/auth/views.py
- > User input at line 115, trigger word "get(":
- status = session.get('status')
-Reassigned in:
- File: flask-base/apps/auth/views.py
- > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus
-File: flask-base/apps/auth/views.py
- > reaches line 129, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(resp)
-
-Vulnerability 5:
-File: flask-base/apps/auth/views.py
- > User input at line 116, trigger word "get(":
- group = session.get('group')
-Reassigned in:
- File: flask-base/apps/auth/views.py
- > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus
-File: flask-base/apps/auth/views.py
- > reaches line 129, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(resp)
-
-
-
-NickyThreeNames/flask_blog
-https://github.com/NickyThreeNames/flask_blog
-Entry file: flask_blog/blog.py
-Scanned: 2016-10-25 23:33:09.225633
-No vulnerabilities found.
-
-
-zmrfzn/Flask_Sample
-https://github.com/zmrfzn/Flask_Sample
-Entry file: Flask_Sample/app.py
-Scanned: 2016-10-25 23:33:12.403893
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-JesseLabruyere/flask_api
-https://github.com/JesseLabruyere/flask_api
-Entry file: flask_api/flask_project/routes.py
-Scanned: 2016-10-25 23:33:16.825883
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_api/flask_project/venv/lib/python2.7/sre_compile.py
-
-butovichev/flask-blog
-https://github.com/butovichev/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:33:17.407059
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pyx/flask-simplemde
-https://github.com/pyx/flask-simplemde
-Entry file: flask-simplemde/examples/simple/app.py
-Scanned: 2016-10-25 23:33:19.119751
-No vulnerabilities found.
-
-
-rholmes69/flasky2_1
-https://github.com/rholmes69/flasky2_1
-Entry file: flasky2_1/app/__init__.py
-Scanned: 2016-10-25 23:33:20.740463
-Vulnerability 1:
-File: flasky2_1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2_1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2_1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2_1/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flasky2_1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2_1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2_1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2_1/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flasky2_1/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flasky2_1/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flasky2_1/app/api_1_0/posts.py
- > Line 19: next = None
-File: flasky2_1/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 20: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 23: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flasky2_1/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flasky2_1/app/api_1_0/users.py
- > Line 42: prev = None
- File: flasky2_1/app/api_1_0/users.py
- > Line 45: next = None
-File: flasky2_1/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 18: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flasky2_1/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flasky2_1/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flasky2_1/app/api_1_0/comments.py
- > Line 46: next = None
-File: flasky2_1/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flasky2_1/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 55: posts = pagination.items
- File: flasky2_1/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flasky2_1/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 45: show_followed = False
- File: flasky2_1/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flasky2_1/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 67: posts = pagination.items
-File: flasky2_1/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flasky2_1/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flasky2_1/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 134: comments = pagination.items
- File: flasky2_1/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flasky2_1/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flasky2_1/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flasky2_1/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flasky2_1/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flasky2_1/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flasky2_1/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flasky2_1/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flasky2_1/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flasky2_1/app/main/views.py
- > Line 246: comments = pagination.items
-File: flasky2_1/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-ChellsChen/FlaskSocketIOChart
-https://github.com/ChellsChen/FlaskSocketIOChart
-Entry file: FlaskSocketIOChart/app/__init__.py
-Scanned: 2016-10-25 23:33:22.885009
-Vulnerability 1:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 31, trigger word "get(":
- name = session.get('name', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-Vulnerability 2:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 32, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-
-
-jcerise/openspacesboard-python
-https://github.com/jcerise/openspacesboard-python
-Entry file: openspacesboard-python/osbp_app/openspacesboard.py
-Scanned: 2016-10-25 23:33:25.348027
-Vulnerability 1:
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > User input at line 44, trigger word "get(":
- me = github.get('user')
-Reassigned in:
- File: openspacesboard-python/osbp_app/openspacesboard.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > reaches line 45, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(me.data)
-
-Vulnerability 2:
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > User input at line 69, trigger word "get(":
- me = github.get('user')
-Reassigned in:
- File: openspacesboard-python/osbp_app/openspacesboard.py
- > Line 64: ret_MAYBE_FUNCTION_NAME = 'Access denied: reason=%s error=%s' % (request.args['error'], request.args['error_description'])
-File: openspacesboard-python/osbp_app/openspacesboard.py
- > reaches line 70, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(me.data)
-
-Vulnerability 3:
-File: openspacesboard-python/osbp_app/mod_spaces/controllers.py
- > User input at line 29, trigger word "get(":
- space = ConferenceSpace.query.get(space_id)
-Reassigned in:
- File: openspacesboard-python/osbp_app/mod_spaces/controllers.py
- > Line 32: space = dict(id=space.id, space_name=space.space_name, location_id=space.location_id, event_date=space.event_date, start_time=space.start_time, end_time=space.end_time)
-File: openspacesboard-python/osbp_app/mod_spaces/controllers.py
- > reaches line 34, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('space'space)
-
-Vulnerability 4:
-File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > User input at line 39, trigger word "get(":
- session = ConferenceSession.query.get(session_id)
-Reassigned in:
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 42: session_space = session.space
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 43: session_location = session_space.location
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 44: timespan = 'start_time''end_time'session_space.start_timesession_space.end_time
- File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > Line 45: session = dict(id=session.id, title=session.title, description=session.description, convener=session.convener, space_name=session_space.space_name, location=session_location.name, date=session_space.event_date, timespan=timespan)
-File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('session'session)
-
-Vulnerability 5:
-File: openspacesboard-python/osbp_app/mod_locations/controllers.py
- > User input at line 27, trigger word "get(":
- location = ConferenceLocation.query.get(location_id)
-Reassigned in:
- File: openspacesboard-python/osbp_app/mod_locations/controllers.py
- > Line 30: location = dict(id=location.id, name=location.name)
-File: openspacesboard-python/osbp_app/mod_locations/controllers.py
- > reaches line 31, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('location'location)
-
-
-
-icecraft/ZhiHuDaemon
-https://github.com/icecraft/ZhiHuDaemon
-Entry file: ZhiHuDaemon/app/__init__.py
-Scanned: 2016-10-25 23:33:26.954768
-Vulnerability 1:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 16: pagination = Question.query.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 19: questions = pagination.items
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',questions=questions, pagination=pagination)
-
-Vulnerability 2:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 26, trigger word "form[":
- keyword = '%' + request.form['search'] + '%'
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 30, trigger word "filter(":
- pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False)
-
-Vulnerability 3:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 29, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 33: questions = pagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 30, trigger word "filter(":
- pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False)
-
-Vulnerability 4:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 26, trigger word "form[":
- keyword = '%' + request.form['search'] + '%'
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1])
-
-Vulnerability 5:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 29, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 33: questions = pagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
- File: ZhiHuDaemon/app/main/views.py
- > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html')
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1])
-
-Vulnerability 6:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 100, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 104: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 105: page = request.args.get('page', 1,type=int)
- File: ZhiHuDaemon/app/main/views.py
- > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 109: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 110: answers = anspagination.items
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination)
-
-Vulnerability 7:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 105, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 100: page = request.args.get('page', 1,type=int)
- File: ZhiHuDaemon/app/main/views.py
- > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 104: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False)
- File: ZhiHuDaemon/app/main/views.py
- > Line 109: questions = askpagination.items
- File: ZhiHuDaemon/app/main/views.py
- > Line 110: answers = anspagination.items
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination)
-
-Vulnerability 8:
-File: ZhiHuDaemon/app/main/views.py
- > User input at line 145, trigger word "get(":
- answer_id = request.args.get('answer_id', -1,type=int)
-Reassigned in:
- File: ZhiHuDaemon/app/main/views.py
- > Line 147: answer = Answer.query.filter_by(id=answer_id)
- File: ZhiHuDaemon/app/main/views.py
- > Line 150: answer = Answer(answer=answerForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, question=question)
- File: ZhiHuDaemon/app/main/views.py
- > Line 159: comment = Comment(comment=commentForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, answer=answer)
- File: ZhiHuDaemon/app/main/views.py
- > Line 155: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id))
- File: ZhiHuDaemon/app/main/views.py
- > Line 164: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id))
-File: ZhiHuDaemon/app/main/views.py
- > reaches line 168, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('question.html',question=question, asker=asker, answerForm=answerForm, answers=answers, comments=comments, commentForm=commentForm, answer_id=answer_id)
-
-
-
-AntonisFK/Login_registration_Flask
-https://github.com/AntonisFK/Login_registration_Flask
-Entry file: None
-Scanned: 2016-10-25 23:33:28.233102
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AntonisFK/Login_registration_Flask.
-
-liuenyan/micro-flask-blog
-https://github.com/liuenyan/micro-flask-blog
-Entry file: micro-flask-blog/app/__init__.py
-Scanned: 2016-10-25 23:33:31.699963
-Vulnerability 1:
-File: micro-flask-blog/app/main/views.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 19: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: micro-flask-blog/app/main/views.py
- > User input at line 124, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 126: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 127, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id)
-
-
-
-jeseon/flask-by-example
-https://github.com/jeseon/flask-by-example
-Entry file: None
-Scanned: 2016-10-25 23:33:33.090980
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeseon/flask-by-example.
-
-maxidrum/Flask_and_Mongo
-https://github.com/maxidrum/Flask_and_Mongo
-Entry file: Flask_and_Mongo/application/__init__.py
-Scanned: 2016-10-25 23:33:41.442168
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mdublin/Flask-SPA-API-Template
-https://github.com/mdublin/Flask-SPA-API-Template
-Entry file: Flask-SPA-API-Template/posts/__init__.py
-Scanned: 2016-10-25 23:33:51.577406
-Vulnerability 1:
-File: Flask-SPA-API-Template/posts/api.py
- > User input at line 32, trigger word "get(":
- title_like = request.args.get('title_like')
-Reassigned in:
- File: Flask-SPA-API-Template/posts/api.py
- > Line 37: posts = posts.order_by(models.Post.id)
- File: Flask-SPA-API-Template/posts/api.py
- > Line 47: data = json.dumps([post.as_dictionary() for post in posts])
- File: Flask-SPA-API-Template/posts/api.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json')
- File: Flask-SPA-API-Template/posts/api.py
- > Line 34: posts = session.query(models.Post)
-File: Flask-SPA-API-Template/posts/api.py
- > reaches line 36, trigger word "filter(":
- posts = posts.filter(models.Post.title.contains(title_like))
-
-
-
-keimos/flask-rest-sql
-https://github.com/keimos/flask-rest-sql
-Entry file: flask-rest-sql/app.py
-Scanned: 2016-10-25 23:33:52.942154
-No vulnerabilities found.
-
-
-jeffreybergman/flask-hello-world
-https://github.com/jeffreybergman/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:33:53.460965
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zolaneta/todo_flask_application
-https://github.com/zolaneta/todo_flask_application
-Entry file: None
-Scanned: 2016-10-25 23:33:55.235529
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/todo_flask_application.
-
-baskervilski/flask-hello-world
-https://github.com/baskervilski/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:33:55.804687
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Bbouley/flask-by-example
-https://github.com/Bbouley/flask-by-example
-Entry file: None
-Scanned: 2016-10-25 23:33:59.336547
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Bbouley/flask-by-example.
-
-wilbert-abreu/realtime_slack_flask_app
-https://github.com/wilbert-abreu/realtime_slack_flask_app
-Entry file: None
-Scanned: 2016-10-25 23:34:05.596249
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ellachao/Flask_GmailAPI_Example
-https://github.com/ellachao/Flask_GmailAPI_Example
-Entry file: Flask_GmailAPI_Example/main.py
-Scanned: 2016-10-25 23:34:06.918626
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-NJIT-SIG-WEBDEV/Flask-URL-Shortner
-https://github.com/NJIT-SIG-WEBDEV/Flask-URL-Shortner
-Entry file: Flask-URL-Shortner/app.py
-Scanned: 2016-10-25 23:34:08.474827
-Vulnerability 1:
-File: Flask-URL-Shortner/app.py
- > User input at line 30, trigger word ".data":
- site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id']
-Reassigned in:
- File: Flask-URL-Shortner/app.py
- > Line 33: site_id = ''
- File: Flask-URL-Shortner/app.py
- > Line 35: site_id += random.choice(string.ascii_letters)
- File: Flask-URL-Shortner/app.py
- > Line 37: data = 'site_id''url'site_idform.url.data
-File: Flask-URL-Shortner/app.py
- > reaches line 43, trigger word "url_for(":
- flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data))
-
-Vulnerability 2:
-File: Flask-URL-Shortner/app.py
- > User input at line 30, trigger word ".data":
- site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id']
-Reassigned in:
- File: Flask-URL-Shortner/app.py
- > Line 33: site_id = ''
- File: Flask-URL-Shortner/app.py
- > Line 35: site_id += random.choice(string.ascii_letters)
- File: Flask-URL-Shortner/app.py
- > Line 37: data = 'site_id''url'site_idform.url.data
-File: Flask-URL-Shortner/app.py
- > reaches line 43, trigger word "flash(":
- flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data))
-
-
-
-hilmarh/island-python-flask-example
-https://github.com/hilmarh/island-python-flask-example
-Entry file: island-python-flask-example/app/__init__.py
-Scanned: 2016-10-25 23:34:09.908854
-No vulnerabilities found.
-
-
-dv3/sample-Flask-Application
-https://github.com/dv3/sample-Flask-Application
-Entry file: None
-Scanned: 2016-10-25 23:34:11.220611
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application.
-
-mml1/flask_multiple_forms
-https://github.com/mml1/flask_multiple_forms
-Entry file: flask_multiple_forms/server.py
-Scanned: 2016-10-25 23:34:12.532676
-No vulnerabilities found.
-
-
-jideobs/flask-gae-ndb-starter
-https://github.com/jideobs/flask-gae-ndb-starter
-Entry file: flask-gae-ndb-starter/server/main.py
-Scanned: 2016-10-25 23:34:14.101622
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-marcabomb/flask_hello_world
-https://github.com/marcabomb/flask_hello_world
-Entry file: flask_hello_world/app.py
-Scanned: 2016-10-25 23:34:18.260453
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kevin-js/azure-flask-tutorial
-https://github.com/kevin-js/azure-flask-tutorial
-Entry file: azure-flask-tutorial/run.py
-Scanned: 2016-10-25 23:34:19.610496
-No vulnerabilities found.
-
-
-ShawnPengxy/Flask-madeBlog
-https://github.com/ShawnPengxy/Flask-madeBlog
-Entry file: Flask-madeBlog/app/__init__.py
-Scanned: 2016-10-25 23:34:25.275745
-Vulnerability 1:
-File: Flask-madeBlog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 19: next = None
-File: Flask-madeBlog/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: Flask-madeBlog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 19: next = None
-File: Flask-madeBlog/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: Flask-madeBlog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: Flask-madeBlog/app/api_1_0/posts.py
- > Line 19: next = None
-File: Flask-madeBlog/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: Flask-madeBlog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-madeBlog/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: Flask-madeBlog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-madeBlog/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: Flask-madeBlog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-madeBlog/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: Flask-madeBlog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 42: prev = None
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 45: next = None
-File: Flask-madeBlog/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: Flask-madeBlog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 42: prev = None
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 45: next = None
-File: Flask-madeBlog/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: Flask-madeBlog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 42: prev = None
- File: Flask-madeBlog/app/api_1_0/users.py
- > Line 45: next = None
-File: Flask-madeBlog/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: Flask-madeBlog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-madeBlog/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: Flask-madeBlog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-madeBlog/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: Flask-madeBlog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-madeBlog/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: Flask-madeBlog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 46: next = None
-File: Flask-madeBlog/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: Flask-madeBlog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 46: next = None
-File: Flask-madeBlog/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: Flask-madeBlog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: Flask-madeBlog/app/api_1_0/comments.py
- > Line 46: next = None
-File: Flask-madeBlog/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 48, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 56: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/main/views.py
- > Line 59: posts = pagination.items
- File: Flask-madeBlog/app/main/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-madeBlog/app/main/views.py
- > reaches line 60, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 51, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 49: show_followed = False
- File: Flask-madeBlog/app/main/views.py
- > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-madeBlog/app/main/views.py
- > reaches line 60, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 67, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 68: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/main/views.py
- > Line 71: posts = pagination.items
-File: Flask-madeBlog/app/main/views.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 131, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 133: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Flask-madeBlog/app/main/views.py
- > Line 135: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/main/views.py
- > Line 138: comments = pagination.items
- File: Flask-madeBlog/app/main/views.py
- > Line 130: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Flask-madeBlog/app/main/views.py
- > reaches line 139, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 198, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 199: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/main/views.py
- > Line 202: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Flask-madeBlog/app/main/views.py
- > Line 197: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-madeBlog/app/main/views.py
- > reaches line 204, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 215, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 216: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/main/views.py
- > Line 219: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Flask-madeBlog/app/main/views.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-madeBlog/app/main/views.py
- > reaches line 221, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: Flask-madeBlog/app/main/views.py
- > User input at line 246, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-madeBlog/app/main/views.py
- > Line 247: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Flask-madeBlog/app/main/views.py
- > Line 250: comments = pagination.items
-File: Flask-madeBlog/app/main/views.py
- > reaches line 251, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-vinayraghavan/pyacacemy-flask-workshop
-https://github.com/vinayraghavan/pyacacemy-flask-workshop
-Entry file: pyacacemy-flask-workshop/bookmarks.py
-Scanned: 2016-10-25 23:34:26.677815
-No vulnerabilities found.
-
-
-drbrightside/first-flask-app
-https://github.com/drbrightside/first-flask-app
-Entry file: first-flask-app/flaskclass/app/__init__.py
-Scanned: 2016-10-25 23:34:28.087854
-Vulnerability 1:
-File: first-flask-app/flaskclass/app/views.py
- > User input at line 38, trigger word ".data":
- numbers = form.numbers.data
-Reassigned in:
- File: first-flask-app/flaskclass/app/views.py
- > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
- File: first-flask-app/flaskclass/app/views.py
- > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form)
-File: first-flask-app/flaskclass/app/views.py
- > reaches line 45, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins)
-
-
-
-D10221/gae_flask_ndb_test
-https://github.com/D10221/gae_flask_ndb_test
-Entry file: gae_flask_ndb_test/main.py
-Scanned: 2016-10-25 23:34:29.421872
-No vulnerabilities found.
-
-
-micahcourey/FirstFlaskApp
-https://github.com/micahcourey/FirstFlaskApp
-Entry file: FirstFlaskApp/flask_app.py
-Scanned: 2016-10-25 23:34:30.692394
-No vulnerabilities found.
-
-
-commandknight/cs125-fooddy-flask
-https://github.com/commandknight/cs125-fooddy-flask
-Entry file: cs125-fooddy-flask/fooddy2.py
-Scanned: 2016-10-25 23:34:33.093528
-Vulnerability 1:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 177, trigger word "get(":
- long = request.form.get('current_location_longitude')
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 185, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-
-Vulnerability 2:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 178, trigger word "get(":
- lat = request.form.get('current_location_latitude')
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 185, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-
-Vulnerability 3:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 191, trigger word "form[":
- a1 = request.form['addressline1']
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 194: address = a1 + ' ' + city + ' ' + state
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
- File: cs125-fooddy-flask/fooddy2.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
-
-Vulnerability 4:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 192, trigger word "form[":
- city = request.form['addresscity']
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 194: address = a1 + ' ' + city + ' ' + state
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
- File: cs125-fooddy-flask/fooddy2.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
-
-Vulnerability 5:
-File: cs125-fooddy-flask/fooddy2.py
- > User input at line 193, trigger word "form[":
- state = request.form['addressstate']
-Reassigned in:
- File: cs125-fooddy-flask/fooddy2.py
- > Line 194: address = a1 + ' ' + city + ' ' + state
- File: cs125-fooddy-flask/fooddy2.py
- > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location)
- File: cs125-fooddy-flask/fooddy2.py
- > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)]))
-File: cs125-fooddy-flask/fooddy2.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address))
-
-
-
-GreenDragonSoft/flask-heroku-template
-https://github.com/GreenDragonSoft/flask-heroku-template
-Entry file: flask-heroku-template/app.py
-Scanned: 2016-10-25 23:34:34.487981
-No vulnerabilities found.
-
-
-rfmapp/TheFlaskMegaTutorial
-https://github.com/rfmapp/TheFlaskMegaTutorial
-Entry file: TheFlaskMegaTutorial/app/__init__.py
-Scanned: 2016-10-25 23:34:42.899789
-No vulnerabilities found.
-
-
-JadyLiu/flask
-https://github.com/JadyLiu/flask
-Entry file: None
-Scanned: 2016-10-25 23:34:45.139914
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-candyer/Flask
-https://github.com/candyer/Flask
-Entry file: None
-Scanned: 2016-10-25 23:34:45.668659
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-scripterkaran/flask
-https://github.com/scripterkaran/flask
-Entry file: None
-Scanned: 2016-10-25 23:34:46.188953
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-itsrifat/flask-celery-docker-scale
-https://github.com/itsrifat/flask-celery-docker-scale
-Entry file: flask-celery-docker-scale/flask-app/app.py
-Scanned: 2016-10-25 23:34:47.516138
-No vulnerabilities found.
-
-
-sinscary/Flask-Social-Networking
-https://github.com/sinscary/Flask-Social-Networking
-Entry file: Flask-Social-Networking/app.py
-Scanned: 2016-10-25 23:34:49.453598
-Vulnerability 1:
-File: Flask-Social-Networking/app.py
- > User input at line 111, trigger word "get(":
- user = models.User.select().where(models.User.username ** username).get()
-Reassigned in:
- File: Flask-Social-Networking/app.py
- > Line 118: user = current_user
-File: Flask-Social-Networking/app.py
- > reaches line 121, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user)
-
-Vulnerability 2:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 146, trigger word "flash(":
- flash('You are now following {}'.format(to_user.username), 'success')
-
-Vulnerability 3:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 147, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 4:
-File: Flask-Social-Networking/app.py
- > User input at line 134, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 147, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 5:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 165, trigger word "flash(":
- flash('You have unfollowed {}'.format(to_user.username), 'success')
-
-Vulnerability 6:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 166, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-Vulnerability 7:
-File: Flask-Social-Networking/app.py
- > User input at line 153, trigger word "get(":
- to_user = models.User.get(models.User.username ** username)
-File: Flask-Social-Networking/app.py
- > reaches line 166, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username))
-
-
-
-osuosl/timesync-frontend-flask
-https://github.com/osuosl/timesync-frontend-flask
-Entry file: None
-Scanned: 2016-10-25 23:34:53.025441
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask.
-
-narakai/flaskblog
-https://github.com/narakai/flaskblog
-Entry file: None
-Scanned: 2016-10-25 23:34:53.544711
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/narakai/flaskblog.
-
-josepablob/flasktaskr
-https://github.com/josepablob/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:34:54.080532
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-adrianneperedo/flaskr
-https://github.com/adrianneperedo/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:34:56.610239
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/adrianneperedo/flaskr.
-
-mirukushake/flaskr
-https://github.com/mirukushake/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:35:00.128268
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mirukushake/flaskr.
-
-wangduanyang/flasky
-https://github.com/wangduanyang/flasky
-Entry file: None
-Scanned: 2016-10-25 23:35:00.656921
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-darrenhankins/flaskr
-https://github.com/darrenhankins/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:35:06.179211
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/darrenhankins/flaskr.
-
-Looncall/Flaskr
-https://github.com/Looncall/Flaskr
-Entry file: None
-Scanned: 2016-10-25 23:35:07.729775
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-CBR09/flaskapp
-https://github.com/CBR09/flaskapp
-Entry file: None
-Scanned: 2016-10-25 23:35:09.234873
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp.
-
-czy1238677/flasky
-https://github.com/czy1238677/flasky
-Entry file: None
-Scanned: 2016-10-25 23:35:10.826726
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-marcabomb/flasktaskr
-https://github.com/marcabomb/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:35:12.378619
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jeffreybergman/flasktaskr
-https://github.com/jeffreybergman/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:35:13.915078
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Pink-Moon/flaskr
-https://github.com/Pink-Moon/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:35:15.434102
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pink-Moon/flaskr.
-
-mcmcgonagle/flasktaskr2
-https://github.com/mcmcgonagle/flasktaskr2
-Entry file: flasktaskr2/project/views.py
-Scanned: 2016-10-25 23:35:16.791659
-No vulnerabilities found.
-
-
-AlexFransis/FlaskyProject
-https://github.com/AlexFransis/FlaskyProject
-Entry file: FlaskyProject/app/__init__.py
-Scanned: 2016-10-25 23:35:20.429513
-No vulnerabilities found.
-
-
-AlexGrek/FlaskLib
-https://github.com/AlexGrek/FlaskLib
-Entry file: FlaskLib/FlaskLib/FlaskLib/__init__.py
-Scanned: 2016-10-25 23:35:22.958483
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-daveweber/FlaskBar
-https://github.com/daveweber/FlaskBar
-Entry file: FlaskBar/index.py
-Scanned: 2016-10-25 23:35:27.312679
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-danleyb2/flaskMe
-https://github.com/danleyb2/flaskMe
-Entry file: flaskMe/flaskREST.py
-Scanned: 2016-10-25 23:35:28.621591
-Vulnerability 1:
-File: flaskMe/flaskREST.py
- > User input at line 73, trigger word "get(":
- name = data.get('name')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 76, trigger word "execute(":
- db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color])
-
-Vulnerability 2:
-File: flaskMe/flaskREST.py
- > User input at line 74, trigger word "get(":
- color = data.get('color')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 76, trigger word "execute(":
- db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color])
-
-Vulnerability 3:
-File: flaskMe/flaskREST.py
- > User input at line 73, trigger word "get(":
- name = data.get('name')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 78, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color))
-
-Vulnerability 4:
-File: flaskMe/flaskREST.py
- > User input at line 74, trigger word "get(":
- color = data.get('color')
-Reassigned in:
- File: flaskMe/flaskREST.py
- > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries)
-File: flaskMe/flaskREST.py
- > reaches line 78, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color))
-
-
-
-Rikka-chan/flaskCharts
-https://github.com/Rikka-chan/flaskCharts
-Entry file: None
-Scanned: 2016-10-25 23:35:29.150473
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bunkdeath/FlaskTemplate
-https://github.com/bunkdeath/FlaskTemplate
-Entry file: FlaskTemplate/application.py
-Scanned: 2016-10-25 23:35:31.474827
-No vulnerabilities found.
-
-
-zding5/FlaskDemo
-https://github.com/zding5/FlaskDemo
-Entry file: FlaskDemo/app/__init__.py
-Scanned: 2016-10-25 23:36:03.730452
-No vulnerabilities found.
-
-
-diggzhang/flaskMaze
-https://github.com/diggzhang/flaskMaze
-Entry file: None
-Scanned: 2016-10-25 23:36:05.869240
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/diggzhang/flaskMaze.
-
-narakai/FlaskDemo
-https://github.com/narakai/FlaskDemo
-Entry file: FlaskDemo/flask_demo.py
-Scanned: 2016-10-25 23:36:07.243514
-No vulnerabilities found.
-
-
-deanmax/FlaskAPP
-https://github.com/deanmax/FlaskAPP
-Entry file: None
-Scanned: 2016-10-25 23:36:07.826941
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hugoantunes/base-flask
-https://github.com/hugoantunes/base-flask
-Entry file: base-flask/service/__init__.py
-Scanned: 2016-10-25 23:36:09.646435
-No vulnerabilities found.
-
-
-haburibe/docker-flask
-https://github.com/haburibe/docker-flask
-Entry file: docker-flask/main.py
-Scanned: 2016-10-25 23:36:10.973671
-No vulnerabilities found.
-
-
-krisekenes/flask_deployment
-https://github.com/krisekenes/flask_deployment
-Entry file: flask_deployment/server.py
-Scanned: 2016-10-25 23:36:12.381464
-No vulnerabilities found.
-
-
-namickey/hello-flask
-https://github.com/namickey/hello-flask
-Entry file: hello-flask/main.py
-Scanned: 2016-10-25 23:36:13.675637
-No vulnerabilities found.
-
-
-mmingle/flask-blog
-https://github.com/mmingle/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:36:14.199781
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-justinwp/flask-urs
-https://github.com/justinwp/flask-urs
-Entry file: flask-urs/tests/conftest.py
-Scanned: 2016-10-25 23:36:15.739367
-No vulnerabilities found.
-
-
-timyi1212/flask-demo
-https://github.com/timyi1212/flask-demo
-Entry file: flask-demo/app.py
-Scanned: 2016-10-25 23:36:17.076763
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-SawHigh/flask_cdn
-https://github.com/SawHigh/flask_cdn
-Entry file: flask_cdn/cdn.py
-Scanned: 2016-10-25 23:36:18.881025
-No vulnerabilities found.
-
-
-crq/flask-scaffold
-https://github.com/crq/flask-scaffold
-Entry file: None
-Scanned: 2016-10-25 23:36:20.311999
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/crq/flask-scaffold.
-
-asielen/Woodles_Flask
-https://github.com/asielen/Woodles_Flask
-Entry file: Woodles_Flask/app/__init__.py
-Scanned: 2016-10-25 23:36:21.877496
-Vulnerability 1:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-Vulnerability 2:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-
-
-honmaple/flask-word
-https://github.com/honmaple/flask-word
-Entry file: flask-word/app/__init__.py
-Scanned: 2016-10-25 23:36:23.690350
-Vulnerability 1:
-File: flask-word/app/count/views.py
- > User input at line 17, trigger word "cookies[":
- count = int(request.cookies['count']) + 1
-Reassigned in:
- File: flask-word/app/count/views.py
- > Line 19: count = 0
- File: flask-word/app/count/views.py
- > Line 20: response = make_response(str(count))
- File: flask-word/app/count/views.py
- > Line 22: ret_MAYBE_FUNCTION_NAME = response
-File: flask-word/app/count/views.py
- > reaches line 21, trigger word "set_cookie(":
- response.set_cookie('count',value=str(count), max_age=1800)
-
-Vulnerability 2:
-File: flask-word/app/chat/views.py
- > User input at line 38, trigger word "get(":
- username = session.get('username', '')
-Reassigned in:
- File: flask-word/app/chat/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-word/app/chat/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room)
-
-Vulnerability 3:
-File: flask-word/app/chat/views.py
- > User input at line 39, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: flask-word/app/chat/views.py
- > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-word/app/chat/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room)
-
-Vulnerability 4:
-File: flask-word/app/paginate/views.py
- > User input at line 42, trigger word "get(":
- page = is_num(request.args.get('page'))
-Reassigned in:
- File: flask-word/app/paginate/views.py
- > Line 43: topics = Topic.query.paginate(page, app.config['PER_PAGE'],error_out=True)
-File: flask-word/app/paginate/views.py
- > reaches line 44, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('page/page.html',topics=topics)
-
-
-
-marcabomb/flask-blog
-https://github.com/marcabomb/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:36:24.233420
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-studiomezklador/flask_api
-https://github.com/studiomezklador/flask_api
-Entry file: flask_api/boot.py
-Scanned: 2016-10-25 23:36:25.560351
-No vulnerabilities found.
-
-
-rinechran/flask-tutorial
-https://github.com/rinechran/flask-tutorial
-Entry file: None
-Scanned: 2016-10-25 23:36:27.393352
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rinechran/flask-tutorial.
-
-bodzio2k/flask-blueprint
-https://github.com/bodzio2k/flask-blueprint
-Entry file: flask-blueprint/run.py
-Scanned: 2016-10-25 23:36:29.237559
-No vulnerabilities found.
-
-
-PeachDew/flask_tutorialwebapp
-https://github.com/PeachDew/flask_tutorialwebapp
-Entry file: flask_tutorialwebapp/app.py
-Scanned: 2016-10-25 23:36:34.279626
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-jordo1ken/flask-fibonacci
-https://github.com/jordo1ken/flask-fibonacci
-Entry file: flask-fibonacci/Fibonacci.py
-Scanned: 2016-10-25 23:36:35.639263
-No vulnerabilities found.
-
-
-Kriordan/flask-blog
-https://github.com/Kriordan/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:36:36.204314
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-a-r-g-v/flask-template
-https://github.com/a-r-g-v/flask-template
-Entry file: flask-template/app/__init__.py
-Scanned: 2016-10-25 23:36:37.617034
-No vulnerabilities found.
-
-
-Savvis/flask-phonebook
-https://github.com/Savvis/flask-phonebook
-Entry file: flask-phonebook/app/__init__.py
-Scanned: 2016-10-25 23:36:39.098770
-No vulnerabilities found.
-
-
-aksareen/Flask-learn
-https://github.com/aksareen/Flask-learn
-Entry file: Flask-learn/app.py
-Scanned: 2016-10-25 23:36:40.885485
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-aqisnotliquid/flask_rpg
-https://github.com/aqisnotliquid/flask_rpg
-Entry file: flask_rpg/app/__init__.py
-Scanned: 2016-10-25 23:36:42.326805
-No vulnerabilities found.
-
-
-textbook/flask-forecaster
-https://github.com/textbook/flask-forecaster
-Entry file: flask-forecaster/flask_forecaster/flask_app.py
-Scanned: 2016-10-25 23:36:43.878191
-Vulnerability 1:
-File: flask-forecaster/flask_forecaster/flask_app.py
- > User input at line 34, trigger word ".data":
- token = form.token.data
-Reassigned in:
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 36: projects = Tracker.validate_token(token)
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 38: session['token'] = token
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, version=__version__)
-File: flask-forecaster/flask_forecaster/flask_app.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, projects=projects, version=__version__)
-
-Vulnerability 2:
-File: flask-forecaster/flask_forecaster/flask_app.py
- > User input at line 52, trigger word "get(":
- token = session.get('token')
-Reassigned in:
- File: flask-forecaster/flask_forecaster/flask_app.py
- > Line 55: api = Tracker(token)
-File: flask-forecaster/flask_forecaster/flask_app.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('project.html',project=api.get_project(project_id))
-
-
-
-nava45/flask-routelogger
-https://github.com/nava45/flask-routelogger
-Entry file: flask-routelogger/flask_app_example.py
-Scanned: 2016-10-25 23:36:45.309945
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-MattHealy/flask-skeleton
-https://github.com/MattHealy/flask-skeleton
-Entry file: flask-skeleton/app/__init__.py
-Scanned: 2016-10-25 23:37:05.655557
-No vulnerabilities found.
-
-
-Xavier-Lam/flask-wechat
-https://github.com/Xavier-Lam/flask-wechat
-Entry file: flask-wechat/demo.py
-Scanned: 2016-10-25 23:37:08.420004
-No vulnerabilities found.
-
-
-Ty-WDFW/Flask-Tickets
-https://github.com/Ty-WDFW/Flask-Tickets
-Entry file: Flask-Tickets/main.py
-Scanned: 2016-10-25 23:37:09.749956
-Vulnerability 1:
-File: Flask-Tickets/main.py
- > User input at line 15, trigger word "form[":
- fishticket = request.form['text']
-Reassigned in:
- File: Flask-Tickets/main.py
- > Line 16: response = get_fish_ticket(fishticket)
-File: Flask-Tickets/main.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('bioinfo.html',entries=response, ticket=fishticket)
-
-
-
-makudesu/flask-thesis
-https://github.com/makudesu/flask-thesis
-Entry file: flask-thesis/bnhs.py
-Scanned: 2016-10-25 23:37:11.673170
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ivanenko/flask-webcrawler
-https://github.com/ivanenko/flask-webcrawler
-Entry file: flask-webcrawler/ww2.py
-Scanned: 2016-10-25 23:37:13.210278
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pyx/flask-simplemde
-https://github.com/pyx/flask-simplemde
-Entry file: flask-simplemde/examples/simple/app.py
-Scanned: 2016-10-25 23:37:14.862723
-No vulnerabilities found.
-
-
-kubabu/flask_blog
-https://github.com/kubabu/flask_blog
-Entry file: flask_blog/app.py
-Scanned: 2016-10-25 23:37:17.073967
-Vulnerability 1:
-File: flask_blog/views.py
- > User input at line 50, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-Reassigned in:
- File: flask_blog/views.py
- > Line 52: next_url = '/drafts'
- File: flask_blog/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=RegisterForm(), error=error)
- File: flask_blog/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: flask_blog/views.py
- > reaches line 66, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index'))
-
-Vulnerability 2:
-File: flask_blog/views.py
- > User input at line 50, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-Reassigned in:
- File: flask_blog/views.py
- > Line 52: next_url = '/drafts'
- File: flask_blog/views.py
- > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=RegisterForm(), error=error)
- File: flask_blog/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login'))
-File: flask_blog/views.py
- > reaches line 66, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index'))
-
-Vulnerability 3:
-File: flask_blog/views.py
- > User input at line 99, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-Reassigned in:
- File: flask_blog/views.py
- > Line 101: next_url = '/drafts'
- File: flask_blog/views.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=LoginForm())
- File: flask_blog/views.py
- > Line 89: ret_MAYBE_FUNCTION_NAME = redirect(url_for('register'))
- File: flask_blog/views.py
- > Line 93: ret_MAYBE_FUNCTION_NAME = redirect(url_for('drafts'))
-File: flask_blog/views.py
- > reaches line 112, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index'))
-
-Vulnerability 4:
-File: flask_blog/views.py
- > User input at line 99, trigger word "get(":
- next_url = request.args.get('next') or request.form.get('next')
-Reassigned in:
- File: flask_blog/views.py
- > Line 101: next_url = '/drafts'
- File: flask_blog/views.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=LoginForm())
- File: flask_blog/views.py
- > Line 89: ret_MAYBE_FUNCTION_NAME = redirect(url_for('register'))
- File: flask_blog/views.py
- > Line 93: ret_MAYBE_FUNCTION_NAME = redirect(url_for('drafts'))
-File: flask_blog/views.py
- > reaches line 112, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index'))
-
-Vulnerability 5:
-File: flask_blog/views.py
- > User input at line 151, trigger word "get(":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 157, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug))
-
-Vulnerability 6:
-File: flask_blog/views.py
- > User input at line 151, trigger word "form[":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 157, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug))
-
-Vulnerability 7:
-File: flask_blog/views.py
- > User input at line 151, trigger word "get(":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 157, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug))
-
-Vulnerability 8:
-File: flask_blog/views.py
- > User input at line 151, trigger word "form[":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 157, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug))
-
-Vulnerability 9:
-File: flask_blog/views.py
- > User input at line 151, trigger word "get(":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 159, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug))
-
-Vulnerability 10:
-File: flask_blog/views.py
- > User input at line 151, trigger word "form[":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 159, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug))
-
-Vulnerability 11:
-File: flask_blog/views.py
- > User input at line 151, trigger word "get(":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 159, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug))
-
-Vulnerability 12:
-File: flask_blog/views.py
- > User input at line 151, trigger word "form[":
- entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False)
-Reassigned in:
- File: flask_blog/views.py
- > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html')
-File: flask_blog/views.py
- > reaches line 159, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug))
-
-
-
-MichaelDaniello/LearnFlask
-https://github.com/MichaelDaniello/LearnFlask
-Entry file: LearnFlask/cyoa/lib/python2.7/site-packages/flask/sessions.py
-Scanned: 2016-10-25 23:37:22.008365
-No vulnerabilities found.
-
-
-bplabombarda/fdr
-https://github.com/bplabombarda/fdr
-Entry file: fdr/server/__init__.py
-Scanned: 2016-10-25 23:37:23.934689
-No vulnerabilities found.
-
-
-metajemo/testapp
-https://github.com/metajemo/testapp
-Entry file: testapp/testapp.py
-Scanned: 2016-10-25 23:37:25.256699
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-gzxultra/FlaskLoginManagement
-https://github.com/gzxultra/FlaskLoginManagement
-Entry file: FlaskLoginManagement/app/__init__.py
-Scanned: 2016-10-25 23:37:27.188084
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-victorcuervo/FlaskMongoDB
-https://github.com/victorcuervo/FlaskMongoDB
-Entry file: FlaskMongoDB/welcome.py
-Scanned: 2016-10-25 23:37:28.603431
-No vulnerabilities found.
-
-
-ChellsChen/FlaskSocketIOChart
-https://github.com/ChellsChen/FlaskSocketIOChart
-Entry file: FlaskSocketIOChart/app/__init__.py
-Scanned: 2016-10-25 23:37:30.234168
-Vulnerability 1:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 31, trigger word "get(":
- name = session.get('name', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-Vulnerability 2:
-File: FlaskSocketIOChart/app/main/routes.py
- > User input at line 32, trigger word "get(":
- room = session.get('room', '')
-Reassigned in:
- File: FlaskSocketIOChart/app/main/routes.py
- > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskSocketIOChart/app/main/routes.py
- > reaches line 35, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room)
-
-
-
-sasha42/Mailchimp-utility
-https://github.com/sasha42/Mailchimp-utility
-Entry file: None
-Scanned: 2016-10-25 23:37:31.528054
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sasha42/Mailchimp-utility.
-
-auliude/flask_hello_world
-https://github.com/auliude/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-25 23:37:35.160033
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yogeshdixit41/PyFlaskWebApp
-https://github.com/yogeshdixit41/PyFlaskWebApp
-Entry file: PyFlaskWebApp/hello.py
-Scanned: 2016-10-25 23:37:38.948655
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlaskWebApp/venv/lib/python2.7/sre_compile.py
-
-znss1989/flask_blog_ex
-https://github.com/znss1989/flask_blog_ex
-Entry file: flask_blog_ex/blog.py
-Scanned: 2016-10-25 23:37:40.289174
-No vulnerabilities found.
-
-
-liuenyan/micro-flask-blog
-https://github.com/liuenyan/micro-flask-blog
-Entry file: micro-flask-blog/app/__init__.py
-Scanned: 2016-10-25 23:37:41.748837
-Vulnerability 1:
-File: micro-flask-blog/app/main/views.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 19: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 20, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: micro-flask-blog/app/main/views.py
- > User input at line 124, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: micro-flask-blog/app/main/views.py
- > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: micro-flask-blog/app/main/views.py
- > Line 126: posts = pagination.items
-File: micro-flask-blog/app/main/views.py
- > reaches line 127, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id)
-
-
-
-rtorres90/rest-flask-tutorial
-https://github.com/rtorres90/rest-flask-tutorial
-Entry file: rest-flask-tutorial/rest_flask/endpointsproject3.py
-Scanned: 2016-10-25 23:37:46.101684
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jz314/flask-demo-copy
-https://github.com/jz314/flask-demo-copy
-Entry file: None
-Scanned: 2016-10-25 23:37:47.567003
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jz314/flask-demo-copy.
-
-willelson/flask-app-template
-https://github.com/willelson/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-25 23:37:52.024156
-No vulnerabilities found.
-
-
-acbart/lti-flask-skeleton
-https://github.com/acbart/lti-flask-skeleton
-Entry file: lti-flask-skeleton/main.py
-Scanned: 2016-10-25 23:37:53.516094
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-GreatBedAwake/flask_lab_web
-https://github.com/GreatBedAwake/flask_lab_web
-Entry file: flask_lab_web/app/__init__.py
-Scanned: 2016-10-25 23:37:54.949158
-Vulnerability 1:
-File: flask_lab_web/app/views.py
- > User input at line 46, trigger word "form[":
- find_component = request.form['find_component']
-Reassigned in:
- File: flask_lab_web/app/views.py
- > Line 47: dates = select_where_db(find_component)
- File: flask_lab_web/app/views.py
- > Line 54: dates = select_data()
- File: flask_lab_web/app/views.py
- > Line 56: dates = select_data()
-File: flask_lab_web/app/views.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',component=dates)
-
-
-
-Derfirm/hello-docker-flask
-https://github.com/Derfirm/hello-docker-flask
-Entry file: hello-docker-flask/app.py
-Scanned: 2016-10-25 23:37:56.262321
-No vulnerabilities found.
-
-
-arvvvs/Flask-Practice-Metis-Delivery
-https://github.com/arvvvs/Flask-Practice-Metis-Delivery
-Entry file: Flask-Practice-Metis-Delivery/app.py
-Scanned: 2016-10-25 23:37:58.355550
-Vulnerability 1:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 30, trigger word "form(":
- form = request_phone_form()
-Reassigned in:
- File: Flask-Practice-Metis-Delivery/app.py
- > Line 32: session['phone'] = form.phone.data
- File: Flask-Practice-Metis-Delivery/app.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('lookup'))
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form)
-
-Vulnerability 2:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 57, trigger word "get(":
- address = request.args.get('address', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 65, trigger word "execute(":
- cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");')
-
-Vulnerability 3:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 59, trigger word "get(":
- name = request.args.get('name', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 65, trigger word "execute(":
- cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");')
-
-Vulnerability 4:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 127, trigger word "form[":
- _phone = request.form['submitPhone']
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 128, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('lookup.html',phone=_phone)
-
-Vulnerability 5:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 148, trigger word "get(":
- phone = request.args.get('phone', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-Vulnerability 6:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 149, trigger word "get(":
- name = request.args.get('name', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-Vulnerability 7:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 150, trigger word "get(":
- address = request.args.get('address', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-Vulnerability 8:
-File: Flask-Practice-Metis-Delivery/app.py
- > User input at line 151, trigger word "get(":
- phone_value = request.args.get('phone_value', 0,type=str)
-File: Flask-Practice-Metis-Delivery/app.py
- > reaches line 154, trigger word "execute(":
- cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"')
-
-
-
-jideobs/flask-gae-ndb-starter
-https://github.com/jideobs/flask-gae-ndb-starter
-Entry file: flask-gae-ndb-starter/server/main.py
-Scanned: 2016-10-25 23:38:00.037804
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mml1/flask_multiple_forms
-https://github.com/mml1/flask_multiple_forms
-Entry file: flask_multiple_forms/server.py
-Scanned: 2016-10-25 23:38:01.438306
-No vulnerabilities found.
-
-
-dv3/sample-Flask-Application
-https://github.com/dv3/sample-Flask-Application
-Entry file: None
-Scanned: 2016-10-25 23:38:01.983433
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application.
-
-blackmad/flask-google-login-example
-https://github.com/blackmad/flask-google-login-example
-Entry file: flask-google-login-example/main.py
-Scanned: 2016-10-25 23:38:06.414134
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Tim9Liu9/Flask_Bootstrap_Blog
-https://github.com/Tim9Liu9/Flask_Bootstrap_Blog
-Entry file: Flask_Bootstrap_Blog/doc/app.py
-Scanned: 2016-10-25 23:38:09.109493
-No vulnerabilities found.
-
-
-knight-zhou/Web.py_Flask
-https://github.com/knight-zhou/Web.py_Flask
-Entry file: None
-Scanned: 2016-10-25 23:38:11.253045
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/knight-zhou/Web.py_Flask.
-
-DEV3L/openshift-python-flask-example
-https://github.com/DEV3L/openshift-python-flask-example
-Entry file: openshift-python-flask-example/wsgi/run.py
-Scanned: 2016-10-25 23:38:12.697688
-No vulnerabilities found.
-
-
-nosuchip/flask-video-streaming
-https://github.com/nosuchip/flask-video-streaming
-Entry file: flask-video-streaming/main.py
-Scanned: 2016-10-25 23:38:14.588338
-No vulnerabilities found.
-
-
-cerealcake/flask-ldap3
-https://github.com/cerealcake/flask-ldap3
-Entry file: flask-ldap3/app.py
-Scanned: 2016-10-25 23:38:15.892656
-No vulnerabilities found.
-
-
-VistaarJ/REST-API-Using-Flask-
-https://github.com/VistaarJ/REST-API-Using-Flask-
-Entry file: REST-API-Using-Flask-/app.py
-Scanned: 2016-10-25 23:38:20.251310
-No vulnerabilities found.
-
-
-n-batalha/flask-api-template
-https://github.com/n-batalha/flask-api-template
-Entry file: flask-api-template/web/journey_predict/__init__.py
-Scanned: 2016-10-25 23:38:21.671449
-No vulnerabilities found.
-
-
-willelson/flask-login-template
-https://github.com/willelson/flask-login-template
-Entry file: flask-login-template/app/__init__.py
-Scanned: 2016-10-25 23:38:27.019436
-No vulnerabilities found.
-
-
-zolaneta/books_flask_app
-https://github.com/zolaneta/books_flask_app
-Entry file: None
-Scanned: 2016-10-25 23:38:28.900405
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/books_flask_app.
-
-Anivarth/quiz-python-flask
-https://github.com/Anivarth/quiz-python-flask
-Entry file: quiz-python-flask/quiz.py
-Scanned: 2016-10-25 23:38:30.214591
-No vulnerabilities found.
-
-
-richyvk/flask-url-shortener
-https://github.com/richyvk/flask-url-shortener
-Entry file: flask-url-shortener/app.py
-Scanned: 2016-10-25 23:38:31.872255
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zbc/Flask
-https://github.com/zbc/Flask
-Entry file: None
-Scanned: 2016-10-25 23:38:34.366536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-cobra0914/flask
-https://github.com/cobra0914/flask
-Entry file: None
-Scanned: 2016-10-25 23:38:34.869945
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-susantshrestha/flask
-https://github.com/susantshrestha/flask
-Entry file: None
-Scanned: 2016-10-25 23:38:36.403247
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SunchunZhou/flask
-https://github.com/SunchunZhou/flask
-Entry file: None
-Scanned: 2016-10-25 23:38:40.008830
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-w84miracle/flask-sb-admin2
-https://github.com/w84miracle/flask-sb-admin2
-Entry file: flask-sb-admin2/sbadmin.py
-Scanned: 2016-10-25 23:38:44.442809
-No vulnerabilities found.
-
-
-k-hung/FlaskApp
-https://github.com/k-hung/FlaskApp
-Entry file: FlaskApp/FeelsApp/__init__.py
-Scanned: 2016-10-25 23:38:49.579341
-No vulnerabilities found.
-
-
-yoshiya0503/Flask-Best-Practices
-https://github.com/yoshiya0503/Flask-Best-Practices
-Entry file: Flask-Best-Practices/methodview.py
-Scanned: 2016-10-25 23:38:50.904651
-No vulnerabilities found.
-
-
-ThunderousFigs/Genomes
-https://github.com/ThunderousFigs/Genomes
-Entry file: Genomes/server.py
-Scanned: 2016-10-25 23:39:03.881296
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Python-Project-Simple/flask-blog
-https://github.com/Python-Project-Simple/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:39:05.428143
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-adrianneperedo/flaskr
-https://github.com/adrianneperedo/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:05.944521
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/adrianneperedo/flaskr.
-
-mirukushake/flaskr
-https://github.com/mirukushake/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:06.454136
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mirukushake/flaskr.
-
-schen2011/flaskandazure
-https://github.com/schen2011/flaskandazure
-Entry file: flaskandazure/FlaskWebProject3/FlaskWebProject3/__init__.py
-Scanned: 2016-10-25 23:39:08.605681
-No vulnerabilities found.
-
-
-DXZ/flaskr
-https://github.com/DXZ/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:09.139123
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/DXZ/flaskr.
-
-tim1978/flasktaskr
-https://github.com/tim1978/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:09.678210
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-keer2345/flasky
-https://github.com/keer2345/flasky
-Entry file: None
-Scanned: 2016-10-25 23:39:10.195297
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-PansFortress/flasktasker
-https://github.com/PansFortress/flasktasker
-Entry file: flasktasker/views.py
-Scanned: 2016-10-25 23:39:11.658058
-No vulnerabilities found.
-
-
-olegzhoglo/flasktaskr
-https://github.com/olegzhoglo/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:12.171829
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Kriordan/flasktaskr
-https://github.com/Kriordan/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:13.678748
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-haoweibo1987/flasker
-https://github.com/haoweibo1987/flasker
-Entry file: flasker/app/__init__.py
-Scanned: 2016-10-25 23:39:21.416440
-No vulnerabilities found.
-
-
-egonvb/flaskplayground
-https://github.com/egonvb/flaskplayground
-Entry file: flaskplayground/api.py
-Scanned: 2016-10-25 23:39:24.830268
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-liteng123/flaskr
-https://github.com/liteng123/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:39:25.398094
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/liteng123/flaskr.
-
-salazar35/FlaskWeb
-https://github.com/salazar35/FlaskWeb
-Entry file: FlaskWeb/Flask Web Development.py
-Scanned: 2016-10-25 23:39:26.686224
-No vulnerabilities found.
-
-
-pchartrand/FlaskTemp
-https://github.com/pchartrand/FlaskTemp
-Entry file: FlaskTemp/tempreport.py
-Scanned: 2016-10-25 23:39:29.460548
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-hattwick/flask2
-https://github.com/hattwick/flask2
-Entry file: flask2/flask2mod-template.py
-Scanned: 2016-10-25 23:39:32.371182
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-narakai/FlaskServer
-https://github.com/narakai/FlaskServer
-Entry file: FlaskServer/flaskServer.py
-Scanned: 2016-10-25 23:39:33.764558
-No vulnerabilities found.
-
-
-paoloo1995/FlaskBlog
-https://github.com/paoloo1995/FlaskBlog
-Entry file: FlaskBlog/app/__init__.py
-Scanned: 2016-10-25 23:39:35.284808
-Vulnerability 1:
-File: FlaskBlog/app/main/views.py
- > User input at line 20, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 21: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 24: posts = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskBlog/app/main/views.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: FlaskBlog/app/main/views.py
- > User input at line 32, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 33: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 36: posts = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-julywoo/flaskWeb
-https://github.com/julywoo/flaskWeb
-Entry file: flaskWeb/flaskWeb.py
-Scanned: 2016-10-25 23:39:37.164342
-No vulnerabilities found.
-
-
-tmlima/flask-intro
-https://github.com/tmlima/flask-intro
-Entry file: flask-intro/project/__init__.py
-Scanned: 2016-10-25 23:39:41.250489
-No vulnerabilities found.
-
-
-sourcelair-blueprints/flask-mongo
-https://github.com/sourcelair-blueprints/flask-mongo
-Entry file: flask-mongo/flask_mongo/server.py
-Scanned: 2016-10-25 23:39:42.559125
-No vulnerabilities found.
-
-
-mmingle/flask-blog
-https://github.com/mmingle/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:39:43.072217
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-justinwp/flask-urs
-https://github.com/justinwp/flask-urs
-Entry file: flask-urs/tests/conftest.py
-Scanned: 2016-10-25 23:39:44.591753
-No vulnerabilities found.
-
-
-SawHigh/flask_cdn
-https://github.com/SawHigh/flask_cdn
-Entry file: flask_cdn/cdn.py
-Scanned: 2016-10-25 23:39:45.874521
-No vulnerabilities found.
-
-
-crq/flask-scaffold
-https://github.com/crq/flask-scaffold
-Entry file: None
-Scanned: 2016-10-25 23:39:47.426715
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/crq/flask-scaffold.
-
-asielen/Woodles_Flask
-https://github.com/asielen/Woodles_Flask
-Entry file: Woodles_Flask/app/__init__.py
-Scanned: 2016-10-25 23:39:51.985714
-Vulnerability 1:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-Vulnerability 2:
-File: Woodles_Flask/app/views/app_views.py
- > User input at line 22, trigger word "get(":
- current_card = Card.query.get(card_id)
-File: Woodles_Flask/app/views/app_views.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string))
-
-
-
-amitbn/flask-docker
-https://github.com/amitbn/flask-docker
-Entry file: flask-docker/app.py
-Scanned: 2016-10-25 23:40:05.855696
-No vulnerabilities found.
-
-
-julywoo/flask_login
-https://github.com/julywoo/flask_login
-Entry file: None
-Scanned: 2016-10-25 23:40:06.894315
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/julywoo/flask_login.
-
-LovroM/Flask-test
-https://github.com/LovroM/Flask-test
-Entry file: Flask-test/webserver.py
-Scanned: 2016-10-25 23:40:08.732177
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-danleyb2/flask-cloudinary
-https://github.com/danleyb2/flask-cloudinary
-Entry file: None
-Scanned: 2016-10-25 23:40:10.028498
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary.
-
-OpenTrons/labsuite_flask
-https://github.com/OpenTrons/labsuite_flask
-Entry file: labsuite_flask/app.py
-Scanned: 2016-10-25 23:40:12.057944
-No vulnerabilities found.
-
-
-YaGiNA/study-flask
-https://github.com/YaGiNA/study-flask
-Entry file: study-flask/flaskr/__init__.py
-Scanned: 2016-10-25 23:40:14.850987
-No vulnerabilities found.
-
-
-seanhelm/flask-test
-https://github.com/seanhelm/flask-test
-Entry file: flask-test/app/__init__.py
-Scanned: 2016-10-25 23:40:16.140327
-No vulnerabilities found.
-
-
-Viredery/python_flask
-https://github.com/Viredery/python_flask
-Entry file: python_flask/hello.py
-Scanned: 2016-10-25 23:40:17.861728
-No vulnerabilities found.
-
-
-josanabr/flask-vbox
-https://github.com/josanabr/flask-vbox
-Entry file: flask-vbox/flask-vbox.py
-Scanned: 2016-10-25 23:40:19.164406
-No vulnerabilities found.
-
-
-simeon-xx/simeon-flask
-https://github.com/simeon-xx/simeon-flask
-Entry file: simeon-flask/app/init.py
-Scanned: 2016-10-25 23:40:20.495908
-No vulnerabilities found.
-
-
-cherry-hyx/flask_t
-https://github.com/cherry-hyx/flask_t
-Entry file: None
-Scanned: 2016-10-25 23:40:21.908130
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cherry-hyx/flask_t.
-
-abcsds/flask-tests
-https://github.com/abcsds/flask-tests
-Entry file: flask-tests/flaskr/flaskr.py
-Scanned: 2016-10-25 23:40:23.458250
-No vulnerabilities found.
-
-
-tanzhixu/Flask-oauth
-https://github.com/tanzhixu/Flask-oauth
-Entry file: Flask-oauth/app/__init__.py
-Scanned: 2016-10-25 23:40:27.316197
-Vulnerability 1:
-File: Flask-oauth/app/user_manager_views.py
- > User input at line 32, trigger word "get(":
- password = request.json.get('password', None)
-Reassigned in:
- File: Flask-oauth/app/user_manager_views.py
- > Line 38: newpasswd = pwd_context.encrypt(password)
-File: Flask-oauth/app/user_manager_views.py
- > reaches line 41, trigger word "filter(":
- query.filter(User.id == userid).update(User.password_hashnewpasswd)
-
-
-
-brandonfujii/flask-microblog
-https://github.com/brandonfujii/flask-microblog
-Entry file: None
-Scanned: 2016-10-25 23:40:27.840553
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/brandonfujii/flask-microblog.
-
-dylannnnn/flask_study
-https://github.com/dylannnnn/flask_study
-Entry file: flask_study/views.py
-Scanned: 2016-10-25 23:40:29.293667
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-huasu/InstantFlask
-https://github.com/huasu/InstantFlask
-Entry file: InstantFlask/app_return_values.py
-Scanned: 2016-10-25 23:40:31.865496
-No vulnerabilities found.
-
-
-maricante/flask-blog
-https://github.com/maricante/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:40:32.406762
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-christopherL91/pythonflask
-https://github.com/christopherL91/pythonflask
-Entry file: pythonflask/app/main.py
-Scanned: 2016-10-25 23:40:33.691394
-No vulnerabilities found.
-
-
-ysicing/Pangu
-https://github.com/ysicing/Pangu
-Entry file: Pangu/Pangu.py
-Scanned: 2016-10-25 23:40:49.728954
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-rbcolson9/flask4kids
-https://github.com/rbcolson9/flask4kids
-Entry file: flask4kids/hello.py
-Scanned: 2016-10-25 23:40:51.072244
-No vulnerabilities found.
-
-
-charlestondance/FlaskStartUp
-https://github.com/charlestondance/FlaskStartUp
-Entry file: FlaskStartUp/app/__init__.py
-Scanned: 2016-10-25 23:40:52.521911
-No vulnerabilities found.
-
-
-erik-farmer/flask-auth-wysiwyg-blog
-https://github.com/erik-farmer/flask-auth-wysiwyg-blog
-Entry file: flask-auth-wysiwyg-blog/app.py
-Scanned: 2016-10-25 23:40:53.909175
-No vulnerabilities found.
-
-
-guilleJB/flask-web-book
-https://github.com/guilleJB/flask-web-book
-Entry file: flask-web-book/hello.py
-Scanned: 2016-10-25 23:40:55.330972
-Vulnerability 1:
-File: flask-web-book/hello.py
- > User input at line 120, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: flask-web-book/hello.py
- > Line 117: name = None
-File: flask-web-book/hello.py
- > reaches line 122, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('boots.html',name=name, form=form)
-
-
-
-dongheelee1/simple_flask_wall
-https://github.com/dongheelee1/simple_flask_wall
-Entry file: simple_flask_wall/server.py
-Scanned: 2016-10-25 23:40:56.740665
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ynifamily3/CRUD-with-Flask-MVC
-https://github.com/ynifamily3/CRUD-with-Flask-MVC
-Entry file: CRUD-with-Flask-MVC/set_table.py
-Scanned: 2016-10-25 23:40:58.218021
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-duncan60/flask-github-api
-https://github.com/duncan60/flask-github-api
-Entry file: flask-github-api/app/__init__.py
-Scanned: 2016-10-25 23:40:59.530834
-No vulnerabilities found.
-
-
-mnzr/Flask-Blueprint-test
-https://github.com/mnzr/Flask-Blueprint-test
-Entry file: Flask-Blueprint-test/app/__init__.py
-Scanned: 2016-10-25 23:41:00.848876
-Vulnerability 1:
-File: Flask-Blueprint-test/app/users/views.py
- > User input at line 33, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: Flask-Blueprint-test/app/users/views.py
- > Line 38: session['user_id'] = user.id
-File: Flask-Blueprint-test/app/users/views.py
- > reaches line 39, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-znss1989/flask_blog_ex
-https://github.com/znss1989/flask_blog_ex
-Entry file: flask_blog_ex/blog.py
-Scanned: 2016-10-25 23:41:02.407922
-No vulnerabilities found.
-
-
-aquang9124/flask_semi_restful_routes
-https://github.com/aquang9124/flask_semi_restful_routes
-Entry file: flask_semi_restful_routes/server.py
-Scanned: 2016-10-25 23:41:06.748247
-No vulnerabilities found.
-
-
-PeggyZWY/blog-with-flask
-https://github.com/PeggyZWY/blog-with-flask
-Entry file: blog-with-flask/app/__init__.py
-Scanned: 2016-10-25 23:41:08.755738
-Vulnerability 1:
-File: blog-with-flask/app/main/views.py
- > User input at line 186, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 189: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: blog-with-flask/app/main/views.py
- > Line 192: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 195: comments = pagination.items
- File: blog-with-flask/app/main/views.py
- > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id))
-File: blog-with-flask/app/main/views.py
- > reaches line 204, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, categories=category, comments=comments, pagination=pagination)
-
-Vulnerability 2:
-File: blog-with-flask/app/main/views.py
- > User input at line 293, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 294: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 298: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: blog-with-flask/app/main/views.py
- > Line 291: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: blog-with-flask/app/main/views.py
- > reaches line 301, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='他们关注了', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 3:
-File: blog-with-flask/app/main/views.py
- > User input at line 311, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 312: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 315: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: blog-with-flask/app/main/views.py
- > Line 310: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: blog-with-flask/app/main/views.py
- > reaches line 317, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注了他们', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: blog-with-flask/app/main/views.py
- > User input at line 349, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 350: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 353: comments = pagination.items
-File: blog-with-flask/app/main/views.py
- > reaches line 354, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-Vulnerability 5:
-File: blog-with-flask/app/main/views.py
- > User input at line 431, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 452: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 456: posts = pagination.items
-File: blog-with-flask/app/main/views.py
- > reaches line 460, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 6:
-File: blog-with-flask/app/main/views.py
- > User input at line 471, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: blog-with-flask/app/main/views.py
- > Line 475: pagination = Post.query.filter_by(category_id=_category.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: blog-with-flask/app/main/views.py
- > Line 478: posts = pagination.items
-File: blog-with-flask/app/main/views.py
- > reaches line 482, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination)
-
-
-
-TwilioDevEd/browser-calls-flask
-https://github.com/TwilioDevEd/browser-calls-flask
-Entry file: browser-calls-flask/browser_calls_flask/__init__.py
-Scanned: 2016-10-25 23:41:11.177937
-No vulnerabilities found.
-
-
-terryllowery/flask-hello-world
-https://github.com/terryllowery/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:41:12.221270
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aquang9124/flask_wall_test
-https://github.com/aquang9124/flask_wall_test
-Entry file: flask_wall_test/server.py
-Scanned: 2016-10-25 23:41:13.543876
-No vulnerabilities found.
-
-
-ynejati/MyFlaskApp
-https://github.com/ynejati/MyFlaskApp
-Entry file: MyFlaskApp/MyFlaskWebApp.py
-Scanned: 2016-10-25 23:41:14.954289
-No vulnerabilities found.
-
-
-TheCypher/flask-boiler-plate
-https://github.com/TheCypher/flask-boiler-plate
-Entry file: flask-boiler-plate/app/__init__.py
-Scanned: 2016-10-25 23:41:16.348550
-Vulnerability 1:
-File: flask-boiler-plate/app/module_one/views.py
- > User input at line 30, trigger word ".data":
- user = User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: flask-boiler-plate/app/module_one/views.py
- > Line 34: session['user_id'] = user.id
-File: flask-boiler-plate/app/module_one/views.py
- > reaches line 36, trigger word "flash(":
- flash('Welcome %s' % user.name)
-
-
-
-TheCypher/flask-api-test
-https://github.com/TheCypher/flask-api-test
-Entry file: flask-api-test/api.py
-Scanned: 2016-10-25 23:41:20.114275
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-api-test/lib/python2.7/sre_compile.py
-
-vstanev1/heroku-flask-app
-https://github.com/vstanev1/heroku-flask-app
-Entry file: heroku-flask-app/app.py
-Scanned: 2016-10-25 23:41:22.027918
-No vulnerabilities found.
-
-
-bellcodo/bellcodo-flask-microblog
-https://github.com/bellcodo/bellcodo-flask-microblog
-Entry file: bellcodo-flask-microblog/app/__init__.py
-Scanned: 2016-10-25 23:41:23.864442
-No vulnerabilities found.
-
-
-megrela/python-flask-skeleton
-https://github.com/megrela/python-flask-skeleton
-Entry file: None
-Scanned: 2016-10-25 23:41:25.170257
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/megrela/python-flask-skeleton.
-
-plablo09/minimal-flask-dev
-https://github.com/plablo09/minimal-flask-dev
-Entry file: minimal-flask-dev/hello.py
-Scanned: 2016-10-25 23:41:26.460475
-No vulnerabilities found.
-
-
-knight-zhou/Web.py_Flask
-https://github.com/knight-zhou/Web.py_Flask
-Entry file: None
-Scanned: 2016-10-25 23:41:27.543176
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shyba/browser-calls-flask
-https://github.com/shyba/browser-calls-flask
-Entry file: browser-calls-flask/browser_calls_flask/__init__.py
-Scanned: 2016-10-25 23:41:28.834959
-No vulnerabilities found.
-
-
-jdgramajo/LearningFlaskFramework
-https://github.com/jdgramajo/LearningFlaskFramework
-Entry file: LearningFlaskFramework/blog/app/app.py
-Scanned: 2016-10-25 23:41:30.141717
-No vulnerabilities found.
-
-
-liuer99cn/awesome-flask-todo
-https://github.com/liuer99cn/awesome-flask-todo
-Entry file: awesome-flask-todo/app.py
-Scanned: 2016-10-25 23:41:32.438078
-No vulnerabilities found.
-
-
-seiya-tsukada/instant_flask_server
-https://github.com/seiya-tsukada/instant_flask_server
-Entry file: instant_flask_server/main.py
-Scanned: 2016-10-25 23:41:33.746580
-No vulnerabilities found.
-
-
-Journo-App/flask-by-example
-https://github.com/Journo-App/flask-by-example
-Entry file: None
-Scanned: 2016-10-25 23:41:34.315104
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Journo-App/flask-by-example.
-
-bobquest33/testRestFlask
-https://github.com/bobquest33/testRestFlask
-Entry file: testRestFlask/testRestFlask/testRestFlask/apps/testRest/models.py
-Scanned: 2016-10-25 23:41:36.740895
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jjapp/flask-hello-world
-https://github.com/jjapp/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:41:51.266993
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-snehasankavaram/donorRegistryFlask
-https://github.com/snehasankavaram/donorRegistryFlask
-Entry file: donorRegistryFlask/run.py
-Scanned: 2016-10-25 23:41:52.581513
-No vulnerabilities found.
-
-
-ayusharma/Drug-discovery-flask
-https://github.com/ayusharma/Drug-discovery-flask
-Entry file: Drug-discovery-flask/app.py
-Scanned: 2016-10-25 23:41:53.897898
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-vishaljain3991/flask_oauth_example_template
-https://github.com/vishaljain3991/flask_oauth_example_template
-Entry file: flask_oauth_example_template/app/__init__.py
-Scanned: 2016-10-25 23:41:57.874968
-No vulnerabilities found.
-
-
-F483/flask-data-migration-example
-https://github.com/F483/flask-data-migration-example
-Entry file: flask-data-migration-example/app.py
-Scanned: 2016-10-25 23:41:59.208025
-No vulnerabilities found.
-
-
-studiomezklador/flask_api_2
-https://github.com/studiomezklador/flask_api_2
-Entry file: flask_api_2/__init__.py
-Scanned: 2016-10-25 23:42:00.664601
-No vulnerabilities found.
-
-
-SarthakS93/Flask-WebApp
-https://github.com/SarthakS93/Flask-WebApp
-Entry file: Flask-WebApp/app/__init__.py
-Scanned: 2016-10-25 23:42:02.365033
-No vulnerabilities found.
-
-
-dorneanu/flask-app-template
-https://github.com/dorneanu/flask-app-template
-Entry file: flask-app-template/app/__init__.py
-Scanned: 2016-10-25 23:42:03.677410
-No vulnerabilities found.
-
-
-aquang9124/flask_friends_full
-https://github.com/aquang9124/flask_friends_full
-Entry file: flask_friends_full/server.py
-Scanned: 2016-10-25 23:42:04.986020
-No vulnerabilities found.
-
-
-huasu/LearningFlaskFramework
-https://github.com/huasu/LearningFlaskFramework
-Entry file: LearningFlaskFramework/hello.py
-Scanned: 2016-10-25 23:42:07.286545
-No vulnerabilities found.
-
-
-sd16spring/Toolbox-Flask
-https://github.com/sd16spring/Toolbox-Flask
-Entry file: Toolbox-Flask/hello.py
-Scanned: 2016-10-25 23:42:10.183442
-No vulnerabilities found.
-
-
-ZhenghaoZhu/Flask
-https://github.com/ZhenghaoZhu/Flask
-Entry file: None
-Scanned: 2016-10-25 23:42:11.710102
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-octt/flask
-https://github.com/octt/flask
-Entry file: None
-Scanned: 2016-10-25 23:42:12.251612
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Bwooklyn/flask
-https://github.com/Bwooklyn/flask
-Entry file: None
-Scanned: 2016-10-25 23:42:12.764850
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HRKpython/flask
-https://github.com/HRKpython/flask
-Entry file: None
-Scanned: 2016-10-25 23:42:14.303283
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pavelrib/flask
-https://github.com/pavelrib/flask
-Entry file: None
-Scanned: 2016-10-25 23:42:15.864361
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-SeanVaysburd/flask
-https://github.com/SeanVaysburd/flask
-Entry file: None
-Scanned: 2016-10-25 23:42:17.404072
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kartheek3011/Flask
-https://github.com/kartheek3011/Flask
-Entry file: None
-Scanned: 2016-10-25 23:42:20.931408
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-TerbiumLabs/flask-developer-challenge
-https://github.com/TerbiumLabs/flask-developer-challenge
-Entry file: flask-developer-challenge/gistapi/gistapi.py
-Scanned: 2016-10-25 23:42:24.339711
-No vulnerabilities found.
-
-
-w84miracle/flask-sb-admin2
-https://github.com/w84miracle/flask-sb-admin2
-Entry file: flask-sb-admin2/sbadmin.py
-Scanned: 2016-10-25 23:42:26.376555
-No vulnerabilities found.
-
-
-sunscrapers/flask-boilerplate
-https://github.com/sunscrapers/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-25 23:42:26.925242
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sunscrapers/flask-boilerplate.
-
-jabbalaci/DigitalOceanFlask
-https://github.com/jabbalaci/DigitalOceanFlask
-Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py
-Scanned: 2016-10-25 23:42:28.330175
-No vulnerabilities found.
-
-
-pyx/flask-diced
-https://github.com/pyx/flask-diced
-Entry file: flask-diced/examples/simple/app.py
-Scanned: 2016-10-25 23:42:29.737793
-No vulnerabilities found.
-
-
-basco-johnkevin/note-taking-app
-https://github.com/basco-johnkevin/note-taking-app
-Entry file: note-taking-app/part2/main.py
-Scanned: 2016-10-25 23:42:31.051648
-No vulnerabilities found.
-
-
-Miserlou/serverless-imagehost
-https://github.com/Miserlou/serverless-imagehost
-Entry file: serverless-imagehost/my_app.py
-Scanned: 2016-10-25 23:42:32.347536
-No vulnerabilities found.
-
-
-zhangyuhaomei/flasky
-https://github.com/zhangyuhaomei/flasky
-Entry file: None
-Scanned: 2016-10-25 23:42:32.878855
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hellohuangjin/flaskblog
-https://github.com/hellohuangjin/flaskblog
-Entry file: None
-Scanned: 2016-10-25 23:42:33.388905
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hellohuangjin/flaskblog.
-
-coolmile23/flaskr
-https://github.com/coolmile23/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:42:34.906373
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/coolmile23/flaskr.
-
-MRamakri/flaskworkshop
-https://github.com/MRamakri/flaskworkshop
-Entry file: flaskworkshop/app.py
-Scanned: 2016-10-25 23:42:37.214616
-No vulnerabilities found.
-
-
-imhuwq/flasky
-https://github.com/imhuwq/flasky
-Entry file: None
-Scanned: 2016-10-25 23:42:51.761861
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-antonsoroko/flaskapimongo
-https://github.com/antonsoroko/flaskapimongo
-Entry file: flaskapimongo/flaskapimongo/__init__.py
-Scanned: 2016-10-25 23:42:53.206251
-No vulnerabilities found.
-
-
-haoweibo1987/flasker
-https://github.com/haoweibo1987/flasker
-Entry file: flasker/app/__init__.py
-Scanned: 2016-10-25 23:43:02.253845
-No vulnerabilities found.
-
-
-egonvb/flaskplayground
-https://github.com/egonvb/flaskplayground
-Entry file: flaskplayground/api.py
-Scanned: 2016-10-25 23:43:08.140634
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhkmxx9302013/flaskmysql
-https://github.com/zhkmxx9302013/flaskmysql
-Entry file: flaskmysql/flaskmysql.py
-Scanned: 2016-10-25 23:43:09.513149
-No vulnerabilities found.
-
-
-xiaomao361/flaskr
-https://github.com/xiaomao361/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:43:10.028724
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiaomao361/flaskr.
-
-alvaro893/flaskcinemaapp
-https://github.com/alvaro893/flaskcinemaapp
-Entry file: flaskcinemaapp/FlaskWebProject/__init__.py
-Scanned: 2016-10-25 23:43:11.902610
-No vulnerabilities found.
-
-
-yuyiwei305/flaskr
-https://github.com/yuyiwei305/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:43:12.414459
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyiwei305/flaskr.
-
-uklineale/flaskTut
-https://github.com/uklineale/flaskTut
-Entry file: None
-Scanned: 2016-10-25 23:43:13.952897
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-saurabh1e/FlaskStructure
-https://github.com/saurabh1e/FlaskStructure
-Entry file: FlaskStructure/src/utils/__init__.py
-Scanned: 2016-10-25 23:43:15.383674
-No vulnerabilities found.
-
-
-retozero/FlaskDemo
-https://github.com/retozero/FlaskDemo
-Entry file: FlaskDemo/flaskr/flaskr.py
-Scanned: 2016-10-25 23:43:16.790604
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zupeiza/FlaskTaskr
-https://github.com/zupeiza/FlaskTaskr
-Entry file: None
-Scanned: 2016-10-25 23:43:17.363784
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zupeiza/FlaskTaskr.
-
-yxun/FlaskSample
-https://github.com/yxun/FlaskSample
-Entry file: FlaskSample/url_building.py
-Scanned: 2016-10-25 23:43:18.668471
-No vulnerabilities found.
-
-
-paoloo1995/FlaskBlog
-https://github.com/paoloo1995/FlaskBlog
-Entry file: FlaskBlog/app/__init__.py
-Scanned: 2016-10-25 23:43:20.149380
-Vulnerability 1:
-File: FlaskBlog/app/main/views.py
- > User input at line 20, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 21: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 24: posts = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskBlog/app/main/views.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: FlaskBlog/app/main/views.py
- > User input at line 32, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 33: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 36: posts = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 37, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-DearX-dlx/FlaskBlog
-https://github.com/DearX-dlx/FlaskBlog
-Entry file: FlaskBlog/FlaskBlog.py
-Scanned: 2016-10-25 23:43:21.475497
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sourcelair-blueprints/flask-mongo
-https://github.com/sourcelair-blueprints/flask-mongo
-Entry file: flask-mongo/flask_mongo/server.py
-Scanned: 2016-10-25 23:43:22.749764
-No vulnerabilities found.
-
-
-sohje/__flask_psgr
-https://github.com/sohje/__flask_psgr
-Entry file: __flask_psgr/app.py
-Scanned: 2016-10-25 23:43:24.054859
-No vulnerabilities found.
-
-
-farridav/flask_friends
-https://github.com/farridav/flask_friends
-Entry file: flask_friends/src/friends/__init__.py
-Scanned: 2016-10-25 23:43:25.598591
-No vulnerabilities found.
-
-
-gh-tcbd/flask-test
-https://github.com/gh-tcbd/flask-test
-Entry file: flask-test/hello.py
-Scanned: 2016-10-25 23:43:26.944897
-No vulnerabilities found.
-
-
-doubtingben/flask-jobs
-https://github.com/doubtingben/flask-jobs
-Entry file: flask-jobs/code/web.py
-Scanned: 2016-10-25 23:43:28.230751
-No vulnerabilities found.
-
-
-askewseth/StatsFlask
-https://github.com/askewseth/StatsFlask
-Entry file: StatsFlask/run.py
-Scanned: 2016-10-25 23:43:30.022428
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-BlackMud/flask_blog
-https://github.com/BlackMud/flask_blog
-Entry file: flask_blog/app/__init__.py
-Scanned: 2016-10-25 23:43:31.790234
-Vulnerability 1:
-File: flask_blog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_blog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_blog/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_blog/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: flask_blog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_blog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_blog/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_blog/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: flask_blog/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: flask_blog/app/api_1_0/posts.py
- > Line 16: prev = None
- File: flask_blog/app/api_1_0/posts.py
- > Line 19: next = None
-File: flask_blog/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: flask_blog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_blog/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_blog/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_blog/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: flask_blog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_blog/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_blog/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_blog/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: flask_blog/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: flask_blog/app/api_1_0/users.py
- > Line 20: prev = None
- File: flask_blog/app/api_1_0/users.py
- > Line 23: next = None
-File: flask_blog/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: flask_blog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_blog/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_blog/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_blog/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: flask_blog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_blog/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_blog/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_blog/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: flask_blog/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: flask_blog/app/api_1_0/users.py
- > Line 42: prev = None
- File: flask_blog/app/api_1_0/users.py
- > Line 45: next = None
-File: flask_blog/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: flask_blog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_blog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_blog/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_blog/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: flask_blog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_blog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_blog/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_blog/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: flask_blog/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: flask_blog/app/api_1_0/comments.py
- > Line 15: prev = None
- File: flask_blog/app/api_1_0/comments.py
- > Line 18: next = None
-File: flask_blog/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: flask_blog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_blog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_blog/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_blog/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: flask_blog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_blog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_blog/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_blog/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: flask_blog/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: flask_blog/app/api_1_0/comments.py
- > Line 43: prev = None
- File: flask_blog/app/api_1_0/comments.py
- > Line 46: next = None
-File: flask_blog/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: flask_blog/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 55: posts = pagination.items
- File: flask_blog/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: flask_blog/app/main/views.py
- > User input at line 47, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 45: show_followed = False
- File: flask_blog/app/main/views.py
- > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: flask_blog/app/main/views.py
- > User input at line 63, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 67: posts = pagination.items
-File: flask_blog/app/main/views.py
- > reaches line 68, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: flask_blog/app/main/views.py
- > User input at line 127, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flask_blog/app/main/views.py
- > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 134: comments = pagination.items
- File: flask_blog/app/main/views.py
- > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask_blog/app/main/views.py
- > reaches line 135, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: flask_blog/app/main/views.py
- > User input at line 194, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_blog/app/main/views.py
- > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 200, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: flask_blog/app/main/views.py
- > User input at line 211, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_blog/app/main/views.py
- > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_blog/app/main/views.py
- > reaches line 217, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: flask_blog/app/main/views.py
- > User input at line 242, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_blog/app/main/views.py
- > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flask_blog/app/main/views.py
- > Line 246: comments = pagination.items
-File: flask_blog/app/main/views.py
- > reaches line 247, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-bzerroug/flask_appbuilder
-https://github.com/bzerroug/flask_appbuilder
-Entry file: flask_appbuilder/meteo/__init__.py
-Scanned: 2016-10-25 23:43:33.358555
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhkmxx9302013/RPiFlask
-https://github.com/zhkmxx9302013/RPiFlask
-Entry file: RPiFlask/main.py
-Scanned: 2016-10-25 23:43:34.658838
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tahoe/flask-restless
-https://github.com/tahoe/flask-restless
-Entry file: flask-restless/tests/helpers.py
-Scanned: 2016-10-25 23:43:36.777417
-No vulnerabilities found.
-
-
-PavelMPD/flask_oauth
-https://github.com/PavelMPD/flask_oauth
-Entry file: flask_oauth/server.py
-Scanned: 2016-10-25 23:43:38.066277
-No vulnerabilities found.
-
-
-doubtingben/flask-mongo
-https://github.com/doubtingben/flask-mongo
-Entry file: flask-mongo/code/tumblelog/__init__.py
-Scanned: 2016-10-25 23:43:39.477253
-No vulnerabilities found.
-
-
-hoikin-yiu/flask-blog
-https://github.com/hoikin-yiu/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:43:39.998689
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Cloudwick-BT/flask_project
-https://github.com/Cloudwick-BT/flask_project
-Entry file: flask_project/hello.py
-Scanned: 2016-10-25 23:43:53.347153
-No vulnerabilities found.
-
-
-gyonghua/flask-blog
-https://github.com/gyonghua/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:43:53.863799
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-g-rich/flask-blog
-https://github.com/g-rich/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:43:54.388400
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Zhgong/flask_microblog
-https://github.com/Zhgong/flask_microblog
-Entry file: flask_microblog/blog/__init__.py
-Scanned: 2016-10-25 23:44:03.871786
-No vulnerabilities found.
-
-
-chensdream/learn-flask
-https://github.com/chensdream/learn-flask
-Entry file: None
-Scanned: 2016-10-25 23:44:09.445062
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-coolmile23/flask_practice
-https://github.com/coolmile23/flask_practice
-Entry file: None
-Scanned: 2016-10-25 23:44:17.333565
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-k9luo/Flask-Tutorial
-https://github.com/k9luo/Flask-Tutorial
-Entry file: Flask-Tutorial/microblog-version-0.10/app/__init__.py
-Scanned: 2016-10-25 23:44:24.871458
-No vulnerabilities found.
-
-
-Harry-Yao/learn-flask
-https://github.com/Harry-Yao/learn-flask
-Entry file: None
-Scanned: 2016-10-25 23:44:25.503462
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-danleyb2/flask-cloudinary
-https://github.com/danleyb2/flask-cloudinary
-Entry file: None
-Scanned: 2016-10-25 23:44:26.015627
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary.
-
-juan-castano/todo-flask
-https://github.com/juan-castano/todo-flask
-Entry file: todo-flask/app.py
-Scanned: 2016-10-25 23:44:27.331178
-No vulnerabilities found.
-
-
-mullaned/Flask-Test
-https://github.com/mullaned/Flask-Test
-Entry file: Flask-Test/flask_test.py
-Scanned: 2016-10-25 23:44:28.675178
-Vulnerability 1:
-File: Flask-Test/flask_test.py
- > User input at line 13, trigger word "get(":
- age = ages.get(user)
-File: Flask-Test/flask_test.py
- > reaches line 14, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('users.html',user=user, age=age)
-
-
-
-zupeiza/flask-blog
-https://github.com/zupeiza/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:44:29.193144
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-shopetan/flask-api
-https://github.com/shopetan/flask-api
-Entry file: None
-Scanned: 2016-10-25 23:44:29.705152
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shopetan/flask-api.
-
-jungkoo/flask-dmango
-https://github.com/jungkoo/flask-dmango
-Entry file: flask-dmango/sample/blueprint_find.py
-Scanned: 2016-10-25 23:44:31.141741
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-raghureddyram/flask-hello
-https://github.com/raghureddyram/flask-hello
-Entry file: flask-hello/hello_world.py
-Scanned: 2016-10-25 23:44:32.435927
-No vulnerabilities found.
-
-
-hrushikesh198/flask-server
-https://github.com/hrushikesh198/flask-server
-Entry file: None
-Scanned: 2016-10-25 23:44:32.965794
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hrushikesh198/flask-server.
-
-omarkurt/flask-injection
-https://github.com/omarkurt/flask-injection
-Entry file: flask-injection/index.py
-Scanned: 2016-10-25 23:44:35.257675
-No vulnerabilities found.
-
-
-Datalker/Flask_sandbox
-https://github.com/Datalker/Flask_sandbox
-Entry file: Flask_sandbox/hello.py
-Scanned: 2016-10-25 23:44:36.674368
-No vulnerabilities found.
-
-
-getsentry/demo-flask
-https://github.com/getsentry/demo-flask
-Entry file: demo-flask/app.py
-Scanned: 2016-10-25 23:44:38.958011
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement'
-
-technocake/flask-eksempel
-https://github.com/technocake/flask-eksempel
-Entry file: flask-eksempel/webserver.py
-Scanned: 2016-10-25 23:44:40.271863
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wkzhu/flask_example
-https://github.com/wkzhu/flask_example
-Entry file: None
-Scanned: 2016-10-25 23:44:41.964027
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/wkzhu/flask_example.
-
-rgsingh/flask-timetrack
-https://github.com/rgsingh/flask-timetrack
-Entry file: flask-timetrack/app/__init__.py
-Scanned: 2016-10-25 23:44:43.357404
-Vulnerability 1:
-File: flask-timetrack/app/views.py
- > User input at line 29, trigger word "get(":
- taskid = request.args.get('id')
-Reassigned in:
- File: flask-timetrack/app/views.py
- > Line 33: filtered_task = [x for x in tasks_file]
- File: flask-timetrack/app/views.py
- > Line 35: task = json.dumps(filtered_task)
-File: flask-timetrack/app/views.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('edittask.html',taskid=taskid, task=task)
-
-
-
-pultitom/study-flask
-https://github.com/pultitom/study-flask
-Entry file: study-flask/microblog/app/__init__.py
-Scanned: 2016-10-25 23:44:44.675856
-No vulnerabilities found.
-
-
-StarsHu/ll-flask
-https://github.com/StarsHu/ll-flask
-Entry file: ll-flask/LikeLines/server.py
-Scanned: 2016-10-25 23:44:46.114986
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-morphee31/flask_example
-https://github.com/morphee31/flask_example
-Entry file: None
-Scanned: 2016-10-25 23:44:46.659879
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/morphee31/flask_example.
-
-wumb0/flask-examples
-https://github.com/wumb0/flask-examples
-Entry file: flask-examples/bitly/app/__init__.py
-Scanned: 2016-10-25 23:44:48.454325
-Vulnerability 1:
-File: flask-examples/bitly/app/views/main.py
- > User input at line 19, trigger word ".data":
- suffix = form.suffix.data
-Reassigned in:
- File: flask-examples/bitly/app/views/main.py
- > Line 24: suffix = tmp
- File: flask-examples/bitly/app/views/main.py
- > Line 42: link = Link(suffix=suffix, link=form.link.data, expiry=expiry)
- File: flask-examples/bitly/app/views/main.py
- > Line 25: link = Link.query.filter_by(suffix=suffix).first()
-File: flask-examples/bitly/app/views/main.py
- > reaches line 47, trigger word "flash(":
- flash('Your link is {}://{}/{}'.format(u.scheme, u.netloc, suffix),category='good')
-
-
-
-vladimirdotk/flask-boilerplate
-https://github.com/vladimirdotk/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-25 23:44:54.471311
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vladimirdotk/flask-boilerplate.
-
-zubairah/Flask_App
-https://github.com/zubairah/Flask_App
-Entry file: Flask_App/Flask_App/app.py
-Scanned: 2016-10-25 23:44:55.956975
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ramwin/flask_tutorial
-https://github.com/ramwin/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:45:10.008558
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ramwin/flask_tutorial.
-
-christopherL91/pythonflask
-https://github.com/christopherL91/pythonflask
-Entry file: pythonflask/app/main.py
-Scanned: 2016-10-25 23:45:12.342404
-No vulnerabilities found.
-
-
-f-guitart/progcoms3-flask
-https://github.com/f-guitart/progcoms3-flask
-Entry file: progcoms3-flask/app.py
-Scanned: 2016-10-25 23:45:19.572903
-Vulnerability 1:
-File: progcoms3-flask/app.py
- > User input at line 73, trigger word "get(":
- zone = request.form.get('area')
-Reassigned in:
- File: progcoms3-flask/app.py
- > Line 75: zone_data = get_zone_data(zone)
- File: progcoms3-flask/app.py
- > Line 71: zone_data = []
-File: progcoms3-flask/app.py
- > reaches line 76, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('zone_data_table.html',zone_data=zone_data, zones=zones)
-
-
-
-kolapapa/blog_kola
-https://github.com/kolapapa/blog_kola
-Entry file: blog_kola/db.py
-Scanned: 2016-10-25 23:45:30.467342
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/sre_compile.py
-
-jackeylu/microblog
-https://github.com/jackeylu/microblog
-Entry file: None
-Scanned: 2016-10-25 23:45:31.026061
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jackeylu/microblog.
-
-garaud/pyris
-https://github.com/garaud/pyris
-Entry file: pyris/pyris/api/__init__.py
-Scanned: 2016-10-25 23:45:32.609690
-No vulnerabilities found.
-
-
-nicc777/flask-webservice-wsgi-python3-demo
-https://github.com/nicc777/flask-webservice-wsgi-python3-demo
-Entry file: flask-webservice-wsgi-python3-demo/fwsdemo/app.py
-Scanned: 2016-10-25 23:45:34.030047
-No vulnerabilities found.
-
-
-MicahSteinbrecher/mini-blog
-https://github.com/MicahSteinbrecher/mini-blog
-Entry file: mini-blog/flaskr.py
-Scanned: 2016-10-25 23:45:35.839145
-No vulnerabilities found.
-
-
-remarcbalisi/rest-demo-flask-
-https://github.com/remarcbalisi/rest-demo-flask-
-Entry file: rest-demo-flask-/app.py
-Scanned: 2016-10-25 23:45:37.580959
-No vulnerabilities found.
-
-
-duncan60/flask-github-api
-https://github.com/duncan60/flask-github-api
-Entry file: flask-github-api/app/__init__.py
-Scanned: 2016-10-25 23:45:38.895769
-No vulnerabilities found.
-
-
-mattvisco/flask_test_2
-https://github.com/mattvisco/flask_test_2
-Entry file: flask_test_2/insta.py
-Scanned: 2016-10-25 23:45:40.332269
-No vulnerabilities found.
-
-
-pavelchalyk/blackjack_on_flask
-https://github.com/pavelchalyk/blackjack_on_flask
-Entry file: blackjack_on_flask/blackjack.py
-Scanned: 2016-10-25 23:45:41.643115
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-merryHunter/chat-flask-socketio
-https://github.com/merryHunter/chat-flask-socketio
-Entry file: chat-flask-socketio/chat.py
-Scanned: 2016-10-25 23:45:47.312254
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-rjantos/flask-hello-world
-https://github.com/rjantos/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:45:47.928046
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sd16spring/Toolbox-Flask
-https://github.com/sd16spring/Toolbox-Flask
-Entry file: Toolbox-Flask/hello.py
-Scanned: 2016-10-25 23:45:51.623039
-No vulnerabilities found.
-
-
-HRKpython/flask
-https://github.com/HRKpython/flask
-Entry file: None
-Scanned: 2016-10-25 23:45:52.172810
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bsteinberg/flask
-https://github.com/bsteinberg/flask
-Entry file: None
-Scanned: 2016-10-25 23:45:52.679903
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ninadmhatre/zual
-https://github.com/ninadmhatre/zual
-Entry file: zual/local_mods/flask-blogging/flask_blogging/engine.py
-Scanned: 2016-10-25 23:45:55.503281
-Vulnerability 1:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 104, trigger word "get(":
- count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 106: meta = _get_meta(storage, count, page)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 107: offset = meta['offset']
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 111: posts = storage.get_posts(count=count, offset=offset, include_draft=False, tag=None, user_id=None, recent=True)
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 115, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config)
-
-Vulnerability 2:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 141, trigger word "get(":
- count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 142: meta = _get_meta(storage, count, page,tag=tag)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 143: offset = meta['offset']
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 147: posts = storage.get_posts(count=count, offset=offset, tag=tag, include_draft=False, user_id=None, recent=True)
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config)
-
-Vulnerability 3:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 159, trigger word "get(":
- count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 160: meta = _get_meta(storage, count, page,user_id=user_id)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 161: offset = meta['offset']
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 164: posts = storage.get_posts(count=count, offset=offset, user_id=user_id, include_draft=False, tag=None, recent=True)
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 172, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config)
-
-Vulnerability 4:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 199, trigger word ".data":
- slug = post_processor.create_slug(form.title.data)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 200, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug))
-
-Vulnerability 5:
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > User input at line 199, trigger word ".data":
- slug = post_processor.create_slug(form.title.data)
-Reassigned in:
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config)
- File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None))
-File: zual/local_mods/flask-blogging/flask_blogging/views.py
- > reaches line 200, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug))
-
-
-
-taogeT/flask-celery
-https://github.com/taogeT/flask-celery
-Entry file: flask-celery/example/app/__init__.py
-Scanned: 2016-10-25 23:45:56.958816
-No vulnerabilities found.
-
-
-frankV/flask-sendgrid
-https://github.com/frankV/flask-sendgrid
-Entry file: flask-sendgrid/setup.py
-Scanned: 2016-10-25 23:45:58.252627
-No vulnerabilities found.
-
-
-gyonghua/flasktaskr
-https://github.com/gyonghua/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:45:58.782933
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Rothschild0120/flaskyblog
-https://github.com/Rothschild0120/flaskyblog
-Entry file: flaskyblog/app/__init__.py
-Scanned: 2016-10-25 23:46:00.666745
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-islandev/flaskweb
-https://github.com/islandev/flaskweb
-Entry file: None
-Scanned: 2016-10-25 23:46:01.217316
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yuyiwei305/flaskr
-https://github.com/yuyiwei305/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:46:01.754498
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyiwei305/flaskr.
-
-stalwart201/flaskimgupload
-https://github.com/stalwart201/flaskimgupload
-Entry file: flaskimgupload/upload.py
-Scanned: 2016-10-25 23:46:03.217039
-Vulnerability 1:
-File: flaskimgupload/upload.py
- > User input at line 19, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flaskimgupload/upload.py
- > Line 21: filename = secure_filename(file.filename)
- File: flaskimgupload/upload.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flaskimgupload/upload.py
- > reaches line 23, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-Vulnerability 2:
-File: flaskimgupload/upload.py
- > User input at line 19, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: flaskimgupload/upload.py
- > Line 21: filename = secure_filename(file.filename)
- File: flaskimgupload/upload.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = '
-
- Upload new File
-
Upload new File
-
- '
-File: flaskimgupload/upload.py
- > reaches line 23, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename))
-
-
-
-zixuzhang/flasky
-https://github.com/zixuzhang/flasky
-Entry file: None
-Scanned: 2016-10-25 23:46:03.783766
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hoobalias/Flaskr
-https://github.com/hoobalias/Flaskr
-Entry file: None
-Scanned: 2016-10-25 23:46:10.301180
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-azureappserviceoss/FlaskAzure
-https://github.com/azureappserviceoss/FlaskAzure
-Entry file: FlaskAzure/FlaskWebProject1/__init__.py
-Scanned: 2016-10-25 23:46:20.523675
-No vulnerabilities found.
-
-
-yhappy/FlaskProjects
-https://github.com/yhappy/FlaskProjects
-Entry file: FlaskProjects/FlaskProjects.py
-Scanned: 2016-10-25 23:46:27.880363
-No vulnerabilities found.
-
-
-tajihiro/FlaskBluemix
-https://github.com/tajihiro/FlaskBluemix
-Entry file: FlaskBluemix/index.py
-Scanned: 2016-10-25 23:46:32.203790
-No vulnerabilities found.
-
-
-Leyawiin/FlaskDemo
-https://github.com/Leyawiin/FlaskDemo
-Entry file: FlaskDemo/app/__init__.py
-Scanned: 2016-10-25 23:46:34.137264
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-KotiyaSenya/FlaskLearn
-https://github.com/KotiyaSenya/FlaskLearn
-Entry file: FlaskLearn/flask_learn/__init__.py
-Scanned: 2016-10-25 23:46:35.599607
-Vulnerability 1:
-File: FlaskLearn/flask_learn/main/views/index.py
- > User input at line 10, trigger word "get(":
- user_agent = request.headers.get('User-Agent')
-File: FlaskLearn/flask_learn/main/views/index.py
- > reaches line 11, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.utcnow())
-
-
-
-Patreon/cartographer
-https://github.com/Patreon/cartographer
-Entry file: cartographer/example/generic_social_network/app/__init__.py
-Scanned: 2016-10-25 23:46:37.410876
-No vulnerabilities found.
-
-
-Ketouem/flask-boto3
-https://github.com/Ketouem/flask-boto3
-Entry file: flask-boto3/example.py
-Scanned: 2016-10-25 23:46:38.843061
-No vulnerabilities found.
-
-
-bellkev/docker-flask-browserify
-https://github.com/bellkev/docker-flask-browserify
-Entry file: docker-flask-browserify/src/python/hello.py
-Scanned: 2016-10-25 23:46:40.138625
-No vulnerabilities found.
-
-
-Pushould/pushould-flask-sample
-https://github.com/Pushould/pushould-flask-sample
-Entry file: pushould-flask-sample/app.py
-Scanned: 2016-10-25 23:46:41.450236
-No vulnerabilities found.
-
-
-miaoihan/qulook_flask
-https://github.com/miaoihan/qulook_flask
-Entry file: qulook_flask/qulook.py
-Scanned: 2016-10-25 23:46:45.526538
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: qulook_flask/ENV/lib/python2.7/sre_compile.py
-
-rogerpence/Flask-App
-https://github.com/rogerpence/Flask-App
-Entry file: Flask-App/app/__init__.py
-Scanned: 2016-10-25 23:46:47.221679
-No vulnerabilities found.
-
-
-sandmarq/flask_test
-https://github.com/sandmarq/flask_test
-Entry file: None
-Scanned: 2016-10-25 23:46:47.744717
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-barcai/Flask_Megatutorial
-https://github.com/barcai/Flask_Megatutorial
-Entry file: Flask_Megatutorial/app/__init__.py
-Scanned: 2016-10-25 23:46:49.135503
-No vulnerabilities found.
-
-
-kessiacastro/flask-hello
-https://github.com/kessiacastro/flask-hello
-Entry file: flask-hello/app.py
-Scanned: 2016-10-25 23:46:53.215063
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-renaldopringle/flask_heroku
-https://github.com/renaldopringle/flask_heroku
-Entry file: flask_heroku/app.py
-Scanned: 2016-10-25 23:46:56.914129
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sunhughees/flask-blog
-https://github.com/sunhughees/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:46:57.978887
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AVandelay/flask_blog
-https://github.com/AVandelay/flask_blog
-Entry file: flask_blog/__init__.py
-Scanned: 2016-10-25 23:47:01.836003
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_blog/venv/lib/python3.4/operator.py
-
-uyoaix/learn-flask
-https://github.com/uyoaix/learn-flask
-Entry file: None
-Scanned: 2016-10-25 23:47:02.403185
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-frenos/flask-sample
-https://github.com/frenos/flask-sample
-Entry file: flask-sample/app/__init__.py
-Scanned: 2016-10-25 23:47:03.857786
-No vulnerabilities found.
-
-
-gyonghua/flask-blog
-https://github.com/gyonghua/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:47:04.394218
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Zhgong/flask_microblog
-https://github.com/Zhgong/flask_microblog
-Entry file: flask_microblog/blog/__init__.py
-Scanned: 2016-10-25 23:47:05.769293
-No vulnerabilities found.
-
-
-zhangcheng/flask-example
-https://github.com/zhangcheng/flask-example
-Entry file: flask-example/example/app.py
-Scanned: 2016-10-25 23:47:07.106592
-No vulnerabilities found.
-
-
-gemimarosier/flask_project
-https://github.com/gemimarosier/flask_project
-Entry file: flask_project/tv_routes.py
-Scanned: 2016-10-25 23:47:10.264218
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_project/env/lib/python2.7/sre_compile.py
-
-gchange/flask_server
-https://github.com/gchange/flask_server
-Entry file: flask_server/flask_server/main.py
-Scanned: 2016-10-25 23:47:11.606793
-Vulnerability 1:
-File: flask_server/flask_server/main.py
- > User input at line 21, trigger word "form[":
- account = request.form['account']
-Reassigned in:
- File: flask_server/flask_server/main.py
- > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/')
- File: flask_server/flask_server/main.py
- > Line 22: password = request.form['password']
-File: flask_server/flask_server/main.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password)
-
-Vulnerability 2:
-File: flask_server/flask_server/main.py
- > User input at line 22, trigger word "form[":
- password = request.form['password']
-Reassigned in:
- File: flask_server/flask_server/main.py
- > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/')
-File: flask_server/flask_server/main.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password)
-
-Vulnerability 3:
-File: flask_server/flask_server/main.py
- > User input at line 23, trigger word "form[":
- account_length = int(request.form['account_length'])
-Reassigned in:
- File: flask_server/flask_server/main.py
- > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/')
- File: flask_server/flask_server/main.py
- > Line 21: account = request.form['account']
- File: flask_server/flask_server/main.py
- > Line 22: password = request.form['password']
-File: flask_server/flask_server/main.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password)
-
-Vulnerability 4:
-File: flask_server/flask_server/main.py
- > User input at line 24, trigger word "form[":
- password_length = int(request.form['password_length'])
-Reassigned in:
- File: flask_server/flask_server/main.py
- > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/')
- File: flask_server/flask_server/main.py
- > Line 22: password = request.form['password']
-File: flask_server/flask_server/main.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password)
-
-Vulnerability 5:
-File: flask_server/flask_server/main.py
- > User input at line 25, trigger word "form[":
- is_digit = request.form['is_digit']
-Reassigned in:
- File: flask_server/flask_server/main.py
- > Line 28: is_digit = is_digit.lower() == 'true'TrueFalse
- File: flask_server/flask_server/main.py
- > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/')
- File: flask_server/flask_server/main.py
- > Line 21: account = request.form['account']
- File: flask_server/flask_server/main.py
- > Line 22: password = request.form['password']
-File: flask_server/flask_server/main.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password)
-
-Vulnerability 6:
-File: flask_server/flask_server/main.py
- > User input at line 26, trigger word "form[":
- is_uplow = request.form['is_uplow']
-Reassigned in:
- File: flask_server/flask_server/main.py
- > Line 29: is_uplow = is_uplow.lower() == 'true'TrueFalse
- File: flask_server/flask_server/main.py
- > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow)
- File: flask_server/flask_server/main.py
- > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/')
- File: flask_server/flask_server/main.py
- > Line 21: account = request.form['account']
- File: flask_server/flask_server/main.py
- > Line 22: password = request.form['password']
-File: flask_server/flask_server/main.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password)
-
-
-
-Nickyzj/flask-first
-https://github.com/Nickyzj/flask-first
-Entry file: flask-first/flask-first-notes.py
-Scanned: 2016-10-25 23:47:13.177572
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-propupul/Flask_app
-https://github.com/propupul/Flask_app
-Entry file: Flask_app/hello.py
-Scanned: 2016-10-25 23:47:16.720423
-Vulnerability 1:
-File: Flask_app/hello.py
- > User input at line 43, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: Flask_app/hello.py
- > Line 44: prod_name = location(name)[0]
- File: Flask_app/hello.py
- > Line 45: loc_name = location(name)[1] + '-' + location(name)[2] + '-' + location(name)[3]
- File: Flask_app/hello.py
- > Line 49: prod_name = ''
- File: Flask_app/hello.py
- > Line 38: prod_name = ''
- File: Flask_app/hello.py
- > Line 39: loc_name = ''
-File: Flask_app/hello.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prod_name=prod_name, loc_name=loc_name)
-
-
-
-m18664319351/Blog_Flask
-https://github.com/m18664319351/Blog_Flask
-Entry file: Blog_Flask/app/__init__.py
-Scanned: 2016-10-25 23:47:18.174589
-No vulnerabilities found.
-
-
-testforvln/flask-learning
-https://github.com/testforvln/flask-learning
-Entry file: flask-learning/hello.py
-Scanned: 2016-10-25 23:47:19.472930
-No vulnerabilities found.
-
-
-Unicomcat/flask_test
-https://github.com/Unicomcat/flask_test
-Entry file: None
-Scanned: 2016-10-25 23:47:19.999228
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jidn/flask-obscure
-https://github.com/jidn/flask-obscure
-Entry file: flask-obscure/tests/test_url.py
-Scanned: 2016-10-25 23:47:28.458800
-No vulnerabilities found.
-
-
-cdaidone/small_flask
-https://github.com/cdaidone/small_flask
-Entry file: small_flask/small_flask.py
-Scanned: 2016-10-25 23:47:34.876770
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-morphee31/flask_example
-https://github.com/morphee31/flask_example
-Entry file: None
-Scanned: 2016-10-25 23:47:35.425716
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/morphee31/flask_example.
-
-pedrogaudencio/refunite-flask
-https://github.com/pedrogaudencio/refunite-flask
-Entry file: refunite-flask/app.py
-Scanned: 2016-10-25 23:47:36.970458
-No vulnerabilities found.
-
-
-master105/flask_server
-https://github.com/master105/flask_server
-Entry file: flask_server/project.py
-Scanned: 2016-10-25 23:47:39.992457
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-d3prof3t/flask-intro
-https://github.com/d3prof3t/flask-intro
-Entry file: flask-intro/flasktaskr/__init__.py
-Scanned: 2016-10-25 23:47:41.427171
-No vulnerabilities found.
-
-
-zubairah/Flask_App
-https://github.com/zubairah/Flask_App
-Entry file: Flask_App/Flask_App/app.py
-Scanned: 2016-10-25 23:47:42.826008
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-shinstev/flask_server
-https://github.com/shinstev/flask_server
-Entry file: flask_server/app.py
-Scanned: 2016-10-25 23:47:46.301702
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_server/venv/lib/python2.7/sre_compile.py
-
-vramakin/LearnFlask
-https://github.com/vramakin/LearnFlask
-Entry file: LearnFlask/flaskr.py
-Scanned: 2016-10-25 23:47:47.744531
-No vulnerabilities found.
-
-
-nbeede/docker-flask
-https://github.com/nbeede/docker-flask
-Entry file: docker-flask/app.py
-Scanned: 2016-10-25 23:47:49.044002
-No vulnerabilities found.
-
-
-runningstrawberry/microblog
-https://github.com/runningstrawberry/microblog
-Entry file: None
-Scanned: 2016-10-25 23:47:49.604090
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/runningstrawberry/microblog.
-
-kolapapa/blog_kola
-https://github.com/kolapapa/blog_kola
-Entry file: blog_kola/db.py
-Scanned: 2016-10-25 23:47:53.598359
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/sre_compile.py
-
-B2Crypt/Random-Gamemode-
-https://github.com/B2Crypt/Random-Gamemode-
-Entry file: Random-Gamemode-/FLASK/__init__.py
-Scanned: 2016-10-25 23:47:55.410779
-No vulnerabilities found.
-
-
-Lich2013/learnflask
-https://github.com/Lich2013/learnflask
-Entry file: None
-Scanned: 2016-10-25 23:47:57.069508
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Lich2013/learnflask.
-
-jbisasky/flaskProtoBuffer
-https://github.com/jbisasky/flaskProtoBuffer
-Entry file: flaskProtoBuffer/flaskHello.py
-Scanned: 2016-10-25 23:48:00.664132
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-WangShengguang/FlaskWebDevelopment
-https://github.com/WangShengguang/FlaskWebDevelopment
-Entry file: FlaskWebDevelopment/hello.py
-Scanned: 2016-10-25 23:48:02.733082
-Vulnerability 1:
-File: FlaskWebDevelopment/app/main/views.py
- > User input at line 17, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskWebDevelopment/app/main/views.py
- > Line 25: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskWebDevelopment/app/main/views.py
- > Line 27: posts = pagination.items
- File: FlaskWebDevelopment/app/main/views.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskWebDevelopment/app/main/views.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: FlaskWebDevelopment/app/main/views.py
- > User input at line 20, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: FlaskWebDevelopment/app/main/views.py
- > Line 18: show_followed = False
- File: FlaskWebDevelopment/app/main/views.py
- > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskWebDevelopment/app/main/views.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: FlaskWebDevelopment/app/main/views.py
- > User input at line 108, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskWebDevelopment/app/main/views.py
- > Line 110: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: FlaskWebDevelopment/app/main/views.py
- > Line 111: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskWebDevelopment/app/main/views.py
- > Line 113: comments = pagination.items
- File: FlaskWebDevelopment/app/main/views.py
- > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: FlaskWebDevelopment/app/main/views.py
- > reaches line 114, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: FlaskWebDevelopment/app/main/views.py
- > User input at line 170, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskWebDevelopment/app/main/views.py
- > Line 171: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWS_PER_PAGE'], error_out=False)
- File: FlaskWebDevelopment/app/main/views.py
- > Line 172: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: FlaskWebDevelopment/app/main/views.py
- > Line 169: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskWebDevelopment/app/main/views.py
- > reaches line 173, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: FlaskWebDevelopment/app/main/views.py
- > User input at line 183, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskWebDevelopment/app/main/views.py
- > Line 184: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: FlaskWebDevelopment/app/main/views.py
- > Line 187: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: FlaskWebDevelopment/app/main/views.py
- > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskWebDevelopment/app/main/views.py
- > reaches line 189, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: FlaskWebDevelopment/app/main/views.py
- > User input at line 198, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskWebDevelopment/app/main/views.py
- > Line 199: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskWebDevelopment/app/main/views.py
- > Line 201: comments = pagination.items
-File: FlaskWebDevelopment/app/main/views.py
- > reaches line 202, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-JunliuHub/FlaskWebDevelopment
-https://github.com/JunliuHub/FlaskWebDevelopment
-Entry file: FlaskWebDevelopment/src/helloflask.py
-Scanned: 2016-10-25 23:48:05.058306
-No vulnerabilities found.
-
-
-adrianomaringolo/py-flask-tuts
-https://github.com/adrianomaringolo/py-flask-tuts
-Entry file: None
-Scanned: 2016-10-25 23:48:11.239641
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rjantos/flask-hello-world
-https://github.com/rjantos/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:48:11.747538
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ishwarya-iyer/nuage_proj_flask_app
-https://github.com/ishwarya-iyer/nuage_proj_flask_app
-Entry file: nuage_proj_flask_app/app.py
-Scanned: 2016-10-25 23:48:13.974662
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-SamirKanaan/PlantillaFlaskREST1
-https://github.com/SamirKanaan/PlantillaFlaskREST1
-Entry file: PlantillaFlaskREST1/plantilla1.py
-Scanned: 2016-10-25 23:48:15.877151
-No vulnerabilities found.
-
-
-remarcbalisi/flask-angular-auth
-https://github.com/remarcbalisi/flask-angular-auth
-Entry file: flask-angular-auth/project/__init__.py
-Scanned: 2016-10-25 23:48:17.183057
-No vulnerabilities found.
-
-
-jarosenb/flask_ionratio_V2
-https://github.com/jarosenb/flask_ionratio_V2
-Entry file: flask_ionratio_V2/hello.py
-Scanned: 2016-10-25 23:48:18.615204
-No vulnerabilities found.
-
-
-themuppet2/flask-hello-world
-https://github.com/themuppet2/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:48:19.163639
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kindoprec/Flask-SecureHeaders
-https://github.com/kindoprec/Flask-SecureHeaders
-Entry file: Flask-SecureHeaders/tests/core_test.py
-Scanned: 2016-10-25 23:48:20.486198
-No vulnerabilities found.
-
-
-ishwarya-iyer/nuage_flask_app
-https://github.com/ishwarya-iyer/nuage_flask_app
-Entry file: nuage_flask_app/app.py
-Scanned: 2016-10-25 23:48:23.676666
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Christomas/flask_project_skeleton
-https://github.com/Christomas/flask_project_skeleton
-Entry file: flask_project_skeleton/app/__init__.py
-Scanned: 2016-10-25 23:48:25.128863
-No vulnerabilities found.
-
-
-pranavn-cuelogic/flask_video_conference_room
-https://github.com/pranavn-cuelogic/flask_video_conference_room
-Entry file: flask_video_conference_room/video_conf/main.py
-Scanned: 2016-10-25 23:48:26.540450
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-llxxee/A-website-by-Flask
-https://github.com/llxxee/A-website-by-Flask
-Entry file: None
-Scanned: 2016-10-25 23:48:27.860845
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/llxxee/A-website-by-Flask.
-
-micah-cal-sandbox/flask-heroku-sandbox
-https://github.com/micah-cal-sandbox/flask-heroku-sandbox
-Entry file: flask-heroku-sandbox/app.py
-Scanned: 2016-10-25 23:48:29.138487
-No vulnerabilities found.
-
-
-lkpanganiban/flask-rest-example
-https://github.com/lkpanganiban/flask-rest-example
-Entry file: flask-rest-example/app.py
-Scanned: 2016-10-25 23:48:33.456492
-Vulnerability 1:
-File: flask-rest-example/app.py
- > User input at line 48, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flask-rest-example/app.py
- > reaches line 55, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-rodcox89/flask-restful-blueprint-boilerplate
-https://github.com/rodcox89/flask-restful-blueprint-boilerplate
-Entry file: flask-restful-blueprint-boilerplate/main.py
-Scanned: 2016-10-25 23:48:36.926773
-No vulnerabilities found.
-
-
-braddmiller/flask-by-example
-https://github.com/braddmiller/flask-by-example
-Entry file: None
-Scanned: 2016-10-25 23:48:37.455173
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/braddmiller/flask-by-example.
-
-tych0/flask-demo-app
-https://github.com/tych0/flask-demo-app
-Entry file: flask-demo-app/app/__init__.py
-Scanned: 2016-10-25 23:48:42.248457
-No vulnerabilities found.
-
-
-technocake/flask-user-profiles-example
-https://github.com/technocake/flask-user-profiles-example
-Entry file: flask-user-profiles-example/pyhtml.py
-Scanned: 2016-10-25 23:48:43.536913
-No vulnerabilities found.
-
-
-Christomas/i_dev_flask
-https://github.com/Christomas/i_dev_flask
-Entry file: i_dev_flask/app/__init__.py
-Scanned: 2016-10-25 23:48:44.983972
-Vulnerability 1:
-File: i_dev_flask/app/auth/views.py
- > User input at line 121, trigger word ".data":
- user = models.User.query.filter_by(email=form.email.data).first()
-Reassigned in:
- File: i_dev_flask/app/auth/views.py
- > Line 123: token = options.dump_token('reset_password', user.id)
-File: i_dev_flask/app/auth/views.py
- > reaches line 124, trigger word "url_for(":
- options.send_email(user.email, '重置密码', 'auth/mail/reset_password',user=user, url=url_for('auth.reset_confirm',token=token, _external=True))
-
-Vulnerability 2:
-File: i_dev_flask/app/auth/views.py
- > User input at line 139, trigger word "get(":
- user = models.User.query.get(user_id)
-Reassigned in:
- File: i_dev_flask/app/auth/views.py
- > Line 143: form = forms.ResetPasswordForm(email=user.email)
- File: i_dev_flask/app/auth/views.py
- > Line 147: user.password = form.password.data
- File: i_dev_flask/app/auth/views.py
- > Line 138: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login'))
- File: i_dev_flask/app/auth/views.py
- > Line 142: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.lgoin'))
- File: i_dev_flask/app/auth/views.py
- > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login'))
-File: i_dev_flask/app/auth/views.py
- > reaches line 151, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('auth/reset_confirm.html',form=form)
-
-
-
-paulsavala/flask_aws_demo
-https://github.com/paulsavala/flask_aws_demo
-Entry file: None
-Scanned: 2016-10-25 23:48:53.968114
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-udpcloud/flask-rest-api
-https://github.com/udpcloud/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-25 23:48:55.280709
-Vulnerability 1:
-File: flask-rest-api/app/api_v1/spaces.py
- > User input at line 16, trigger word "get(":
- space = Spaces.query.get(id)
-File: flask-rest-api/app/api_v1/spaces.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(space_schema.dump(space).data)
-
-
-
-AndersonQ/appengine-flask-contacts-api
-https://github.com/AndersonQ/appengine-flask-contacts-api
-Entry file: appengine-flask-contacts-api/application/__init__.py
-Scanned: 2016-10-25 23:48:56.920150
-No vulnerabilities found.
-
-
-dhiraka/flask_basic_app
-https://github.com/dhiraka/flask_basic_app
-Entry file: flask_basic_app/test_rest_app.py
-Scanned: 2016-10-25 23:48:58.240582
-No vulnerabilities found.
-
-
-aaronja38/assignment10-flask
-https://github.com/aaronja38/assignment10-flask
-Entry file: assignment10-flask/winners.py
-Scanned: 2016-10-25 23:49:01.965394
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: assignment10-flask/env/lib/python2.7/sre_compile.py
-
-avikantz/Flask-API-Demo
-https://github.com/avikantz/Flask-API-Demo
-Entry file: Flask-API-Demo/app/__init__.py
-Scanned: 2016-10-25 23:49:03.778078
-No vulnerabilities found.
-
-
-deenaacree/flask_app1
-https://github.com/deenaacree/flask_app1
-Entry file: flask_app1/songsapp.py
-Scanned: 2016-10-25 23:49:07.179749
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_app1/env/lib/python2.7/sre_compile.py
-
-AMontalva/flask_hello_world
-https://github.com/AMontalva/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-25 23:49:09.504498
-No vulnerabilities found.
-
-
-xiewenlongs/Flask-CacheOBJ
-https://github.com/xiewenlongs/Flask-CacheOBJ
-Entry file: Flask-CacheOBJ/tests.py
-Scanned: 2016-10-25 23:49:11.078192
-No vulnerabilities found.
-
-
-thefunkjunky/python-flask-boilerplate
-https://github.com/thefunkjunky/python-flask-boilerplate
-Entry file: python-flask-boilerplate/mainapp/__init__.py
-Scanned: 2016-10-25 23:49:12.495352
-No vulnerabilities found.
-
-
-harryoh/flask-rest-api
-https://github.com/harryoh/flask-rest-api
-Entry file: flask-rest-api/app/__init__.py
-Scanned: 2016-10-25 23:49:13.802946
-Vulnerability 1:
-File: flask-rest-api/app/api_v1/spaces.py
- > User input at line 16, trigger word "get(":
- space = Spaces.query.get(id)
-File: flask-rest-api/app/api_v1/spaces.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(space_schema.dump(space).data)
-
-
-
-DanBlakeman/flask-deploy-practice
-https://github.com/DanBlakeman/flask-deploy-practice
-Entry file: flask-deploy-practice/src/app.py
-Scanned: 2016-10-25 23:49:15.213206
-No vulnerabilities found.
-
-
-MoxmiNu/flask-mongo-test
-https://github.com/MoxmiNu/flask-mongo-test
-Entry file: flask-mongo-test/provisioning/files/dr-app.py
-Scanned: 2016-10-25 23:49:32.249793
-No vulnerabilities found.
-
-
-medev21/Social-Network---Flask
-https://github.com/medev21/Social-Network---Flask
-Entry file: Social-Network---Flask/app.py
-Scanned: 2016-10-25 23:49:33.605512
-No vulnerabilities found.
-
-
-sealzjh/flask-celery-test
-https://github.com/sealzjh/flask-celery-test
-Entry file: None
-Scanned: 2016-10-25 23:49:34.918659
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sealzjh/flask-celery-test.
-
-Glaun/flask-hello-world
-https://github.com/Glaun/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:49:35.455788
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-acouderc/flask
-https://github.com/acouderc/flask
-Entry file: None
-Scanned: 2016-10-25 23:49:37.869313
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aintmetho/flask
-https://github.com/aintmetho/flask
-Entry file: None
-Scanned: 2016-10-25 23:49:38.400136
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MapEntryManagement/flask
-https://github.com/MapEntryManagement/flask
-Entry file: None
-Scanned: 2016-10-25 23:49:38.915544
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-klen/flask-pw
-https://github.com/klen/flask-pw
-Entry file: flask-pw/tests.py
-Scanned: 2016-10-25 23:49:40.369728
-No vulnerabilities found.
-
-
-KujiraProject/Flask-PAM
-https://github.com/KujiraProject/Flask-PAM
-Entry file: Flask-PAM/example/www.py
-Scanned: 2016-10-25 23:49:41.790955
-No vulnerabilities found.
-
-
-colingorrie/flask-boilerplate
-https://github.com/colingorrie/flask-boilerplate
-Entry file: None
-Scanned: 2016-10-25 23:49:42.303438
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate.
-
-TwilioDevEd/automated-survey-flask
-https://github.com/TwilioDevEd/automated-survey-flask
-Entry file: automated-survey-flask/automated_survey_flask/__init__.py
-Scanned: 2016-10-25 23:49:45.002406
-No vulnerabilities found.
-
-
-gene1wood/flaskoktaapp
-https://github.com/gene1wood/flaskoktaapp
-Entry file: flaskoktaapp/flaskoktaapp/__init__.py
-Scanned: 2016-10-25 23:49:46.438064
-Vulnerability 1:
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > User input at line 201, trigger word "form[":
- url = request.form['RelayState']
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > reaches line 196, trigger word "url_for(":
- url = url_for('user')
-
-Vulnerability 2:
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > User input at line 201, trigger word "form[":
- url = request.form['RelayState']
-File: flaskoktaapp/flaskoktaapp/__init__.py
- > reaches line 204, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url)
-
-
-
-yu66s/flaskr
-https://github.com/yu66s/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:49:46.974597
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yu66s/flaskr.
-
-xiaohu2015/Flasky
-https://github.com/xiaohu2015/Flasky
-Entry file: None
-Scanned: 2016-10-25 23:49:47.491295
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiaohu2015/Flasky.
-
-cwywang/flasky
-https://github.com/cwywang/flasky
-Entry file: None
-Scanned: 2016-10-25 23:49:48.024507
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wangxuan007/flasky
-https://github.com/wangxuan007/flasky
-Entry file: None
-Scanned: 2016-10-25 23:49:48.578362
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lambdaplus/flasko
-https://github.com/lambdaplus/flasko
-Entry file: flasko/Flasko.py
-Scanned: 2016-10-25 23:49:53.021558
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/operator.py
-
-SSUHan/flasktutorial
-https://github.com/SSUHan/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 23:49:54.601370
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SSUHan/flasktutorial.
-
-ma53192190/flaskwork
-https://github.com/ma53192190/flaskwork
-Entry file: flaskwork/flaskwork.py
-Scanned: 2016-10-25 23:49:56.949303
-No vulnerabilities found.
-
-
-hoobalias/Flaskr
-https://github.com/hoobalias/Flaskr
-Entry file: None
-Scanned: 2016-10-25 23:49:57.473068
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-NapoleonYoung/FlaskWeb
-https://github.com/NapoleonYoung/FlaskWeb
-Entry file: FlaskWeb/MyFirstWebServer/app/__init__.py
-Scanned: 2016-10-25 23:50:03.029763
-Vulnerability 1:
-File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > User input at line 15, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > Line 12: name = None
-File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name)
-
-
-
-zhouyang2640/FlaskInit
-https://github.com/zhouyang2640/FlaskInit
-Entry file: FlaskInit/hello.py
-Scanned: 2016-10-25 23:50:04.519087
-No vulnerabilities found.
-
-
-s3c0nDD/FlaskTutorial
-https://github.com/s3c0nDD/FlaskTutorial
-Entry file: FlaskTutorial/app/__init__.py
-Scanned: 2016-10-25 23:50:05.834080
-No vulnerabilities found.
-
-
-ZaighumRajput/flaskPractice
-https://github.com/ZaighumRajput/flaskPractice
-Entry file: flaskPractice/chapter2/hello.py
-Scanned: 2016-10-25 23:50:09.297750
-No vulnerabilities found.
-
-
-rmotr/flask-api-example
-https://github.com/rmotr/flask-api-example
-Entry file: flask-api-example/api/_01_manual_response_class.py
-Scanned: 2016-10-25 23:50:13.151900
-No vulnerabilities found.
-
-
-jjapp/flask-blog
-https://github.com/jjapp/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:50:13.662303
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-frankpiva/mastering-flask
-https://github.com/frankpiva/mastering-flask
-Entry file: mastering-flask/main.py
-Scanned: 2016-10-25 23:50:15.956640
-No vulnerabilities found.
-
-
-engfilipe/curso_flask
-https://github.com/engfilipe/curso_flask
-Entry file: None
-Scanned: 2016-10-25 23:50:21.452681
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sandmarq/flask_test
-https://github.com/sandmarq/flask_test
-Entry file: None
-Scanned: 2016-10-25 23:50:32.969623
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-barcai/Flask_Megatutorial
-https://github.com/barcai/Flask_Megatutorial
-Entry file: Flask_Megatutorial/app/__init__.py
-Scanned: 2016-10-25 23:50:35.374413
-No vulnerabilities found.
-
-
-zhang-zhang/learning-flask
-https://github.com/zhang-zhang/learning-flask
-Entry file: learning-flask/flaskr.py
-Scanned: 2016-10-25 23:50:36.684811
-No vulnerabilities found.
-
-
-kosen10spajam/f-flask
-https://github.com/kosen10spajam/f-flask
-Entry file: f-flask/main.py
-Scanned: 2016-10-25 23:50:38.099954
-Vulnerability 1:
-File: f-flask/main.py
- > User input at line 132, trigger word "get(":
- since = int(request.args.get('since'))
-File: f-flask/main.py
- > reaches line 134, trigger word "execute(":
- sql.execute('SELECT time, animal, message FROM messages WHERE time >= %d' % since)
-
-Vulnerability 2:
-File: f-flask/main.py
- > User input at line 142, trigger word "get(":
- animal = request.values.get('animal')
-File: f-flask/main.py
- > reaches line 146, trigger word "execute(":
- sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message))
-
-Vulnerability 3:
-File: f-flask/main.py
- > User input at line 143, trigger word "get(":
- message = request.values.get('message')
-File: f-flask/main.py
- > reaches line 146, trigger word "execute(":
- sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message))
-
-Vulnerability 4:
-File: f-flask/main.py
- > User input at line 144, trigger word "get(":
- time = int(request.values.get('time'))
-File: f-flask/main.py
- > reaches line 146, trigger word "execute(":
- sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message))
-
-
-
-mihai011/flask_server
-https://github.com/mihai011/flask_server
-Entry file: flask_server/app.py
-Scanned: 2016-10-25 23:50:39.990400
-No vulnerabilities found.
-
-
-morganvdavis/boilerplate-flask
-https://github.com/morganvdavis/boilerplate-flask
-Entry file: None
-Scanned: 2016-10-25 23:50:41.294880
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/morganvdavis/boilerplate-flask.
-
-jwg4/flask_converter
-https://github.com/jwg4/flask_converter
-Entry file: flask_converter/examples/app_with_constructor.py
-Scanned: 2016-10-25 23:50:42.712177
-No vulnerabilities found.
-
-
-AVandelay/flask_blog
-https://github.com/AVandelay/flask_blog
-Entry file: flask_blog/__init__.py
-Scanned: 2016-10-25 23:50:46.021547
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_blog/venv/lib/python3.4/operator.py
-
-Davidthecoolsmartguy/weasyprint-Flask
-https://github.com/Davidthecoolsmartguy/weasyprint-Flask
-Entry file: weasyprint-Flask/app.py
-Scanned: 2016-10-25 23:50:47.359240
-No vulnerabilities found.
-
-
-rajdeepd/flask-helloworld
-https://github.com/rajdeepd/flask-helloworld
-Entry file: flask-helloworld/app.py
-Scanned: 2016-10-25 23:50:50.820277
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-helloworld/venv/lib/python2.7/sre_compile.py
-
-honeeWong/Flask-Blog
-https://github.com/honeeWong/Flask-Blog
-Entry file: Flask-Blog/application/__init__.py
-Scanned: 2016-10-25 23:50:52.676873
-No vulnerabilities found.
-
-
-frenos/flask-sample
-https://github.com/frenos/flask-sample
-Entry file: flask-sample/app/__init__.py
-Scanned: 2016-10-25 23:50:54.071440
-No vulnerabilities found.
-
-
-lockie/flask_ldap
-https://github.com/lockie/flask_ldap
-Entry file: flask_ldap/index.py
-Scanned: 2016-10-25 23:50:55.384394
-Vulnerability 1:
-File: flask_ldap/index.py
- > User input at line 28, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask_ldap/index.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask_ldap/index.py
- > reaches line 29, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-Vulnerability 2:
-File: flask_ldap/index.py
- > User input at line 28, trigger word "get(":
- next = request.args.get('next')
-Reassigned in:
- File: flask_ldap/index.py
- > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form)
-File: flask_ldap/index.py
- > reaches line 29, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index'))
-
-
-
-AndreyBalandin/flask-test
-https://github.com/AndreyBalandin/flask-test
-Entry file: flask-test/app.py
-Scanned: 2016-10-25 23:50:56.677561
-No vulnerabilities found.
-
-
-kessiacastro/imdb-flask
-https://github.com/kessiacastro/imdb-flask
-Entry file: imdb-flask/app.py
-Scanned: 2016-10-25 23:51:01.865563
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-AmI-2016/python-Flask
-https://github.com/AmI-2016/python-Flask
-Entry file: python-Flask/flask-ex.py
-Scanned: 2016-10-25 23:51:03.862636
-Vulnerability 1:
-File: python-Flask/flask-ex.py
- > User input at line 30, trigger word "form[":
- user = request.form['user']
-Reassigned in:
- File: python-Flask/flask-ex.py
- > Line 33: session['user'] = user
- File: python-Flask/flask-ex.py
- > Line 34: session['valid'] = True
-File: python-Flask/flask-ex.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',user=user)
-
-
-
-anazard/zardify_flask
-https://github.com/anazard/zardify_flask
-Entry file: zardify_flask/main/__init__.py
-Scanned: 2016-10-25 23:51:08.481199
-No vulnerabilities found.
-
-
-buckeye76guy/learning-flask
-https://github.com/buckeye76guy/learning-flask
-Entry file: learning-flask/curious.py
-Scanned: 2016-10-25 23:51:10.310590
-No vulnerabilities found.
-
-
-thewhitedingo/MenuFlask
-https://github.com/thewhitedingo/MenuFlask
-Entry file: MenuFlask/flaskserver.py
-Scanned: 2016-10-25 23:51:11.781226
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-anazard/flask_project
-https://github.com/anazard/flask_project
-Entry file: flask_project/main/__init__.py
-Scanned: 2016-10-25 23:51:16.294195
-No vulnerabilities found.
-
-
-lizmeister321/flask_practice
-https://github.com/lizmeister321/flask_practice
-Entry file: None
-Scanned: 2016-10-25 23:51:16.872664
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-phillip-hopper/flask-test
-https://github.com/phillip-hopper/flask-test
-Entry file: flask-test/flaskr.py
-Scanned: 2016-10-25 23:51:18.280888
-No vulnerabilities found.
-
-
-wkqzxh/flask_leaklib
-https://github.com/wkqzxh/flask_leaklib
-Entry file: flask_leaklib/flask_leaklib/leaklib_app/__init__.py
-Scanned: 2016-10-25 23:51:19.610322
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Y-Rookie/flask_blog
-https://github.com/Y-Rookie/flask_blog
-Entry file: None
-Scanned: 2016-10-25 23:51:24.429489
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-brightforme/flask-sqlalchemy
-https://github.com/brightforme/flask-sqlalchemy
-Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py
-Scanned: 2016-10-25 23:51:26.410195
-No vulnerabilities found.
-
-
-pedrogaudencio/refunite-flask
-https://github.com/pedrogaudencio/refunite-flask
-Entry file: refunite-flask/app.py
-Scanned: 2016-10-25 23:51:34.458777
-No vulnerabilities found.
-
-
-holmandw/flask-arduino
-https://github.com/holmandw/flask-arduino
-Entry file: flask-arduino/app/__init__.py
-Scanned: 2016-10-25 23:51:36.041854
-No vulnerabilities found.
-
-
-zenyui/flask-test
-https://github.com/zenyui/flask-test
-Entry file: flask-test/api-test/api2.py
-Scanned: 2016-10-25 23:51:37.370877
-No vulnerabilities found.
-
-
-vobine/JobFlask
-https://github.com/vobine/JobFlask
-Entry file: None
-Scanned: 2016-10-25 23:51:38.912695
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vobine/JobFlask.
-
-Lobster1991/learn_flask
-https://github.com/Lobster1991/learn_flask
-Entry file: learn_flask/app/models.py
-Scanned: 2016-10-25 23:51:42.997782
-No vulnerabilities found.
-
-
-SarahJaine/flask-tutorial
-https://github.com/SarahJaine/flask-tutorial
-Entry file: None
-Scanned: 2016-10-25 23:51:43.537462
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SarahJaine/flask-tutorial.
-
-vatseek/flask_lessons
-https://github.com/vatseek/flask_lessons
-Entry file: flask_lessons/app/__init__.py
-Scanned: 2016-10-25 23:51:44.869209
-No vulnerabilities found.
-
-
-Michael-F-Bryan/flask_template
-https://github.com/Michael-F-Bryan/flask_template
-Entry file: flask_template/app/__init__.py
-Scanned: 2016-10-25 23:51:46.298082
-No vulnerabilities found.
-
-
-ol3j/azureday-flask
-https://github.com/ol3j/azureday-flask
-Entry file: azureday-flask/FlaskWebProject/__init__.py
-Scanned: 2016-10-25 23:51:48.101965
-Vulnerability 1:
-File: azureday-flask/FlaskWebProject/views.py
- > User input at line 57, trigger word "form[":
- mobile = request.form['yourmobile']
-Reassigned in:
- File: azureday-flask/FlaskWebProject/views.py
- > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename
- File: azureday-flask/FlaskWebProject/views.py
- > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename)
-File: azureday-flask/FlaskWebProject/views.py
- > reaches line 86, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric)
-
-Vulnerability 2:
-File: azureday-flask/FlaskWebProject/views.py
- > User input at line 58, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: azureday-flask/FlaskWebProject/views.py
- > Line 59: basename = file.filename
- File: azureday-flask/FlaskWebProject/views.py
- > Line 61: filename = '_'.join([suffix, basename])
- File: azureday-flask/FlaskWebProject/views.py
- > Line 68: url = blob_service.make_blob_url(https://github.com/container_name='images',%20blob_name=filename)
- File: azureday-flask/FlaskWebProject/views.py
- > Line 72: body = json.dumps('suffix''image'str(suffix)str(url))
- File: azureday-flask/FlaskWebProject/views.py
- > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename
- File: azureday-flask/FlaskWebProject/views.py
- > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename)
-File: azureday-flask/FlaskWebProject/views.py
- > reaches line 86, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric)
-
-
-
-runningstrawberry/microblog
-https://github.com/runningstrawberry/microblog
-Entry file: None
-Scanned: 2016-10-25 23:51:48.660785
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/runningstrawberry/microblog.
-
-ShivamMahajan/my_first_flask_project
-https://github.com/ShivamMahajan/my_first_flask_project
-Entry file: my_first_flask_project/hello.py
-Scanned: 2016-10-25 23:51:57.296164
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: my_first_flask_project/venv/lib/python2.7/sre_compile.py
-
-sakib3/flask_Cartridge_openshift
-https://github.com/sakib3/flask_Cartridge_openshift
-Entry file: flask_Cartridge_openshift/flaskapp.py
-Scanned: 2016-10-25 23:51:58.711077
-No vulnerabilities found.
-
-
-mfyock/flask_hello_world
-https://github.com/mfyock/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-25 23:52:02.091711
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sakib3/flask_cartridge_Heroku
-https://github.com/sakib3/flask_cartridge_Heroku
-Entry file: flask_cartridge_Heroku/app.py
-Scanned: 2016-10-25 23:52:03.505062
-No vulnerabilities found.
-
-
-gclabon/Twilio-Flask-CSV
-https://github.com/gclabon/Twilio-Flask-CSV
-Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py
-Scanned: 2016-10-25 23:52:04.953511
-No vulnerabilities found.
-
-
-AdamHumphrey/housing2016flask
-https://github.com/AdamHumphrey/housing2016flask
-Entry file: None
-Scanned: 2016-10-25 23:52:06.491980
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/AdamHumphrey/housing2016flask.
-
-SamirKanaan/PlantillaFlaskREST2
-https://github.com/SamirKanaan/PlantillaFlaskREST2
-Entry file: PlantillaFlaskREST2/inicia.py
-Scanned: 2016-10-25 23:52:07.909877
-No vulnerabilities found.
-
-
-pravinthsam/MnistFlaskKeras
-https://github.com/pravinthsam/MnistFlaskKeras
-Entry file: MnistFlaskKeras/flaskserver.py
-Scanned: 2016-10-25 23:52:10.323396
-No vulnerabilities found.
-
-
-rfmapp/flask-by-example
-https://github.com/rfmapp/flask-by-example
-Entry file: None
-Scanned: 2016-10-25 23:52:10.851899
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rfmapp/flask-by-example.
-
-dschuler36/SimpleFlaskBlog
-https://github.com/dschuler36/SimpleFlaskBlog
-Entry file: SimpleFlaskBlog/main.py
-Scanned: 2016-10-25 23:53:19.365335
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-macloo/flask_project1
-https://github.com/macloo/flask_project1
-Entry file: flask_project1/winners_BAK.py
-Scanned: 2016-10-25 23:53:20.833543
-No vulnerabilities found.
-
-
-3130000547/musicbox-base-on-flask
-https://github.com/3130000547/musicbox-base-on-flask
-Entry file: musicbox-base-on-flask/musicbox.py
-Scanned: 2016-10-25 23:53:22.364640
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-AjithPanneerselvam/my_flask_project
-https://github.com/AjithPanneerselvam/my_flask_project
-Entry file: my_flask_project/project.py
-Scanned: 2016-10-25 23:53:23.798359
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-avikantz/Flask-API-Demo
-https://github.com/avikantz/Flask-API-Demo
-Entry file: Flask-API-Demo/app/__init__.py
-Scanned: 2016-10-25 23:53:25.557104
-No vulnerabilities found.
-
-
-dengjonathan/flask_first_project
-https://github.com/dengjonathan/flask_first_project
-Entry file: flask_first_project/final_project.py
-Scanned: 2016-10-25 23:53:27.363730
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-boyombo/asterisk-pycall-flask
-https://github.com/boyombo/asterisk-pycall-flask
-Entry file: asterisk-pycall-flask/calldemo/app.py
-Scanned: 2016-10-25 23:53:28.668767
-No vulnerabilities found.
-
-
-kaslemr/sample_flask_project
-https://github.com/kaslemr/sample_flask_project
-Entry file: sample_flask_project/app2.py
-Scanned: 2016-10-25 23:53:30.163842
-Vulnerability 1:
-File: sample_flask_project/app2.py
- > User input at line 129, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: sample_flask_project/app2.py
- > Line 135: user = User(username=username)
-File: sample_flask_project/app2.py
- > reaches line 139, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 2:
-File: sample_flask_project/app2.py
- > User input at line 129, trigger word "get(":
- username = request.json.get('username')
-Reassigned in:
- File: sample_flask_project/app2.py
- > Line 135: user = User(username=username)
-File: sample_flask_project/app2.py
- > reaches line 139, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True))
-
-Vulnerability 3:
-File: sample_flask_project/app2.py
- > User input at line 145, trigger word "get(":
- user = User.query.get(id)
-File: sample_flask_project/app2.py
- > reaches line 148, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username)
-
-Vulnerability 4:
-File: sample_flask_project/app.py
- > User input at line 81, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: sample_flask_project/app.py
- > reaches line 88, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201)
-
-
-
-mapingfan/Flask-Mail-Test
-https://github.com/mapingfan/Flask-Mail-Test
-Entry file: Flask-Mail-Test/Mail-Test.py
-Scanned: 2016-10-25 23:53:32.460840
-No vulnerabilities found.
-
-
-4Catalyzer/flask-resty-tenants
-https://github.com/4Catalyzer/flask-resty-tenants
-Entry file: flask-resty-tenants/tests/conftest.py
-Scanned: 2016-10-25 23:53:33.868301
-No vulnerabilities found.
-
-
-lucaswadedavis/iguanodon
-https://github.com/lucaswadedavis/iguanodon
-Entry file: iguanodon/server.py
-Scanned: 2016-10-25 23:53:35.503703
-No vulnerabilities found.
-
-
-ederavilaprado/paas-app-example-python-flask
-https://github.com/ederavilaprado/paas-app-example-python-flask
-Entry file: paas-app-example-python-flask/app.py
-Scanned: 2016-10-25 23:53:37.295368
-No vulnerabilities found.
-
-
-afh/yabab
-https://github.com/afh/yabab
-Entry file: yabab/yabab/__init__.py
-Scanned: 2016-10-25 23:53:39.216623
-No vulnerabilities found.
-
-
-Michael-F-Bryan/mfb_website
-https://github.com/Michael-F-Bryan/mfb_website
-Entry file: mfb_website/app/__init__.py
-Scanned: 2016-10-25 23:53:40.657338
-No vulnerabilities found.
-
-
-Yelloworking/SlackWebservice
-https://github.com/Yelloworking/SlackWebservice
-Entry file: None
-Scanned: 2016-10-25 23:53:41.959974
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Yelloworking/SlackWebservice.
-
-TrailBlazerZ/imgaptcha--api
-https://github.com/TrailBlazerZ/imgaptcha--api
-Entry file: imgaptcha--api/app.py
-Scanned: 2016-10-25 23:53:43.657140
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-NSBum/AnkiStatsServer
-https://github.com/NSBum/AnkiStatsServer
-Entry file: AnkiStatsServer/app.py
-Scanned: 2016-10-25 23:53:45.630148
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yobuntu/laboratory
-https://github.com/yobuntu/laboratory
-Entry file: laboratory/laboratory/fooflask.py
-Scanned: 2016-10-25 23:53:46.925954
-Vulnerability 1:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 5, trigger word "get(":
- response = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 5, trigger word "url_for(":
- response = client.get(url_for('hello'))
-
-Vulnerability 2:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 11, trigger word "get(":
- r = client.get(url_for('add',name='test'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 11, trigger word "url_for(":
- r = client.get(url_for('add',name='test'))
-
-Vulnerability 3:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 12, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 11, trigger word "url_for(":
- r = client.get(url_for('add',name='test'))
-
-Vulnerability 4:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 11, trigger word "get(":
- r = client.get(url_for('add',name='test'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 12, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 5:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 12, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 12, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 6:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 19, trigger word "get(":
- response = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 19, trigger word "url_for(":
- response = client.get(url_for('hello'))
-
-Vulnerability 7:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 26, trigger word "get(":
- r = client.get(url_for('add',name='test0'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 26, trigger word "url_for(":
- r = client.get(url_for('add',name='test0'))
-
-Vulnerability 8:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 27, trigger word "get(":
- r = client.get(url_for('add',name='test1'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 26, trigger word "url_for(":
- r = client.get(url_for('add',name='test0'))
-
-Vulnerability 9:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 28, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 26, trigger word "url_for(":
- r = client.get(url_for('add',name='test0'))
-
-Vulnerability 10:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 26, trigger word "get(":
- r = client.get(url_for('add',name='test0'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 27, trigger word "url_for(":
- r = client.get(url_for('add',name='test1'))
-
-Vulnerability 11:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 27, trigger word "get(":
- r = client.get(url_for('add',name='test1'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 27, trigger word "url_for(":
- r = client.get(url_for('add',name='test1'))
-
-Vulnerability 12:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 28, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 27, trigger word "url_for(":
- r = client.get(url_for('add',name='test1'))
-
-Vulnerability 13:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 26, trigger word "get(":
- r = client.get(url_for('add',name='test0'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 28, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 14:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 27, trigger word "get(":
- r = client.get(url_for('add',name='test1'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 28, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 15:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 28, trigger word "get(":
- r = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 28, trigger word "url_for(":
- r = client.get(url_for('hello'))
-
-Vulnerability 16:
-File: laboratory/laboratory/tests/test_base.py
- > User input at line 36, trigger word "get(":
- response = client.get(url_for('hello'))
-File: laboratory/laboratory/tests/test_base.py
- > reaches line 36, trigger word "url_for(":
- response = client.get(url_for('hello'))
-
-
-
-hkalexling/Twitter-Like-Count
-https://github.com/hkalexling/Twitter-Like-Count
-Entry file: Twitter-Like-Count/__init__.py
-Scanned: 2016-10-25 23:53:48.467972
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ljxxcaijing/flask
-https://github.com/ljxxcaijing/flask
-Entry file: None
-Scanned: 2016-10-25 23:53:50.399875
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-PacktPublishing/Mastering-Flask
-https://github.com/PacktPublishing/Mastering-Flask
-Entry file: Mastering-Flask/Chapter 13_Code/Chapter 13/webapp/__init__.py
-Scanned: 2016-10-25 23:53:52.549179
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-migrateup/flaskr
-https://github.com/migrateup/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:53:53.086162
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/migrateup/flaskr.
-
-reparadocs/Flask-HelloWorldBot
-https://github.com/reparadocs/Flask-HelloWorldBot
-Entry file: Flask-HelloWorldBot/HelloWorldBot.py
-Scanned: 2016-10-25 23:53:54.484699
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-singingwolfboy/flask-sse
-https://github.com/singingwolfboy/flask-sse
-Entry file: flask-sse/tests/conftest.py
-Scanned: 2016-10-25 23:53:55.926372
-No vulnerabilities found.
-
-
-pankajpant22/flask
-https://github.com/pankajpant22/flask
-Entry file: None
-Scanned: 2016-10-25 23:54:13.497423
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-underdogio/flask-graylog
-https://github.com/underdogio/flask-graylog
-Entry file: flask-graylog/example/app.py
-Scanned: 2016-10-25 23:54:20.844714
-No vulnerabilities found.
-
-
-adyouri/flask-basics
-https://github.com/adyouri/flask-basics
-Entry file: flask-basics/lesson5/app.py
-Scanned: 2016-10-25 23:54:22.289456
-No vulnerabilities found.
-
-
-KujiraProject/Flask-PAM
-https://github.com/KujiraProject/Flask-PAM
-Entry file: Flask-PAM/example/www.py
-Scanned: 2016-10-25 23:54:24.708633
-No vulnerabilities found.
-
-
-TwilioDevEd/automated-survey-flask
-https://github.com/TwilioDevEd/automated-survey-flask
-Entry file: automated-survey-flask/automated_survey_flask/__init__.py
-Scanned: 2016-10-25 23:54:27.368360
-No vulnerabilities found.
-
-
-gucxufangling/flask--
-https://github.com/gucxufangling/flask--
-Entry file: flask--/app/__init__.py
-Scanned: 2016-10-25 23:54:31.837086
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pragmaticcoders/flask-react-seed
-https://github.com/pragmaticcoders/flask-react-seed
-Entry file: None
-Scanned: 2016-10-25 23:54:32.437875
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed.
-
-danil3d/flaskblog
-https://github.com/danil3d/flaskblog
-Entry file: None
-Scanned: 2016-10-25 23:54:32.952405
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/danil3d/flaskblog.
-
-ailtoncsf/flasklearn
-https://github.com/ailtoncsf/flasklearn
-Entry file: flasklearn/flask-basics/app.py
-Scanned: 2016-10-25 23:54:40.494439
-No vulnerabilities found.
-
-
-VimDong/flaskme
-https://github.com/VimDong/flaskme
-Entry file: flaskme/app/__init__.py
-Scanned: 2016-10-25 23:54:42.119872
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-axavio/flasky
-https://github.com/axavio/flasky
-Entry file: None
-Scanned: 2016-10-25 23:54:42.634264
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-annoys-parrot/flaskbook
-https://github.com/annoys-parrot/flaskbook
-Entry file: flaskbook/application.py
-Scanned: 2016-10-25 23:54:44.246705
-Vulnerability 1:
-File: flaskbook/user/views.py
- > User input at line 24, trigger word ".data":
- user = User.objects.filter(username=form.username.data).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 37: user = None
-File: flaskbook/user/views.py
- > reaches line 24, trigger word "filter(":
- user = User.objects.filter(username=form.username.data).first()
-
-Vulnerability 2:
-File: flaskbook/user/views.py
- > User input at line 31, trigger word "get(":
- next = session.get('next')
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 35: ret_MAYBE_FUNCTION_NAME = 'User logged in'
- File: flaskbook/user/views.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error)
-File: flaskbook/user/views.py
- > reaches line 33, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(next)
-
-Vulnerability 3:
-File: flaskbook/user/views.py
- > User input at line 47, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 62, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 4:
-File: flaskbook/user/views.py
- > User input at line 49, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 62, trigger word "render_template(":
- body_html = render_template('mail/user/register.html',user=user)
-
-Vulnerability 5:
-File: flaskbook/user/views.py
- > User input at line 47, trigger word ".data":
- hashed_password = bcrypt.hashpw(form.password.data, salt)
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 63, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 6:
-File: flaskbook/user/views.py
- > User input at line 49, trigger word ".data":
- user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode)
-File: flaskbook/user/views.py
- > reaches line 63, trigger word "render_template(":
- body_text = render_template('mail/user/register.txt',user=user)
-
-Vulnerability 7:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 90, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-Vulnerability 8:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 106, trigger word "filter(":
- if User.objects.filter(username=form.username.data.lower()).first():
-
-Vulnerability 9:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 113, trigger word "filter(":
- if User.objects.filter(email=form.email.data.lower()).first():
-
-Vulnerability 10:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 126, trigger word "render_template(":
- body_html = render_template('mail/user/change_email.html',user=user)
-
-Vulnerability 11:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 127, trigger word "render_template(":
- body_text = render_template('mail/user/change_email.txt',user=user)
-
-Vulnerability 12:
-File: flaskbook/user/views.py
- > User input at line 90, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-Reassigned in:
- File: flaskbook/user/views.py
- > Line 92: form = EditForm(obj=user)
- File: flaskbook/user/views.py
- > Line 99: filename = secure_filename(form.image.data.filename)
- File: flaskbook/user/views.py
- > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename)
- File: flaskbook/user/views.py
- > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id)))
- File: flaskbook/user/views.py
- > Line 122: form.email.data = user.email
- File: flaskbook/user/views.py
- > Line 133: user.profile_image = image_ts
- File: flaskbook/user/views.py
- > Line 97: image_ts = None
-File: flaskbook/user/views.py
- > reaches line 137, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user)
-
-Vulnerability 13:
-File: flaskbook/user/views.py
- > User input at line 160, trigger word ".data":
- user = User.objects.filter(email=form.email.data).first()
-File: flaskbook/user/views.py
- > reaches line 160, trigger word "filter(":
- user = User.objects.filter(email=form.email.data).first()
-
-Vulnerability 14:
-File: flaskbook/user/views.py
- > User input at line 160, trigger word ".data":
- user = User.objects.filter(email=form.email.data).first()
-File: flaskbook/user/views.py
- > reaches line 168, trigger word "render_template(":
- body_html = render_template('mail/user/password_reset.html',user=user)
-
-Vulnerability 15:
-File: flaskbook/user/views.py
- > User input at line 160, trigger word ".data":
- user = User.objects.filter(email=form.email.data).first()
-File: flaskbook/user/views.py
- > reaches line 169, trigger word "render_template(":
- body_text = render_template('mail/user/password_reset.txt',user=user)
-
-Vulnerability 16:
-File: flaskbook/user/views.py
- > User input at line 215, trigger word "get(":
- user = User.objects.filter(username=session.get('username')).first()
-File: flaskbook/user/views.py
- > reaches line 215, trigger word "filter(":
- user = User.objects.filter(username=session.get('username')).first()
-
-
-
-jinxiaoyuan/flaskr
-https://github.com/jinxiaoyuan/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:54:44.770027
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jinxiaoyuan/flaskr.
-
-fkirwin/flaskhelloworld
-https://github.com/fkirwin/flaskhelloworld
-Entry file: flaskhelloworld/hello_world.py
-Scanned: 2016-10-25 23:54:48.043076
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wang7lu6qiang5/flasky
-https://github.com/wang7lu6qiang5/flasky
-Entry file: None
-Scanned: 2016-10-25 23:54:48.557326
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ak042/flasktaskr
-https://github.com/ak042/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:54:49.080037
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wanghaa/flasky
-https://github.com/wanghaa/flasky
-Entry file: None
-Scanned: 2016-10-25 23:54:49.591341
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-omshankar1/flaskapp
-https://github.com/omshankar1/flaskapp
-Entry file: None
-Scanned: 2016-10-25 23:54:50.104846
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/omshankar1/flaskapp.
-
-maxwang051/flasktaskr
-https://github.com/maxwang051/flasktaskr
-Entry file: None
-Scanned: 2016-10-25 23:54:50.618328
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-joanna-solomiewicz/FlaskWorkshop
-https://github.com/joanna-solomiewicz/FlaskWorkshop
-Entry file: FlaskWorkshop/app.py
-Scanned: 2016-10-25 23:54:53.669451
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWorkshop/venv/lib/python3.5/operator.py
-
-NapoleonYoung/FlaskWeb
-https://github.com/NapoleonYoung/FlaskWeb
-Entry file: FlaskWeb/MyFirstWebServer/app/__init__.py
-Scanned: 2016-10-25 23:54:58.520162
-Vulnerability 1:
-File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > User input at line 15, trigger word ".data":
- name = form.name.data
-Reassigned in:
- File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > Line 12: name = None
-File: FlaskWeb/MyFirstWebServer/app/main/views.py
- > reaches line 18, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name)
-
-
-
-rmGuarachi/flaskTutorial
-https://github.com/rmGuarachi/flaskTutorial
-Entry file: flaskTutorial/webapp.py
-Scanned: 2016-10-25 23:54:59.853424
-No vulnerabilities found.
-
-
-mion00/flaskSQLAlchemy
-https://github.com/mion00/flaskSQLAlchemy
-Entry file: flaskSQLAlchemy/app.py
-Scanned: 2016-10-25 23:55:01.218388
-Vulnerability 1:
-File: flaskSQLAlchemy/app.py
- > User input at line 32, trigger word "get(":
- service = request.args.get('service')
-File: flaskSQLAlchemy/app.py
- > reaches line 34, trigger word "filter(":
- users = User.query.filter(User.json.has_key(service)).all()
-
-
-
-GriMel/FlaskFirst
-https://github.com/GriMel/FlaskFirst
-Entry file: FlaskFirst/app/__init__.py
-Scanned: 2016-10-25 23:55:02.957350
-No vulnerabilities found.
-
-
-Pazoles/Geocoder
-https://github.com/Pazoles/Geocoder
-Entry file: Geocoder/app.py
-Scanned: 2016-10-25 23:55:06.939965
-No vulnerabilities found.
-
-
-spring3th/flask-blogdemo
-https://github.com/spring3th/flask-blogdemo
-Entry file: flask-blogdemo/app/__init__.py
-Scanned: 2016-10-25 23:55:08.562780
-Vulnerability 1:
-File: flask-blogdemo/app/main/views.py
- > User input at line 27, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 35: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_POSTS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 38: posts = pagination.items
- File: flask-blogdemo/app/main/views.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flask-blogdemo/app/main/views.py
- > User input at line 30, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 28: show_followed = False
- File: flask-blogdemo/app/main/views.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flask-blogdemo/app/main/views.py
- > User input at line 44, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 45: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['SIKA_USERS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 46: alluser = pagination.items
-File: flask-blogdemo/app/main/views.py
- > reaches line 47, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('alluser.html',alluser=alluser, pagination=pagination, page=page)
-
-Vulnerability 4:
-File: flask-blogdemo/app/main/views.py
- > User input at line 106, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 108: page = post.comments.count() - 1 // current_app.config['SIKA_COMMENTS_PER_PAGE'] + 1
- File: flask-blogdemo/app/main/views.py
- > Line 110: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 111: comments = pagination.items
- File: flask-blogdemo/app/main/views.py
- > Line 105: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flask-blogdemo/app/main/views.py
- > reaches line 112, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flask-blogdemo/app/main/views.py
- > User input at line 184, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 185: pagination = user.followers.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 188: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask-blogdemo/app/main/views.py
- > Line 183: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 190, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flask-blogdemo/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 202: pagination = user.followed.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 205: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask-blogdemo/app/main/views.py
- > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask-blogdemo/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: flask-blogdemo/app/main/views.py
- > User input at line 230, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask-blogdemo/app/main/views.py
- > Line 231: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False)
- File: flask-blogdemo/app/main/views.py
- > Line 232: comments = pagination.items
-File: flask-blogdemo/app/main/views.py
- > reaches line 233, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-NixonInnes/Flask-Blueprints
-https://github.com/NixonInnes/Flask-Blueprints
-Entry file: Flask-Blueprints/app/__init__.py
-Scanned: 2016-10-25 23:55:10.831447
-No vulnerabilities found.
-
-
-isichkodmitry/flask-caesar
-https://github.com/isichkodmitry/flask-caesar
-Entry file: flask-caesar/app/__init__.py
-Scanned: 2016-10-25 23:55:12.269001
-No vulnerabilities found.
-
-
-and3rson/flask-testsite
-https://github.com/and3rson/flask-testsite
-Entry file: flask-testsite/app.py
-Scanned: 2016-10-25 23:55:13.588264
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-SShayashi/flask-test
-https://github.com/SShayashi/flask-test
-Entry file: flask-test/flaskr/__init__.py
-Scanned: 2016-10-25 23:55:14.991249
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tyrelsouza/flask_vagrant
-https://github.com/tyrelsouza/flask_vagrant
-Entry file: flask_vagrant/code/src/app.py
-Scanned: 2016-10-25 23:55:21.391221
-No vulnerabilities found.
-
-
-ak042/flask-blog
-https://github.com/ak042/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:55:21.934922
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhang-zhang/learning-flask
-https://github.com/zhang-zhang/learning-flask
-Entry file: learning-flask/flaskr.py
-Scanned: 2016-10-25 23:55:25.238595
-No vulnerabilities found.
-
-
-syniuhin/storyteller-flask
-https://github.com/syniuhin/storyteller-flask
-Entry file: storyteller-flask/app/__init__.py
-Scanned: 2016-10-25 23:55:26.714668
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-arushijain/flask_tutorial
-https://github.com/arushijain/flask_tutorial
-Entry file: None
-Scanned: 2016-10-25 23:55:28.267683
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/arushijain/flask_tutorial.
-
-iooop/flask-blog
-https://github.com/iooop/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:55:32.822191
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-AndreyBalandin/flask-test
-https://github.com/AndreyBalandin/flask-test
-Entry file: flask-test/app.py
-Scanned: 2016-10-25 23:55:34.137959
-No vulnerabilities found.
-
-
-mastershao/lening-flask
-https://github.com/mastershao/lening-flask
-Entry file: None
-Scanned: 2016-10-25 23:55:42.056314
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask.
-
-markchodges/mastering-flask
-https://github.com/markchodges/mastering-flask
-Entry file: mastering-flask/webapp/__init__.py
-Scanned: 2016-10-25 23:55:46.259644
-Vulnerability 1:
-File: mastering-flask/webapp/controllers/blog.py
- > User input at line 71, trigger word ".data":
- filename = secure_filename(form.photo.data.filename)
-Reassigned in:
- File: mastering-flask/webapp/controllers/blog.py
- > Line 74: filename = None
-File: mastering-flask/webapp/controllers/blog.py
- > reaches line 75, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('upload.html',form=form, filename=filename)
-
-
-
-keeleys/flask_RESTful
-https://github.com/keeleys/flask_RESTful
-Entry file: flask_RESTful/api/__init__.py
-Scanned: 2016-10-25 23:55:47.702369
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Datamine/PokerTexter
-https://github.com/Datamine/PokerTexter
-Entry file: PokerTexter/run-pokertexter.py
-Scanned: 2016-10-25 23:55:49.880586
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-AmI-2016/python-Flask
-https://github.com/AmI-2016/python-Flask
-Entry file: python-Flask/flask-ex.py
-Scanned: 2016-10-25 23:55:51.307774
-Vulnerability 1:
-File: python-Flask/flask-ex.py
- > User input at line 30, trigger word "form[":
- user = request.form['user']
-Reassigned in:
- File: python-Flask/flask-ex.py
- > Line 33: session['user'] = user
- File: python-Flask/flask-ex.py
- > Line 34: session['valid'] = True
-File: python-Flask/flask-ex.py
- > reaches line 36, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('login.html',user=user)
-
-
-
-SorenPeterson/flask-intro
-https://github.com/SorenPeterson/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-25 23:55:54.995539
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro/venv/lib/python2.7/sre_compile.py
-
-an5rag/flask-tutorial
-https://github.com/an5rag/flask-tutorial
-Entry file: None
-Scanned: 2016-10-25 23:55:55.568995
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/an5rag/flask-tutorial.
-
-sugarguo/Flask_Blog
-https://github.com/sugarguo/Flask_Blog
-Entry file: Flask_Blog/app/__init__.py
-Scanned: 2016-10-25 23:56:00.044832
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-andresgariglio/poc-flask
-https://github.com/andresgariglio/poc-flask
-Entry file: poc-flask/poc-flask/flask_rest_service/__init__.py
-Scanned: 2016-10-25 23:56:01.498249
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-stuncyilmaz/flask_init
-https://github.com/stuncyilmaz/flask_init
-Entry file: flask_init/hello.py
-Scanned: 2016-10-25 23:56:03.074105
-No vulnerabilities found.
-
-
-mrpatiwi/flask-starter
-https://github.com/mrpatiwi/flask-starter
-Entry file: None
-Scanned: 2016-10-25 23:56:03.600368
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrpatiwi/flask-starter.
-
-jmccutchan/raspi_flask
-https://github.com/jmccutchan/raspi_flask
-Entry file: raspi_flask/app.py
-Scanned: 2016-10-25 23:56:07.414160
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-priyankt68/flask_example
-https://github.com/priyankt68/flask_example
-Entry file: None
-Scanned: 2016-10-25 23:56:07.969120
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/priyankt68/flask_example.
-
-zeratullich/flask_maizi
-https://github.com/zeratullich/flask_maizi
-Entry file: flask_maizi/app/__init__.py
-Scanned: 2016-10-25 23:56:10.513983
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mtimebombm/python-flask
-https://github.com/mtimebombm/python-flask
-Entry file: python-flask/app/__init__.py
-Scanned: 2016-10-25 23:56:12.239294
-No vulnerabilities found.
-
-
-Lobster1991/learn_flask
-https://github.com/Lobster1991/learn_flask
-Entry file: learn_flask/app/models.py
-Scanned: 2016-10-25 23:56:17.119633
-No vulnerabilities found.
-
-
-JessyHurbain/Flask_test
-https://github.com/JessyHurbain/Flask_test
-Entry file: Flask_test/coucou.py
-Scanned: 2016-10-25 23:56:18.439453
-No vulnerabilities found.
-
-
-achinnac/microblog-flask
-https://github.com/achinnac/microblog-flask
-Entry file: microblog-flask/app/__init__.py
-Scanned: 2016-10-25 23:56:19.728384
-No vulnerabilities found.
-
-
-jpirih/Flask-Blog
-https://github.com/jpirih/Flask-Blog
-Entry file: None
-Scanned: 2016-10-25 23:56:25.190999
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhaokefei/web_flask
-https://github.com/zhaokefei/web_flask
-Entry file: web_flask/app/__init__.py
-Scanned: 2016-10-25 23:56:26.962714
-Vulnerability 1:
-File: web_flask/app/main/views.py
- > User input at line 24, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: web_flask/app/main/views.py
- > Line 25: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: web_flask/app/main/views.py
- > Line 28: posts = pagination.items
- File: web_flask/app/main/views.py
- > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: web_flask/app/main/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-
-
-BaichuanWu/Blog_flask
-https://github.com/BaichuanWu/Blog_flask
-Entry file: Blog_flask/flaskpractise.py
-Scanned: 2016-10-25 23:56:28.261975
-No vulnerabilities found.
-
-
-sreyemnayr/jss-flask
-https://github.com/sreyemnayr/jss-flask
-Entry file: jss-flask/jss-flask.py
-Scanned: 2016-10-25 23:56:29.582612
-No vulnerabilities found.
-
-
-hectorip/TinyFlaskExperiment
-https://github.com/hectorip/TinyFlaskExperiment
-Entry file: TinyFlaskExperiment/hello.py
-Scanned: 2016-10-25 23:56:30.870668
-No vulnerabilities found.
-
-
-WhiteShirts/windowsflask
-https://github.com/WhiteShirts/windowsflask
-Entry file: windowsflask/flasky/app/__init__.py
-Scanned: 2016-10-25 23:56:32.625957
-Vulnerability 1:
-File: windowsflask/flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: windowsflask/flasky/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: windowsflask/flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: windowsflask/flasky/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: windowsflask/flasky/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 16: prev = None
- File: windowsflask/flasky/app/api_1_0/posts.py
- > Line 19: next = None
-File: windowsflask/flasky/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 20: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 23: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: windowsflask/flasky/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 42: prev = None
- File: windowsflask/flasky/app/api_1_0/users.py
- > Line 45: next = None
-File: windowsflask/flasky/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 15: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 18: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: windowsflask/flasky/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 43: prev = None
- File: windowsflask/flasky/app/api_1_0/comments.py
- > Line 46: next = None
-File: windowsflask/flasky/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 27, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 37: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 40: posts = pagination.items
- File: windowsflask/flasky/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 32, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 30: show_followed = False
- File: windowsflask/flasky/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 42, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 67, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 68: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 71: posts = pagination.items
-File: windowsflask/flasky/app/main/views.py
- > reaches line 72, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 135, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 137: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: windowsflask/flasky/app/main/views.py
- > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 142: comments = pagination.items
- File: windowsflask/flasky/app/main/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 143, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: windowsflask/flasky/app/main/views.py
- > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 217, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 218: pagination = user.followed.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 221: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: windowsflask/flasky/app/main/views.py
- > Line 216: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: windowsflask/flasky/app/main/views.py
- > reaches line 223, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: windowsflask/flasky/app/main/views.py
- > User input at line 231, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: windowsflask/flasky/app/main/views.py
- > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: windowsflask/flasky/app/main/views.py
- > Line 235: comments = pagination.items
-File: windowsflask/flasky/app/main/views.py
- > reaches line 236, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-ptomelle/appflask
-https://github.com/ptomelle/appflask
-Entry file: appflask/wsgi/myflaskapp.py
-Scanned: 2016-10-25 23:56:34.175690
-No vulnerabilities found.
-
-
-globocom/gbix
-https://github.com/globocom/gbix
-Entry file: gbix/src/server_jsonrpc.py
-Scanned: 2016-10-25 23:56:35.614339
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-martinpeck/bedlam-slack
-https://github.com/martinpeck/bedlam-slack
-Entry file: bedlam-slack/bedlam_slack/__init__.py
-Scanned: 2016-10-25 23:56:37.062273
-Vulnerability 1:
-File: bedlam-slack/bedlam_slack/ud.py
- > User input at line 11, trigger word "get(":
- phrase = parse.quote_plus(request.values.get('text').strip())
-Reassigned in:
- File: bedlam-slack/bedlam_slack/ud.py
- > Line 13: response = 'response_type''text''unfurl_links''in_channel''http://www.urbandictionary.com/define.php?term=' + phrase'true'
-File: bedlam-slack/bedlam_slack/ud.py
- > reaches line 19, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-kud-i/FlaskRestAPI
-https://github.com/kud-i/FlaskRestAPI
-Entry file: FlaskRestAPI/REST_API.py
-Scanned: 2016-10-25 23:56:38.368209
-Vulnerability 1:
-File: FlaskRestAPI/REST_API.py
- > User input at line 75, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: FlaskRestAPI/REST_API.py
- > reaches line 82, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-mapingfan/Flask-Web-Dev
-https://github.com/mapingfan/Flask-Web-Dev
-Entry file: Flask-Web-Dev/app.py
-Scanned: 2016-10-25 23:56:46.733269
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-opendatakosovo/flask-app-framework
-https://github.com/opendatakosovo/flask-app-framework
-Entry file: flask-app-framework/app/__init__.py
-Scanned: 2016-10-25 23:56:48.252284
-No vulnerabilities found.
-
-
-cbeasley92/Flask-REST-API-Testing
-https://github.com/cbeasley92/Flask-REST-API-Testing
-Entry file: Flask-REST-API-Testing/rest_api.py
-Scanned: 2016-10-25 23:56:49.560717
-Vulnerability 1:
-File: Flask-REST-API-Testing/rest_api.py
- > User input at line 88, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: Flask-REST-API-Testing/rest_api.py
- > reaches line 95, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-kriesbeck/flask_heroku_practice
-https://github.com/kriesbeck/flask_heroku_practice
-Entry file: flask_heroku_practice/app/__init__.py
-Scanned: 2016-10-25 23:56:51.123626
-No vulnerabilities found.
-
-
-zelinlee0303/python-flask-mysql
-https://github.com/zelinlee0303/python-flask-mysql
-Entry file: python-flask-mysql/app/__init__.py
-Scanned: 2016-10-25 23:56:52.720275
-Vulnerability 1:
-File: python-flask-mysql/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 26: posts = pagination.items
- File: python-flask-mysql/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: python-flask-mysql/app/main/views.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 42: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 45: posts = pagination.items
- File: python-flask-mysql/app/main/views.py
- > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 46, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('mindtrace.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 3:
-File: python-flask-mysql/app/main/views.py
- > User input at line 118, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 119: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 122: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: python-flask-mysql/app/main/views.py
- > Line 117: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 124, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='被', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 4:
-File: python-flask-mysql/app/main/views.py
- > User input at line 135, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 136: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 139: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: python-flask-mysql/app/main/views.py
- > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace'))
-File: python-flask-mysql/app/main/views.py
- > reaches line 141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: python-flask-mysql/app/main/views.py
- > User input at line 154, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: python-flask-mysql/app/main/views.py
- > Line 155: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: python-flask-mysql/app/main/views.py
- > Line 158: posts = pagination.items
-File: python-flask-mysql/app/main/views.py
- > reaches line 159, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-
-
-ZAGJAB/Flask_OAuth2
-https://github.com/ZAGJAB/Flask_OAuth2
-Entry file: Flask_OAuth2/app.py
-Scanned: 2016-10-25 23:56:54.023385
-Vulnerability 1:
-File: Flask_OAuth2/app.py
- > User input at line 75, trigger word "get(":
- code = request.args.get('code')
-Reassigned in:
- File: Flask_OAuth2/app.py
- > Line 76: uri = 'http://localhost:5000/oauth?response_type=%s&client_id=%s&redirect_uri=%s' % (code, client_id, redirect_uri)
-File: Flask_OAuth2/app.py
- > reaches line 77, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(uri)
-
-
-
-k-funk/flask-bower-bootstrap-compass
-https://github.com/k-funk/flask-bower-bootstrap-compass
-Entry file: flask-bower-bootstrap-compass/app_name/__init__.py
-Scanned: 2016-10-25 23:56:57.380250
-No vulnerabilities found.
-
-
-SamirKanaan/PlantillaFlaskREST3
-https://github.com/SamirKanaan/PlantillaFlaskREST3
-Entry file: PlantillaFlaskREST3/inicia.py
-Scanned: 2016-10-25 23:56:58.795844
-No vulnerabilities found.
-
-
-cruor99/heartbeat-flask-app
-https://github.com/cruor99/heartbeat-flask-app
-Entry file: heartbeat-flask-app/flaskheartbeat/__init__.py
-Scanned: 2016-10-25 23:57:00.469314
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sakib3/flask_cartridge_Heroku
-https://github.com/sakib3/flask_cartridge_Heroku
-Entry file: flask_cartridge_Heroku/app.py
-Scanned: 2016-10-25 23:57:01.954065
-No vulnerabilities found.
-
-
-gclabon/Twilio-Flask-CSV
-https://github.com/gclabon/Twilio-Flask-CSV
-Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py
-Scanned: 2016-10-25 23:57:03.408805
-No vulnerabilities found.
-
-
-ak042/flask-hello-world
-https://github.com/ak042/flask-hello-world
-Entry file: None
-Scanned: 2016-10-25 23:57:03.991417
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-king100/Flask-Hello-World-
-https://github.com/king100/Flask-Hello-World-
-Entry file: Flask-Hello-World-/app.py
-Scanned: 2016-10-25 23:57:08.278334
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Hello-World-/flask/lib/python2.7/sre_compile.py
-
-MMohan1/Flask_with_celery
-https://github.com/MMohan1/Flask_with_celery
-Entry file: Flask_with_celery/flask_app_test/flask_app/edge/__init__.py
-Scanned: 2016-10-25 23:57:09.644395
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jhelgren/flask_movie_reviews
-https://github.com/jhelgren/flask_movie_reviews
-Entry file: flask_movie_reviews/server.py
-Scanned: 2016-10-25 23:57:11.066976
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-NixonInnes/Flask-Blueprints-Logins
-https://github.com/NixonInnes/Flask-Blueprints-Logins
-Entry file: Flask-Blueprints-Logins/app/__init__.py
-Scanned: 2016-10-25 23:57:12.877117
-No vulnerabilities found.
-
-
-nejohnson2/flask-template-app
-https://github.com/nejohnson2/flask-template-app
-Entry file: flask-template-app/app.py
-Scanned: 2016-10-25 23:57:14.285872
-No vulnerabilities found.
-
-
-xlmn/DiplomFlaskAngular
-https://github.com/xlmn/DiplomFlaskAngular
-Entry file: DiplomFlaskAngular/app/__init__.py
-Scanned: 2016-10-25 23:57:19.120151
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-AMontalva/flask-thinkful-api
-https://github.com/AMontalva/flask-thinkful-api
-Entry file: flask-thinkful-api/posts/__init__.py
-Scanned: 2016-10-25 23:57:20.443705
-Vulnerability 1:
-File: flask-thinkful-api/posts/api.py
- > User input at line 16, trigger word "get(":
- title_like = request.args.get('title_like')
-Reassigned in:
- File: flask-thinkful-api/posts/api.py
- > Line 22: posts = posts.order_by(models.Post.id)
- File: flask-thinkful-api/posts/api.py
- > Line 25: data = json.dumps([post.as_dictionary() for post in posts])
- File: flask-thinkful-api/posts/api.py
- > Line 26: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json')
- File: flask-thinkful-api/posts/api.py
- > Line 19: posts = session.query(models.Post)
-File: flask-thinkful-api/posts/api.py
- > reaches line 21, trigger word "filter(":
- posts = posts.filter(models.Post.title.contains(title_like))
-
-
-
-davidnuon/flask-falcon-example
-https://github.com/davidnuon/flask-falcon-example
-Entry file: flask-falcon-example/flask-demo.py
-Scanned: 2016-10-25 23:57:21.746998
-No vulnerabilities found.
-
-
-genedex/flask-neo4j
-https://github.com/genedex/flask-neo4j
-Entry file: flask-neo4j/blog/views.py
-Scanned: 2016-10-25 23:57:27.078727
-No vulnerabilities found.
-
-
-yazquez/example-rest-flask.python
-https://github.com/yazquez/example-rest-flask.python
-Entry file: None
-Scanned: 2016-10-25 23:57:30.001066
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yazquez/example-rest-flask.python.
-
-sceene/test-flask-app
-https://github.com/sceene/test-flask-app
-Entry file: None
-Scanned: 2016-10-25 23:57:31.403399
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sceene/test-flask-app.
-
-mtnriver/docker-flask-app
-https://github.com/mtnriver/docker-flask-app
-Entry file: docker-flask-app/app.py
-Scanned: 2016-10-25 23:57:32.683300
-No vulnerabilities found.
-
-
-josephmuli/Flask
-https://github.com/josephmuli/Flask
-Entry file: None
-Scanned: 2016-10-25 23:57:35.509860
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-janukobytsch/flask-autofixture
-https://github.com/janukobytsch/flask-autofixture
-Entry file: flask-autofixture/tests/conftest.py
-Scanned: 2016-10-25 23:57:39.551860
-No vulnerabilities found.
-
-
-paceko/shopping-site
-https://github.com/paceko/shopping-site
-Entry file: shopping-site/shoppingsite.py
-Scanned: 2016-10-25 23:57:45.819025
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pragmaticcoders/flask-react-seed
-https://github.com/pragmaticcoders/flask-react-seed
-Entry file: None
-Scanned: 2016-10-25 23:57:47.331670
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed.
-
-axavio/flasky
-https://github.com/axavio/flasky
-Entry file: None
-Scanned: 2016-10-25 23:57:48.837954
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rahulballal/flasktemplate
-https://github.com/rahulballal/flasktemplate
-Entry file: flasktemplate/app.py
-Scanned: 2016-10-25 23:57:51.268915
-No vulnerabilities found.
-
-
-dimdal/flasktutorial
-https://github.com/dimdal/flasktutorial
-Entry file: None
-Scanned: 2016-10-25 23:57:51.788685
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/dimdal/flasktutorial.
-
-bspaans/flaskal
-https://github.com/bspaans/flaskal
-Entry file: flaskal/flaskal/imports.py
-Scanned: 2016-10-25 23:57:54.222465
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-stoodsteal/flasky
-https://github.com/stoodsteal/flasky
-Entry file: None
-Scanned: 2016-10-25 23:57:56.739733
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-fkirwin/flaskhelloworld
-https://github.com/fkirwin/flaskhelloworld
-Entry file: flaskhelloworld/hello_world.py
-Scanned: 2016-10-25 23:58:02.248294
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-thedrew82/flaskr
-https://github.com/thedrew82/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:58:02.789718
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedrew82/flaskr.
-
-shenmj053/flaskr
-https://github.com/shenmj053/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:58:03.332328
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shenmj053/flaskr.
-
-zverxw13/flaskr
-https://github.com/zverxw13/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:58:03.847553
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zverxw13/flaskr.
-
-allergier/flaskr
-https://github.com/allergier/flaskr
-Entry file: None
-Scanned: 2016-10-25 23:58:04.370358
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/allergier/flaskr.
-
-liuhuai0217/flasky
-https://github.com/liuhuai0217/flasky
-Entry file: None
-Scanned: 2016-10-25 23:58:04.892758
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-erk52/FlaskDynamics
-https://github.com/erk52/FlaskDynamics
-Entry file: FlaskDynamics/view.py
-Scanned: 2016-10-25 23:58:10.218006
-Vulnerability 1:
-File: FlaskDynamics/view.py
- > User input at line 18, trigger word ".data":
- result = phasePlot(form.XPrime.data, form.YPrime.data)
-Reassigned in:
- File: FlaskDynamics/view.py
- > Line 20: result = None
-File: FlaskDynamics/view.py
- > reaches line 22, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('new_view.html',form=form, result=result)
-
-
-
-KentaYamada/flaskr2
-https://github.com/KentaYamada/flaskr2
-Entry file: flaskr2/__init__.py
-Scanned: 2016-10-25 23:58:11.526383
-No vulnerabilities found.
-
-
-HaarisKhan/FlaskDemos
-https://github.com/HaarisKhan/FlaskDemos
-Entry file: None
-Scanned: 2016-10-25 23:58:12.059973
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gnu4cn/flaskLearnings
-https://github.com/gnu4cn/flaskLearnings
-Entry file: flaskLearnings/demos/request_attributes.py
-Scanned: 2016-10-25 23:58:19.533069
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-pepemontana7/flaskFinal
-https://github.com/pepemontana7/flaskFinal
-Entry file: flaskFinal/firstapp/hello.py
-Scanned: 2016-10-25 23:58:20.846296
-No vulnerabilities found.
-
-
-rishilification/Flask_Sql
-https://github.com/rishilification/Flask_Sql
-Entry file: Flask_Sql/app.py
-Scanned: 2016-10-25 23:58:22.560721
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-marvelaz/Flask_python
-https://github.com/marvelaz/Flask_python
-Entry file: Flask_python/app.py
-Scanned: 2016-10-25 23:58:23.859755
-Vulnerability 1:
-File: Flask_python/app.py
- > User input at line 30, trigger word ".data":
- url = form.url.data
-File: Flask_python/app.py
- > reaches line 33, trigger word "flash(":
- flash('Stored bookmark '{}''.format(url))
-
-
-
-HDking/flask-blog
-https://github.com/HDking/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:58:26.407804
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Topytops/nice-flask
-https://github.com/Topytops/nice-flask
-Entry file: nice-flask/nice.py
-Scanned: 2016-10-25 23:58:28.716148
-No vulnerabilities found.
-
-
-Bluepig/flask-blog
-https://github.com/Bluepig/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:58:29.230339
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-groovycol/flask-intro
-https://github.com/groovycol/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:31.544786
-No vulnerabilities found.
-
-
-lyoness1/flask-intro
-https://github.com/lyoness1/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:32.858454
-No vulnerabilities found.
-
-
-kelseyoo14/flask-intro
-https://github.com/kelseyoo14/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:34.159351
-No vulnerabilities found.
-
-
-filiplasak/flask-skeleton
-https://github.com/filiplasak/flask-skeleton
-Entry file: flask-skeleton/app/__init__.py
-Scanned: 2016-10-25 23:58:36.506210
-No vulnerabilities found.
-
-
-tyrelsouza/flask_vagrant
-https://github.com/tyrelsouza/flask_vagrant
-Entry file: flask_vagrant/code/src/app.py
-Scanned: 2016-10-25 23:58:37.797094
-No vulnerabilities found.
-
-
-HBKO/flask-test
-https://github.com/HBKO/flask-test
-Entry file: None
-Scanned: 2016-10-25 23:58:40.159625
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/HBKO/flask-test.
-
-wolfram74/flask_exploration
-https://github.com/wolfram74/flask_exploration
-Entry file: flask_exploration/app2.py
-Scanned: 2016-10-25 23:58:45.487183
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-CrustyBarnacle/flask_app
-https://github.com/CrustyBarnacle/flask_app
-Entry file: None
-Scanned: 2016-10-25 23:58:46.010252
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Weilor/learn_flask
-https://github.com/Weilor/learn_flask
-Entry file: learn_flask/app/__init__.py
-Scanned: 2016-10-25 23:58:48.570424
-No vulnerabilities found.
-
-
-cristinamclarkin/flask-intro
-https://github.com/cristinamclarkin/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:49.876735
-No vulnerabilities found.
-
-
-emilydowgialo/flask-intro
-https://github.com/emilydowgialo/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:51.179484
-No vulnerabilities found.
-
-
-roboticmonkey/flask-intro
-https://github.com/roboticmonkey/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:53.492151
-No vulnerabilities found.
-
-
-sarahcstringer/flask-intro
-https://github.com/sarahcstringer/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:54.794641
-No vulnerabilities found.
-
-
-askiefer/flask-intro
-https://github.com/askiefer/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:58.098786
-No vulnerabilities found.
-
-
-lachilles/flask-intro
-https://github.com/lachilles/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:58:59.414936
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-dencynluv/Flask--Intro
-https://github.com/dencynluv/Flask--Intro
-Entry file: Flask--Intro/nice.py
-Scanned: 2016-10-25 23:59:03.767091
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-holmandw/flask-pi
-https://github.com/holmandw/flask-pi
-Entry file: flask-pi/app/__init__.py
-Scanned: 2016-10-25 23:59:05.314026
-No vulnerabilities found.
-
-
-amiceli/flask-blog
-https://github.com/amiceli/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:59:05.831127
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kellyhiggins/flask-intro
-https://github.com/kellyhiggins/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:59:07.129127
-No vulnerabilities found.
-
-
-hollywoodno/flask-intro
-https://github.com/hollywoodno/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:59:08.451205
-No vulnerabilities found.
-
-
-k-hub/flask-intro
-https://github.com/k-hub/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:59:10.775423
-No vulnerabilities found.
-
-
-sunshine-water/Flask_Exercise
-https://github.com/sunshine-water/Flask_Exercise
-Entry file: Flask_Exercise/nice.py
-Scanned: 2016-10-25 23:59:12.085747
-No vulnerabilities found.
-
-
-loopDelicious/flask-intro
-https://github.com/loopDelicious/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:59:13.401136
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-mastershao/lening-flask
-https://github.com/mastershao/lening-flask
-Entry file: None
-Scanned: 2016-10-25 23:59:13.938467
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask.
-
-bulain/flask-demo
-https://github.com/bulain/flask-demo
-Entry file: flask-demo/hello.py
-Scanned: 2016-10-25 23:59:21.267201
-No vulnerabilities found.
-
-
-diannaowa/flask-blog
-https://github.com/diannaowa/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:59:21.785422
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hyhlinux/stu_flask
-https://github.com/hyhlinux/stu_flask
-Entry file: stu_flask/part3/h.py
-Scanned: 2016-10-25 23:59:29.554143
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-wOstensen/flask-first
-https://github.com/wOstensen/flask-first
-Entry file: None
-Scanned: 2016-10-25 23:59:38.009563
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Tacolizard/flask-kott
-https://github.com/Tacolizard/flask-kott
-Entry file: flask-kott/kott.py
-Scanned: 2016-10-25 23:59:39.328800
-No vulnerabilities found.
-
-
-wattanar/flask-sample
-https://github.com/wattanar/flask-sample
-Entry file: flask-sample/app.py
-Scanned: 2016-10-25 23:59:40.617864
-No vulnerabilities found.
-
-
-rpalo/flask-headlines
-https://github.com/rpalo/flask-headlines
-Entry file: flask-headlines/headlines.py
-Scanned: 2016-10-25 23:59:41.933384
-No vulnerabilities found.
-
-
-stanliski/flask_dev
-https://github.com/stanliski/flask_dev
-Entry file: None
-Scanned: 2016-10-25 23:59:45.310883
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-an5rag/flask-tutorial
-https://github.com/an5rag/flask-tutorial
-Entry file: None
-Scanned: 2016-10-25 23:59:45.824040
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/an5rag/flask-tutorial.
-
-sugarguo/Flask_Blog
-https://github.com/sugarguo/Flask_Blog
-Entry file: Flask_Blog/app/__init__.py
-Scanned: 2016-10-25 23:59:51.529525
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tlwlmy/flask_base
-https://github.com/tlwlmy/flask_base
-Entry file: flask_base/app/__init__.py
-Scanned: 2016-10-25 23:59:53.021424
-No vulnerabilities found.
-
-
-themuppet2/flask-blog
-https://github.com/themuppet2/flask-blog
-Entry file: None
-Scanned: 2016-10-25 23:59:53.574207
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Aaver69/Python-Flask
-https://github.com/Aaver69/Python-Flask
-Entry file: None
-Scanned: 2016-10-25 23:59:55.314038
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Aaver69/Python-Flask.
-
-Aperyon/flask-base
-https://github.com/Aperyon/flask-base
-Entry file: flask-base/src/__init__.py
-Scanned: 2016-10-25 23:59:56.775982
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ak042/flask-bdd
-https://github.com/ak042/flask-bdd
-Entry file: flask-bdd/flaskr.py
-Scanned: 2016-10-25 23:59:58.097900
-No vulnerabilities found.
-
-
-k-wiz/flask-intro
-https://github.com/k-wiz/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-25 23:59:59.404702
-No vulnerabilities found.
-
-
-dflee/flask-intro
-https://github.com/dflee/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:00.712178
-No vulnerabilities found.
-
-
-glasses4days/flask-intro
-https://github.com/glasses4days/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:02.714538
-No vulnerabilities found.
-
-
-maheskett/flask-intro
-https://github.com/maheskett/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:04.727552
-No vulnerabilities found.
-
-
-kelly4strength/flask-lab
-https://github.com/kelly4strength/flask-lab
-Entry file: flask-lab/nice.py
-Scanned: 2016-10-26 00:00:06.418146
-No vulnerabilities found.
-
-
-kjlundsgaard/flask-intro
-https://github.com/kjlundsgaard/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:07.784670
-No vulnerabilities found.
-
-
-laurensila/flask-intro
-https://github.com/laurensila/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:09.258034
-No vulnerabilities found.
-
-
-Munnu/flask-intro
-https://github.com/Munnu/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:10.696697
-No vulnerabilities found.
-
-
-nanoha25/flask_local
-https://github.com/nanoha25/flask_local
-Entry file: flask_local/setup.py
-Scanned: 2016-10-26 00:00:17.294218
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-yaoice/flask-micblog
-https://github.com/yaoice/flask-micblog
-Entry file: flask-micblog/micblog/app/__init__.py
-Scanned: 2016-10-26 00:00:19.281283
-Vulnerability 1:
-File: flask-micblog/micblog/app/views.py
- > User input at line 92, trigger word "get(":
- user_name = request.form.get('user_name')
-Reassigned in:
- File: flask-micblog/micblog/app/views.py
- > Line 102: user.nickname = user_name
-File: flask-micblog/micblog/app/views.py
- > reaches line 95, trigger word "filter(":
- register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first()
-
-Vulnerability 2:
-File: flask-micblog/micblog/app/views.py
- > User input at line 93, trigger word "get(":
- user_email = request.form.get('user_email')
-Reassigned in:
- File: flask-micblog/micblog/app/views.py
- > Line 103: user.email = user_email
-File: flask-micblog/micblog/app/views.py
- > reaches line 95, trigger word "filter(":
- register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first()
-
-
-
-Wynndow/flask_skeleton
-https://github.com/Wynndow/flask_skeleton
-Entry file: None
-Scanned: 2016-10-26 00:00:19.808733
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Wynndow/flask_skeleton.
-
-chiubaca/flask-app
-https://github.com/chiubaca/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-26 00:00:28.233520
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-afarges/flask-intro
-https://github.com/afarges/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:30.060593
-No vulnerabilities found.
-
-
-paceko/flask-intro
-https://github.com/paceko/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:31.556022
-No vulnerabilities found.
-
-
-ucgyyf/yaoke-flask
-https://github.com/ucgyyf/yaoke-flask
-Entry file: yaoke-flask/app/__init__.py
-Scanned: 2016-10-26 00:00:33.190444
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-SethHWeidman/flask-test
-https://github.com/SethHWeidman/flask-test
-Entry file: None
-Scanned: 2016-10-26 00:00:34.236593
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/SethHWeidman/flask-test.
-
-rpalo/flask-firstapp
-https://github.com/rpalo/flask-firstapp
-Entry file: flask-firstapp/hello.py
-Scanned: 2016-10-26 00:00:39.563565
-No vulnerabilities found.
-
-
-Jar-win/Flask-Pratice
-https://github.com/Jar-win/Flask-Pratice
-Entry file: Flask-Pratice/8a-login/app/__init__.py
-Scanned: 2016-10-26 00:00:41.048843
-No vulnerabilities found.
-
-
-stuncyilmaz/flask_init
-https://github.com/stuncyilmaz/flask_init
-Entry file: flask_init/hello.py
-Scanned: 2016-10-26 00:00:42.345476
-No vulnerabilities found.
-
-
-tageee/test_Flask
-https://github.com/tageee/test_Flask
-Entry file: test_Flask/hello.py
-Scanned: 2016-10-26 00:00:44.125295
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Aisling-Dempsey/flask-intro
-https://github.com/Aisling-Dempsey/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:47.443455
-No vulnerabilities found.
-
-
-tkahnhau/flask-intro
-https://github.com/tkahnhau/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:48.789481
-No vulnerabilities found.
-
-
-ubermelon/Flask_exercise
-https://github.com/ubermelon/Flask_exercise
-Entry file: Flask_exercise/nice.py
-Scanned: 2016-10-26 00:00:50.144074
-No vulnerabilities found.
-
-
-lsylk/flask-intro
-https://github.com/lsylk/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:51.456416
-No vulnerabilities found.
-
-
-minyisme/flask-intro
-https://github.com/minyisme/flask-intro
-Entry file: flask-intro/nice.py
-Scanned: 2016-10-26 00:00:53.759826
-No vulnerabilities found.
-
-
-allisonscofield/flask-lab
-https://github.com/allisonscofield/flask-lab
-Entry file: flask-lab/nice.py
-Scanned: 2016-10-26 00:00:55.074137
-No vulnerabilities found.
-
-
-TiyaBelay/Flask-intro
-https://github.com/TiyaBelay/Flask-intro
-Entry file: Flask-intro/nice.py
-Scanned: 2016-10-26 00:00:56.416045
-No vulnerabilities found.
-
-
-chck/flask-sandbox
-https://github.com/chck/flask-sandbox
-Entry file: flask-sandbox/app.py
-Scanned: 2016-10-26 00:00:57.773992
-Vulnerability 1:
-File: flask-sandbox/controllers.py
- > User input at line 22, trigger word "get(":
- limit = request.args.get('limit', 20)
-Reassigned in:
- File: flask-sandbox/controllers.py
- > Line 27: ret_MAYBE_FUNCTION_NAME = jsonify(data=[material.serialize for material in materials])
-File: flask-sandbox/controllers.py
- > reaches line 24, trigger word "filter(":
- materials = idMaterial.query.filter(Material.id == id)Material.query.order_by(Material.updated_at.desc()).limit(limit)
-
-
-
-NixonInnes/Flask-Calendar
-https://github.com/NixonInnes/Flask-Calendar
-Entry file: Flask-Calendar/app/__init__.py
-Scanned: 2016-10-26 00:00:59.613498
-Vulnerability 1:
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > User input at line 30, trigger word ".data":
- calendar = Calendar(author_id=current_user.id, name=form.name.data)
-Reassigned in:
- File: Flask-Calendar/app/blueprints/calendar/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form)
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > reaches line 37, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id))
-
-Vulnerability 2:
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > User input at line 30, trigger word ".data":
- calendar = Calendar(author_id=current_user.id, name=form.name.data)
-Reassigned in:
- File: Flask-Calendar/app/blueprints/calendar/views.py
- > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form)
-File: Flask-Calendar/app/blueprints/calendar/views.py
- > reaches line 37, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id))
-
-
-
-aurigadl/flask-base
-https://github.com/aurigadl/flask-base
-Entry file: flask-base/app.py
-Scanned: 2016-10-26 00:01:01.151266
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-tageee/Blog
-https://github.com/tageee/Blog
-Entry file: Blog/app/__init__.py
-Scanned: 2016-10-26 00:01:03.290213
-Vulnerability 1:
-File: Blog/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Blog/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 23: show_followed = False
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Blog/app/main/views.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 63: posts = pagination.items
-File: Blog/app/main/views.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Blog/app/main/views.py
- > User input at line 122, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Blog/app/main/views.py
- > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 129: comments = pagination.items
- File: Blog/app/main/views.py
- > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Blog/app/main/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Blog/app/main/views.py
- > User input at line 189, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Blog/app/main/views.py
- > User input at line 206, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 212, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Blog/app/main/views.py
- > User input at line 221, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 225: comments = pagination.items
-File: Blog/app/main/views.py
- > reaches line 226, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-amateurPotato/flask
-https://github.com/amateurPotato/flask
-Entry file: None
-Scanned: 2016-10-26 00:01:05.571778
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ahdrage/flask
-https://github.com/ahdrage/flask
-Entry file: None
-Scanned: 2016-10-26 00:01:06.083534
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Goomah/flask
-https://github.com/Goomah/flask
-Entry file: None
-Scanned: 2016-10-26 00:01:07.660084
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ultramarine7/flask
-https://github.com/ultramarine7/flask
-Entry file: None
-Scanned: 2016-10-26 00:01:09.200302
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-od210291jpv/flask
-https://github.com/od210291jpv/flask
-Entry file: None
-Scanned: 2016-10-26 00:01:10.718133
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MonPower/Flask
-https://github.com/MonPower/Flask
-Entry file: None
-Scanned: 2016-10-26 00:01:11.281314
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-wenzi0595/flask
-https://github.com/wenzi0595/flask
-Entry file: None
-Scanned: 2016-10-26 00:01:18.804282
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-singingwolfboy/build-a-flask-api
-https://github.com/singingwolfboy/build-a-flask-api
-Entry file: build-a-flask-api/step08/puppy.py
-Scanned: 2016-10-26 00:01:21.962900
-Vulnerability 1:
-File: build-a-flask-api/step08/puppy.py
- > User input at line 25, trigger word "get(":
- name = request.form.get('name')
-Reassigned in:
- File: build-a-flask-api/step08/puppy.py
- > Line 31: slug = slugify(name)
- File: build-a-flask-api/step08/puppy.py
- > Line 34: puppy = Puppy(slug=slug, name=name, image_url=image_url)
- File: build-a-flask-api/step08/puppy.py
- > Line 43: resp.headers['Location'] = location
-File: build-a-flask-api/step08/puppy.py
- > reaches line 40, trigger word "url_for(":
- location = url_for('get_puppy',slug=slug)
-
-
-
-sunary/flask-optimize
-https://github.com/sunary/flask-optimize
-Entry file: flask-optimize/tests/flask_app.py
-Scanned: 2016-10-26 00:01:23.380848
-No vulnerabilities found.
-
-
-kashyap32/flask-REST
-https://github.com/kashyap32/flask-REST
-Entry file: None
-Scanned: 2016-10-26 00:01:31.455674
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/kashyap32/flask-REST.
-
-Julzmbugua/flasky
-https://github.com/Julzmbugua/flasky
-Entry file: None
-Scanned: 2016-10-26 00:01:34.493307
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rsk7/flaskapp
-https://github.com/rsk7/flaskapp
-Entry file: None
-Scanned: 2016-10-26 00:01:35.012896
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/rsk7/flaskapp.
-
-Sarmacid/flaskr
-https://github.com/Sarmacid/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:01:39.534942
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Sarmacid/flaskr.
-
-skhe/flasky
-https://github.com/skhe/flasky
-Entry file: None
-Scanned: 2016-10-26 00:01:41.440749
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-baloo98/flasky
-https://github.com/baloo98/flasky
-Entry file: None
-Scanned: 2016-10-26 00:01:41.964335
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sanketg10/flaskapp
-https://github.com/sanketg10/flaskapp
-Entry file: None
-Scanned: 2016-10-26 00:01:43.547681
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanketg10/flaskapp.
-
-neotrinity/flaskavro
-https://github.com/neotrinity/flaskavro
-Entry file: flaskavro/main.py
-Scanned: 2016-10-26 00:01:47.880805
-No vulnerabilities found.
-
-
-zeroisme/flaskblog
-https://github.com/zeroisme/flaskblog
-Entry file: None
-Scanned: 2016-10-26 00:01:48.401907
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeroisme/flaskblog.
-
-Mendurim/flasktut
-https://github.com/Mendurim/flasktut
-Entry file: flasktut/hello.py
-Scanned: 2016-10-26 00:01:50.731251
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-HDking/flasktaskr
-https://github.com/HDking/flasktaskr
-Entry file: None
-Scanned: 2016-10-26 00:01:51.279327
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gjcooper/flaskprac
-https://github.com/gjcooper/flaskprac
-Entry file: flaskprac/app/__init__.py
-Scanned: 2016-10-26 00:01:54.723192
-No vulnerabilities found.
-
-
-deliveryyyyguy/flaskapp
-https://github.com/deliveryyyyguy/flaskapp
-Entry file: None
-Scanned: 2016-10-26 00:01:55.242693
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/deliveryyyyguy/flaskapp.
-
-aaron077/flaskblog
-https://github.com/aaron077/flaskblog
-Entry file: None
-Scanned: 2016-10-26 00:01:55.794680
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/aaron077/flaskblog.
-
-DaBaiLi/FlaskBlog
-https://github.com/DaBaiLi/FlaskBlog
-Entry file: FlaskBlog/app/__init__.py
-Scanned: 2016-10-26 00:01:58.275685
-Vulnerability 1:
-File: FlaskBlog/app/main/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 26: posts = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskBlog/app/main/views.py
- > reaches line 27, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 2:
-File: FlaskBlog/app/main/views.py
- > User input at line 34, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 35: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 38: posts = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 39, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 3:
-File: FlaskBlog/app/main/views.py
- > User input at line 98, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 100: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: FlaskBlog/app/main/views.py
- > Line 102: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 105: comments = pagination.items
- File: FlaskBlog/app/main/views.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: FlaskBlog/app/main/views.py
- > reaches line 106, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 4:
-File: FlaskBlog/app/main/views.py
- > User input at line 131, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskBlog/app/main/views.py
- > Line 132: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskBlog/app/main/views.py
- > Line 135: comments = pagination.items
-File: FlaskBlog/app/main/views.py
- > reaches line 136, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-cs207-project/FlaskAPI
-https://github.com/cs207-project/FlaskAPI
-Entry file: None
-Scanned: 2016-10-26 00:01:58.792453
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/cs207-project/FlaskAPI.
-
-Thetides/FlaskyTut
-https://github.com/Thetides/FlaskyTut
-Entry file: FlaskyTut/app.py
-Scanned: 2016-10-26 00:02:01.135535
-No vulnerabilities found.
-
-
-prrateekk/FlaskTesting
-https://github.com/prrateekk/FlaskTesting
-Entry file: FlaskTesting/hello.py
-Scanned: 2016-10-26 00:02:05.290408
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTesting/venv/lib/python2.7/sre_compile.py
-
-kolapapa/flasky2
-https://github.com/kolapapa/flasky2
-Entry file: flasky2/app/__init__.py
-Scanned: 2016-10-26 00:02:06.789481
-No vulnerabilities found.
-
-
-argenis2021/FlaskTutorial
-https://github.com/argenis2021/FlaskTutorial
-Entry file: FlaskTutorial/app/__init__.py
-Scanned: 2016-10-26 00:02:08.428851
-No vulnerabilities found.
-
-
-konglx90/flask_study
-https://github.com/konglx90/flask_study
-Entry file: flask_study/hello.py
-Scanned: 2016-10-26 00:02:09.887808
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-datademofun/congress-flask
-https://github.com/datademofun/congress-flask
-Entry file: congress-flask/app.py
-Scanned: 2016-10-26 00:02:12.243705
-No vulnerabilities found.
-
-
-ifwenvlook/flask-celery
-https://github.com/ifwenvlook/flask-celery
-Entry file: flask-celery/app.py
-Scanned: 2016-10-26 00:02:13.563204
-Vulnerability 1:
-File: flask-celery/app.py
- > User input at line 66, trigger word "form[":
- email = request.form['email']
-Reassigned in:
- File: flask-celery/app.py
- > Line 67: session['email'] = email
-File: flask-celery/app.py
- > reaches line 76, trigger word "flash(":
- flash('Sending email to {0}'.format(email))
-
-Vulnerability 2:
-File: flask-celery/app.py
- > User input at line 66, trigger word "form[":
- email = request.form['email']
-Reassigned in:
- File: flask-celery/app.py
- > Line 67: session['email'] = email
-File: flask-celery/app.py
- > reaches line 80, trigger word "flash(":
- flash('An email will be sent to {0} in one minute'.format(email))
-
-Vulnerability 3:
-File: flask-celery/app.py
- > User input at line 103, trigger word "get(":
- response = 'state''current''total''status'task.statetask.info.get('current', 0)task.info.get('total', 1)task.info.get('status', '')
-Reassigned in:
- File: flask-celery/app.py
- > Line 96: response = 'state''current''total''status'task.state01'Pending...'
- File: flask-celery/app.py
- > Line 113: response = 'state''current''total''status'task.state11str(task.info)
-File: flask-celery/app.py
- > reaches line 119, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(response)
-
-
-
-jonalligood/flask-diary
-https://github.com/jonalligood/flask-diary
-Entry file: flask-diary/app/__init__.py
-Scanned: 2016-10-26 00:02:26.171263
-No vulnerabilities found.
-
-
-HDking/flask-blog
-https://github.com/HDking/flask-blog
-Entry file: None
-Scanned: 2016-10-26 00:02:26.776073
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-sugarguo/flask-login
-https://github.com/sugarguo/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-26 00:02:33.008711
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Afghary/bloggingFlask
-https://github.com/Afghary/bloggingFlask
-Entry file: bloggingFlask/src/app.py
-Scanned: 2016-10-26 00:02:34.368859
-No vulnerabilities found.
-
-
-abaratif/flask_sms
-https://github.com/abaratif/flask_sms
-Entry file: flask_sms/app.py
-Scanned: 2016-10-26 00:02:35.707017
-No vulnerabilities found.
-
-
-full-stakk/flask-rest
-https://github.com/full-stakk/flask-rest
-Entry file: flask-rest/app.py
-Scanned: 2016-10-26 00:02:37.163694
-No vulnerabilities found.
-
-
-ikolito/flask-yahoomarket
-https://github.com/ikolito/flask-yahoomarket
-Entry file: None
-Scanned: 2016-10-26 00:02:38.469506
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ikolito/flask-yahoomarket.
-
-kunalj101/flask-blog
-https://github.com/kunalj101/flask-blog
-Entry file: None
-Scanned: 2016-10-26 00:02:38.997597
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-RiverAge/flask-mongodb
-https://github.com/RiverAge/flask-mongodb
-Entry file: flask-mongodb/app/__init__.py
-Scanned: 2016-10-26 00:02:41.311489
-No vulnerabilities found.
-
-
-natedoyle/flask-cyoa
-https://github.com/natedoyle/flask-cyoa
-Entry file: flask-cyoa/src/app.py
-Scanned: 2016-10-26 00:02:42.605850
-No vulnerabilities found.
-
-
-ShakedFadi/flask_blog
-https://github.com/ShakedFadi/flask_blog
-Entry file: None
-Scanned: 2016-10-26 00:02:43.127476
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-makensy/flask_alchemy
-https://github.com/makensy/flask_alchemy
-Entry file: flask_alchemy/app/__init__.py
-Scanned: 2016-10-26 00:02:44.424792
-No vulnerabilities found.
-
-
-28sui/dao-flask
-https://github.com/28sui/dao-flask
-Entry file: dao-flask/app.py
-Scanned: 2016-10-26 00:02:48.739736
-No vulnerabilities found.
-
-
-quvide/docker-flask
-https://github.com/quvide/docker-flask
-Entry file: docker-flask/flask/app/main.py
-Scanned: 2016-10-26 00:02:50.245853
-No vulnerabilities found.
-
-
-carlsagan21/flask-crawler
-https://github.com/carlsagan21/flask-crawler
-Entry file: flask-crawler/flask-crawler.py
-Scanned: 2016-10-26 00:02:51.541421
-No vulnerabilities found.
-
-
-Ouro130Ros/LearningFlask
-https://github.com/Ouro130Ros/LearningFlask
-Entry file: LearningFlask/1-HelloWorld/helloWorld.py
-Scanned: 2016-10-26 00:02:52.823103
-No vulnerabilities found.
-
-
-mandshaw/flask_microbrewery
-https://github.com/mandshaw/flask_microbrewery
-Entry file: flask_microbrewery/flask_microbrewery/run.py
-Scanned: 2016-10-26 00:02:55.246671
-No vulnerabilities found.
-
-
-kindoprec/flask-boot
-https://github.com/kindoprec/flask-boot
-Entry file: flask-boot/app.py
-Scanned: 2016-10-26 00:02:56.553486
-Vulnerability 1:
-File: flask-boot/app.py
- > User input at line 15, trigger word "get(":
- out = 'Hello ' + request.args.get('name', '')
-File: flask-boot/app.py
- > reaches line 16, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(output=out)
-
-
-
-liuyun90/learn_flask
-https://github.com/liuyun90/learn_flask
-Entry file: learn_flask/app/__init__.py
-Scanned: 2016-10-26 00:02:58.058311
-Vulnerability 1:
-File: learn_flask/app/api_1_0/posts.py
- > User input at line 12, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/posts.py
- > Line 13: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: learn_flask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: learn_flask/app/api_1_0/posts.py
- > Line 18: next = None
-File: learn_flask/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: learn_flask/app/api_1_0/posts.py
- > User input at line 12, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/posts.py
- > Line 13: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: learn_flask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: learn_flask/app/api_1_0/posts.py
- > Line 18: next = None
-File: learn_flask/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: learn_flask/app/api_1_0/posts.py
- > User input at line 12, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/posts.py
- > Line 13: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: learn_flask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: learn_flask/app/api_1_0/posts.py
- > Line 18: next = None
-File: learn_flask/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: learn_flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: learn_flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: learn_flask/app/api_1_0/users.py
- > Line 23: next = None
-File: learn_flask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',id=id, page=page - 1, _external=True)
-
-Vulnerability 5:
-File: learn_flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: learn_flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: learn_flask/app/api_1_0/users.py
- > Line 23: next = None
-File: learn_flask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',id=id, page=page + 1, _external=True)
-
-Vulnerability 6:
-File: learn_flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: learn_flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: learn_flask/app/api_1_0/users.py
- > Line 23: next = None
-File: learn_flask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: learn_flask/app/api_1_0/users.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/users.py
- > Line 39: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: learn_flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: learn_flask/app/api_1_0/users.py
- > Line 45: next = None
-File: learn_flask/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_user_followed_posts',id=user.id, page=page - 1, _external=True)
-
-Vulnerability 8:
-File: learn_flask/app/api_1_0/users.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/users.py
- > Line 39: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: learn_flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: learn_flask/app/api_1_0/users.py
- > Line 45: next = None
-File: learn_flask/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_user_followed_posts',id=user.id, page=page + 1, _external=True)
-
-Vulnerability 9:
-File: learn_flask/app/api_1_0/users.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/users.py
- > Line 39: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: learn_flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: learn_flask/app/api_1_0/users.py
- > Line 45: next = None
-File: learn_flask/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: learn_flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/comments.py
- > Line 13: comments = pagination.items
- File: learn_flask/app/api_1_0/comments.py
- > Line 14: prev = None
- File: learn_flask/app/api_1_0/comments.py
- > Line 17: next = None
-File: learn_flask/app/api_1_0/comments.py
- > reaches line 16, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: learn_flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/comments.py
- > Line 13: comments = pagination.items
- File: learn_flask/app/api_1_0/comments.py
- > Line 14: prev = None
- File: learn_flask/app/api_1_0/comments.py
- > Line 17: next = None
-File: learn_flask/app/api_1_0/comments.py
- > reaches line 19, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: learn_flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/comments.py
- > Line 13: comments = pagination.items
- File: learn_flask/app/api_1_0/comments.py
- > Line 14: prev = None
- File: learn_flask/app/api_1_0/comments.py
- > Line 17: next = None
-File: learn_flask/app/api_1_0/comments.py
- > reaches line 20, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: learn_flask/app/api_1_0/comments.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/comments.py
- > Line 38: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/comments.py
- > Line 40: comments = pagination.items
- File: learn_flask/app/api_1_0/comments.py
- > Line 41: prev = None
- File: learn_flask/app/api_1_0/comments.py
- > Line 44: next = None
-File: learn_flask/app/api_1_0/comments.py
- > reaches line 43, trigger word "url_for(":
- prev = url_for('api.get_post_comments',id=post.id, page=page - 1, _external=True)
-
-Vulnerability 14:
-File: learn_flask/app/api_1_0/comments.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/comments.py
- > Line 38: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/comments.py
- > Line 40: comments = pagination.items
- File: learn_flask/app/api_1_0/comments.py
- > Line 41: prev = None
- File: learn_flask/app/api_1_0/comments.py
- > Line 44: next = None
-File: learn_flask/app/api_1_0/comments.py
- > reaches line 46, trigger word "url_for(":
- next = url_for('api.get_post_comments',id=post.id, page=page + 1, _external=True)
-
-Vulnerability 15:
-File: learn_flask/app/api_1_0/comments.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/api_1_0/comments.py
- > Line 38: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/api_1_0/comments.py
- > Line 40: comments = pagination.items
- File: learn_flask/app/api_1_0/comments.py
- > Line 41: prev = None
- File: learn_flask/app/api_1_0/comments.py
- > Line 44: next = None
-File: learn_flask/app/api_1_0/comments.py
- > reaches line 47, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: learn_flask/app/main/views.py
- > User input at line 20, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 18: show_followed = False
- File: learn_flask/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: learn_flask/app/main/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 17:
-File: learn_flask/app/main/views.py
- > User input at line 25, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/main/views.py
- > Line 28: posts = pagination.items
- File: learn_flask/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: learn_flask/app/main/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 18:
-File: learn_flask/app/main/views.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 38: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/main/views.py
- > Line 40: posts = pagination.items
-File: learn_flask/app/main/views.py
- > reaches line 41, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: learn_flask/app/main/views.py
- > User input at line 98, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 100: page = int(post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1)
- File: learn_flask/app/main/views.py
- > Line 101: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/main/views.py
- > Line 104: comments = pagination.items
- File: learn_flask/app/main/views.py
- > Line 97: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: learn_flask/app/main/views.py
- > reaches line 105, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: learn_flask/app/main/views.py
- > User input at line 162, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 163: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: learn_flask/app/main/views.py
- > Line 165: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: learn_flask/app/main/views.py
- > Line 161: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: learn_flask/app/main/views.py
- > reaches line 166, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: learn_flask/app/main/views.py
- > User input at line 176, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 177: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: learn_flask/app/main/views.py
- > Line 179: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: learn_flask/app/main/views.py
- > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: learn_flask/app/main/views.py
- > reaches line 180, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by ', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: learn_flask/app/main/views.py
- > User input at line 204, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: learn_flask/app/main/views.py
- > Line 205: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: learn_flask/app/main/views.py
- > Line 208: comments = pagination.items
-File: learn_flask/app/main/views.py
- > reaches line 209, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-richardqlin/flask_app
-https://github.com/richardqlin/flask_app
-Entry file: None
-Scanned: 2016-10-26 00:02:58.600864
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-blarneyosullivan/flask_blog
-https://github.com/blarneyosullivan/flask_blog
-Entry file: None
-Scanned: 2016-10-26 00:02:59.134074
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-MUICProgrammingClub/flask-tutorial
-https://github.com/MUICProgrammingClub/flask-tutorial
-Entry file: None
-Scanned: 2016-10-26 00:03:00.651008
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/MUICProgrammingClub/flask-tutorial.
-
-AuthentiqID/examples-flask
-https://github.com/AuthentiqID/examples-flask
-Entry file: examples-flask/example_basic.py
-Scanned: 2016-10-26 00:03:04.127335
-Vulnerability 1:
-File: examples-flask/example_basic.py
- > User input at line 135, trigger word "get(":
- userinfo = authentiq.get(USERINFO_URL).json()
-File: examples-flask/example_basic.py
- > reaches line 149, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(userinfo)
-
-Vulnerability 2:
-File: examples-flask/test_example_basic.py
- > User input at line 71, trigger word "get(":
- res = test_app.get(url_for('index'))
-Reassigned in:
- File: examples-flask/test_example_basic.py
- > Line 76: res = requests.get(url,allow_redirects=1)
-File: examples-flask/test_example_basic.py
- > reaches line 71, trigger word "url_for(":
- res = test_app.get(url_for('index'))
-
-Vulnerability 3:
-File: examples-flask/test_example_basic.py
- > User input at line 75, trigger word "get(":
- url = res.headers.get('Location')
-Reassigned in:
- File: examples-flask/test_example_basic.py
- > Line 76: res = requests.get(url,allow_redirects=1)
-File: examples-flask/test_example_basic.py
- > reaches line 71, trigger word "url_for(":
- res = test_app.get(url_for('index'))
-
-Vulnerability 4:
-File: examples-flask/test_example_basic.py
- > User input at line 76, trigger word "get(":
- res = requests.get(url,allow_redirects=1)
-File: examples-flask/test_example_basic.py
- > reaches line 71, trigger word "url_for(":
- res = test_app.get(url_for('index'))
-
-Vulnerability 5:
-File: examples-flask/example_2fa.py
- > User input at line 159, trigger word "get(":
- userinfo = authentiq.get(USERINFO_URL).json()
-File: examples-flask/example_2fa.py
- > reaches line 173, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(userinfo)
-
-
-
-rpalo/flask-headlines
-https://github.com/rpalo/flask-headlines
-Entry file: flask-headlines/headlines.py
-Scanned: 2016-10-26 00:03:07.440340
-No vulnerabilities found.
-
-
-stanliski/flask_dev
-https://github.com/stanliski/flask_dev
-Entry file: None
-Scanned: 2016-10-26 00:03:08.002870
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-s4ayub/FirstFlask
-https://github.com/s4ayub/FirstFlask
-Entry file: FirstFlask/app.py
-Scanned: 2016-10-26 00:03:12.656815
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-emilydowgialo/skills-flask
-https://github.com/emilydowgialo/skills-flask
-Entry file: skills-flask/application.py
-Scanned: 2016-10-26 00:03:15.395671
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: skills-flask/env/lib/python2.7/sre_compile.py
-
-condemnedbachelor/flask-skills
-https://github.com/condemnedbachelor/flask-skills
-Entry file: flask-skills/application.py
-Scanned: 2016-10-26 00:03:19.121224
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'ingoing'
-
-jimlambrt-roadscholar/udemy-flask
-https://github.com/jimlambrt-roadscholar/udemy-flask
-Entry file: udemy-flask/hello.py
-Scanned: 2016-10-26 00:03:20.464275
-No vulnerabilities found.
-
-
-CharAct3/flask_test
-https://github.com/CharAct3/flask_test
-Entry file: None
-Scanned: 2016-10-26 00:03:20.999941
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-jlberzal/Flask-User
-https://github.com/jlberzal/Flask-User
-Entry file: Flask-User/flask_user/tests/tst_app.py
-Scanned: 2016-10-26 00:03:23.913987
-Vulnerability 1:
-File: Flask-User/flask_user/tests/tst_app.py
- > User input at line 119, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation)
-Reassigned in:
- File: Flask-User/flask_user/tests/tst_app.py
- > Line 120: user_manager = UserManager(db_adapter, app)
-File: Flask-User/flask_user/tests/tst_app.py
- > reaches line 123, trigger word "filter(":
- if not User.query.filter(User.username == 'member').first():
-
-Vulnerability 2:
-File: Flask-User/flask_user/tests/tst_app.py
- > User input at line 119, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation)
-Reassigned in:
- File: Flask-User/flask_user/tests/tst_app.py
- > Line 120: user_manager = UserManager(db_adapter, app)
-File: Flask-User/flask_user/tests/tst_app.py
- > reaches line 130, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 3:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 59, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-
-Vulnerability 4:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 59, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-
-Vulnerability 5:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 71, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.manage_emails'))
-
-Vulnerability 6:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 71, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.manage_emails'))
-
-Vulnerability 7:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 75, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-
-Vulnerability 8:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 75, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-
-Vulnerability 9:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 98, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm'))
-
-Vulnerability 10:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 98, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm'))
-
-Vulnerability 11:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 101, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary'))
-
-Vulnerability 12:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 101, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary'))
-
-Vulnerability 13:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 104, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete'))
-
-Vulnerability 14:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 104, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete'))
-
-
-
-kstripp/flask-crud
-https://github.com/kstripp/flask-crud
-Entry file: flask-crud/app/__init__.py
-Scanned: 2016-10-26 00:03:28.356051
-Vulnerability 1:
-File: flask-crud/app/views.py
- > User input at line 25, trigger word "get(":
- post = models.Post.query.get(id)
-File: flask-crud/app/views.py
- > reaches line 28, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('show.html',post=post)
-
-
-
-iceihehe/flask-test
-https://github.com/iceihehe/flask-test
-Entry file: None
-Scanned: 2016-10-26 00:03:28.880519
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/iceihehe/flask-test.
-
-gonza-peralta/flask-celery
-https://github.com/gonza-peralta/flask-celery
-Entry file: flask-celery/app/factory.py
-Scanned: 2016-10-26 00:03:35.330716
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-girishramnani/flask-facebookbot
-https://github.com/girishramnani/flask-facebookbot
-Entry file: flask-facebookbot/app.py
-Scanned: 2016-10-26 00:03:36.670935
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Master-Yan/flask_template
-https://github.com/Master-Yan/flask_template
-Entry file: flask_template/app/__init__.py
-Scanned: 2016-10-26 00:03:38.326550
-No vulnerabilities found.
-
-
-zjqzero/flask_migrate
-https://github.com/zjqzero/flask_migrate
-Entry file: flask_migrate/add_index/test.py
-Scanned: 2016-10-26 00:03:39.758977
-No vulnerabilities found.
-
-
-nanoha25/flask_local
-https://github.com/nanoha25/flask_local
-Entry file: flask_local/setup.py
-Scanned: 2016-10-26 00:03:43.770472
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Wynndow/flask_skeleton
-https://github.com/Wynndow/flask_skeleton
-Entry file: None
-Scanned: 2016-10-26 00:03:44.295301
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Wynndow/flask_skeleton.
-
-chiubaca/flask-app
-https://github.com/chiubaca/flask-app
-Entry file: flask-app/app.py
-Scanned: 2016-10-26 00:03:48.551668
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-bdhammel/asteroid-flask
-https://github.com/bdhammel/asteroid-flask
-Entry file: asteroid-flask/game.py
-Scanned: 2016-10-26 00:03:57.300410
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-FizLBQ/Flask_fiz
-https://github.com/FizLBQ/Flask_fiz
-Entry file: Flask_fiz/demo.py
-Scanned: 2016-10-26 00:03:58.635997
-No vulnerabilities found.
-
-
-rpalo/flask-firstapp
-https://github.com/rpalo/flask-firstapp
-Entry file: flask-firstapp/hello.py
-Scanned: 2016-10-26 00:03:59.914069
-No vulnerabilities found.
-
-
-rpalo/flask-crimemap
-https://github.com/rpalo/flask-crimemap
-Entry file: flask-crimemap/crimemap.py
-Scanned: 2016-10-26 00:04:01.456921
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-singleyoungtao/myblog-flask
-https://github.com/singleyoungtao/myblog-flask
-Entry file: myblog-flask/app/__init__.py
-Scanned: 2016-10-26 00:04:03.394910
-Vulnerability 1:
-File: myblog-flask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: myblog-flask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: myblog-flask/app/api_1_0/posts.py
- > Line 19: next = None
-File: myblog-flask/app/api_1_0/posts.py
- > reaches line 18, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: myblog-flask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: myblog-flask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: myblog-flask/app/api_1_0/posts.py
- > Line 19: next = None
-File: myblog-flask/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: myblog-flask/app/api_1_0/posts.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/posts.py
- > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/posts.py
- > Line 15: posts = pagination.items
- File: myblog-flask/app/api_1_0/posts.py
- > Line 16: prev = None
- File: myblog-flask/app/api_1_0/posts.py
- > Line 19: next = None
-File: myblog-flask/app/api_1_0/posts.py
- > reaches line 22, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 4:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 23: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 23: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 20: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 23: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 7:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 45: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 44, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 45: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 47, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: myblog-flask/app/api_1_0/users.py
- > User input at line 37, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/users.py
- > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/users.py
- > Line 41: posts = pagination.items
- File: myblog-flask/app/api_1_0/users.py
- > Line 42: prev = None
- File: myblog-flask/app/api_1_0/users.py
- > Line 45: next = None
-File: myblog-flask/app/api_1_0/users.py
- > reaches line 48, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 10:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 11:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 12:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 18: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 13:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 45, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 14:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 48, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 15:
-File: myblog-flask/app/api_1_0/comments.py
- > User input at line 38, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/api_1_0/comments.py
- > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/api_1_0/comments.py
- > Line 42: comments = pagination.items
- File: myblog-flask/app/api_1_0/comments.py
- > Line 43: prev = None
- File: myblog-flask/app/api_1_0/comments.py
- > Line 46: next = None
-File: myblog-flask/app/api_1_0/comments.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 16:
-File: myblog-flask/app/main/views.py
- > User input at line 47, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 55: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 58: posts = pagination.items
- File: myblog-flask/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 17:
-File: myblog-flask/app/main/views.py
- > User input at line 50, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 48: show_followed = False
- File: myblog-flask/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 18:
-File: myblog-flask/app/main/views.py
- > User input at line 66, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 67: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 70: posts = pagination.items
-File: myblog-flask/app/main/views.py
- > reaches line 71, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 19:
-File: myblog-flask/app/main/views.py
- > User input at line 133, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 135: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: myblog-flask/app/main/views.py
- > Line 137: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 140: comments = pagination.items
- File: myblog-flask/app/main/views.py
- > Line 132: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: myblog-flask/app/main/views.py
- > reaches line 141, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 20:
-File: myblog-flask/app/main/views.py
- > User input at line 201, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: myblog-flask/app/main/views.py
- > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 207, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 21:
-File: myblog-flask/app/main/views.py
- > User input at line 218, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 219: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 222: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: myblog-flask/app/main/views.py
- > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: myblog-flask/app/main/views.py
- > reaches line 224, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 22:
-File: myblog-flask/app/main/views.py
- > User input at line 249, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: myblog-flask/app/main/views.py
- > Line 250: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: myblog-flask/app/main/views.py
- > Line 253: comments = pagination.items
-File: myblog-flask/app/main/views.py
- > reaches line 254, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-rpalo/flask-waitercaller
-https://github.com/rpalo/flask-waitercaller
-Entry file: flask-waitercaller/waitercaller.py
-Scanned: 2016-10-26 00:04:04.710233
-No vulnerabilities found.
-
-
-NJUPole/Flask_tickets
-https://github.com/NJUPole/Flask_tickets
-Entry file: Flask_tickets/tickets.py
-Scanned: 2016-10-26 00:04:06.671048
-Vulnerability 1:
-File: Flask_tickets/tickets.py
- > User input at line 62, trigger word "get(":
- movieDate = request.args.get('date')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 70, trigger word "filter(":
- queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords)))
-
-Vulnerability 2:
-File: Flask_tickets/tickets.py
- > User input at line 63, trigger word "get(":
- searchWords = request.args.get('search')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 70, trigger word "filter(":
- queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords)))
-
-Vulnerability 3:
-File: Flask_tickets/tickets.py
- > User input at line 61, trigger word "get(":
- page = request.args.get('page')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 68: page = pageint(page) - 10
-File: Flask_tickets/tickets.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords)
-
-Vulnerability 4:
-File: Flask_tickets/tickets.py
- > User input at line 62, trigger word "get(":
- movieDate = request.args.get('date')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords)
-
-Vulnerability 5:
-File: Flask_tickets/tickets.py
- > User input at line 63, trigger word "get(":
- searchWords = request.args.get('search')
-Reassigned in:
- File: Flask_tickets/tickets.py
- > Line 71: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 72: dateList = list(set(map(x.date, results)))
- File: Flask_tickets/tickets.py
- > Line 74: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 75: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 78: queryRes = queryRes.filter_by(date=movieDate)
- File: Flask_tickets/tickets.py
- > Line 79: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 81: resultNum = len(results)
- File: Flask_tickets/tickets.py
- > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1
- File: Flask_tickets/tickets.py
- > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price)
- File: Flask_tickets/tickets.py
- > Line 65: results = queryRes[]
- File: Flask_tickets/tickets.py
- > Line 66: dateList = list(set(map(x.date, results)))
-File: Flask_tickets/tickets.py
- > reaches line 83, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords)
-
-
-
-Mingz2013/demo.flasky
-https://github.com/Mingz2013/demo.flasky
-Entry file: None
-Scanned: 2016-10-26 00:04:08.087680
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Mingz2013/demo.flasky.
-
-LaundryOrder/Backend
-https://github.com/LaundryOrder/Backend
-Entry file: Backend/app.py
-Scanned: 2016-10-26 00:04:09.540130
-No vulnerabilities found.
-
-
-tageee/Blog
-https://github.com/tageee/Blog
-Entry file: Blog/app/__init__.py
-Scanned: 2016-10-26 00:04:11.804298
-Vulnerability 1:
-File: Blog/app/main/views.py
- > User input at line 21, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 33: posts = pagination.items
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: Blog/app/main/views.py
- > User input at line 25, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 23: show_followed = False
- File: Blog/app/main/views.py
- > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: Blog/app/main/views.py
- > User input at line 59, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 63: posts = pagination.items
-File: Blog/app/main/views.py
- > reaches line 64, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: Blog/app/main/views.py
- > User input at line 122, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: Blog/app/main/views.py
- > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 129: comments = pagination.items
- File: Blog/app/main/views.py
- > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: Blog/app/main/views.py
- > reaches line 130, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: Blog/app/main/views.py
- > User input at line 189, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 195, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: Blog/app/main/views.py
- > User input at line 206, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: Blog/app/main/views.py
- > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Blog/app/main/views.py
- > reaches line 212, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-Vulnerability 7:
-File: Blog/app/main/views.py
- > User input at line 221, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Blog/app/main/views.py
- > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: Blog/app/main/views.py
- > Line 225: comments = pagination.items
-File: Blog/app/main/views.py
- > reaches line 226, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-ahumeijun/RestfulTest
-https://github.com/ahumeijun/RestfulTest
-Entry file: RestfulTest/app/__init__.py
-Scanned: 2016-10-26 00:04:13.606577
-No vulnerabilities found.
-
-
-jlberzal/my_app
-https://github.com/jlberzal/my_app
-Entry file: my_app/app/__init__.py
-Scanned: 2016-10-26 00:04:15.175230
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zzq2015/myFirstWeb
-https://github.com/zzq2015/myFirstWeb
-Entry file: None
-Scanned: 2016-10-26 00:04:20.695862
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-thomasroulin/SpreadPoll
-https://github.com/thomasroulin/SpreadPoll
-Entry file: SpreadPoll/SpreadPoll.py
-Scanned: 2016-10-26 00:04:22.027926
-No vulnerabilities found.
-
-
-vincentdnl/flask-facebook-messenger-bot-boilerplate
-https://github.com/vincentdnl/flask-facebook-messenger-bot-boilerplate
-Entry file: flask-facebook-messenger-bot-boilerplate/app.py
-Scanned: 2016-10-26 00:04:23.328485
-No vulnerabilities found.
-
-
-vishwanath79/FlaskRestAPI
-https://github.com/vishwanath79/FlaskRestAPI
-Entry file: FlaskRestAPI/rest.py
-Scanned: 2016-10-26 00:04:24.649867
-Vulnerability 1:
-File: FlaskRestAPI/rest.py
- > User input at line 41, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: FlaskRestAPI/rest.py
- > reaches line 49, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-GrantJamesPowell/FlaskRaffleApp
-https://github.com/GrantJamesPowell/FlaskRaffleApp
-Entry file: FlaskRaffleApp/raffleapp.py
-Scanned: 2016-10-26 00:04:26.184511
-No vulnerabilities found.
-
-
-catmin/flask49erStore
-https://github.com/catmin/flask49erStore
-Entry file: flask49erStore/flask49erStore.py
-Scanned: 2016-10-26 00:04:29.014960
-Vulnerability 1:
-File: flask49erStore/flask49erStore.py
- > User input at line 253, trigger word "get(":
- offer = Offer.query.get(id)
-Reassigned in:
- File: flask49erStore/flask49erStore.py
- > Line 254: hulls = Hull.query.filter_by(offer_id=offer.id)
- File: flask49erStore/flask49erStore.py
- > Line 255: masts = Mast.query.filter_by(offer_id=offer.id)
- File: flask49erStore/flask49erStore.py
- > Line 256: sails = Sail.query.filter_by(offer_id=offer.id)
-File: flask49erStore/flask49erStore.py
- > reaches line 261, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('offer_details.html',offer=offer, sails=sails, hulls=hulls, masts=masts)
-
-
-
-leavyli/flaskWebDevelopment
-https://github.com/leavyli/flaskWebDevelopment
-Entry file: flaskWebDevelopment/hello/hello.py
-Scanned: 2016-10-26 00:04:30.322748
-No vulnerabilities found.
-
-
-thedod/boilerplate-peewee-flask
-https://github.com/thedod/boilerplate-peewee-flask
-Entry file: None
-Scanned: 2016-10-26 00:04:35.882961
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedod/boilerplate-peewee-flask.
-
-shn7798/FlaskZhihu
-https://github.com/shn7798/FlaskZhihu
-Entry file: FlaskZhihu/tests/test_orm.py
-Scanned: 2016-10-26 00:04:39.028828
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-syntaxSizer/flask
-https://github.com/syntaxSizer/flask
-Entry file: None
-Scanned: 2016-10-26 00:04:39.596681
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gabrielecker/Flask
-https://github.com/gabrielecker/Flask
-Entry file: None
-Scanned: 2016-10-26 00:04:41.108810
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Dianalim209/flask
-https://github.com/Dianalim209/flask
-Entry file: None
-Scanned: 2016-10-26 00:04:41.683585
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-luojiyin1987/flask
-https://github.com/luojiyin1987/flask
-Entry file: None
-Scanned: 2016-10-26 00:04:45.228063
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chrislinan/flask
-https://github.com/chrislinan/flask
-Entry file: None
-Scanned: 2016-10-26 00:04:45.743435
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-lagougou/flask
-https://github.com/lagougou/flask
-Entry file: None
-Scanned: 2016-10-26 00:04:49.250078
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tkirkland/Flask
-https://github.com/tkirkland/Flask
-Entry file: None
-Scanned: 2016-10-26 00:04:58.791634
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ooohiroyukiooo/flask
-https://github.com/ooohiroyukiooo/flask
-Entry file: None
-Scanned: 2016-10-26 00:04:59.300265
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-RoseOu/Flask-learning
-https://github.com/RoseOu/Flask-learning
-Entry file: None
-Scanned: 2016-10-26 00:05:00.841186
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yassipo/webservice
-https://github.com/yassipo/webservice
-Entry file: webservice/app.py
-Scanned: 2016-10-26 00:05:05.853225
-No vulnerabilities found.
-
-
-amey-sam/Flask-MailGun
-https://github.com/amey-sam/Flask-MailGun
-Entry file: None
-Scanned: 2016-10-26 00:05:06.368888
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun.
-
-efrainmunoz/flasktaskr
-https://github.com/efrainmunoz/flasktaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:06.883108
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HansKramer/flaskr
-https://github.com/HansKramer/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:07.398492
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/HansKramer/flaskr.
-
-shorian/flaskr
-https://github.com/shorian/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:08.916893
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shorian/flaskr.
-
-mmoran0032/flaskwork
-https://github.com/mmoran0032/flaskwork
-Entry file: flaskwork/hello.py
-Scanned: 2016-10-26 00:05:11.492943
-No vulnerabilities found.
-
-
-Maxwell-Ying/flaskbook
-https://github.com/Maxwell-Ying/flaskbook
-Entry file: flaskbook/app/__init__.py
-Scanned: 2016-10-26 00:05:13.962236
-Vulnerability 1:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 2:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 3:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 4:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 5:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 6:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 7:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 84, trigger word "filter(":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-
-Vulnerability 8:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 9:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 10:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 11:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 12:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 13:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 14:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 86, trigger word "filter(":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-
-Vulnerability 15:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 16:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 17:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 18:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 19:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 20:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 21:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 88, trigger word "filter(":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-
-Vulnerability 22:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 23:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 24:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 25:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 26:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 27:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 28:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 90, trigger word "filter(":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-
-Vulnerability 29:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 30:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 31:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 32:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 33:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 34:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 35:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 92, trigger word "filter(":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-
-Vulnerability 36:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 37:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 38:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 39:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 40:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 41:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 42:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 94, trigger word "filter(":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-
-Vulnerability 43:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 44:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 45:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 46:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 47:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 48:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 49:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 97, trigger word "filter(":
- results = results.filter(books.name == form.name.data)
-
-Vulnerability 50:
-File: flaskbook/app/views.py
- > User input at line 84, trigger word ".data":
- results = results.filter(books.name.like('%' + form.name.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 51:
-File: flaskbook/app/views.py
- > User input at line 86, trigger word ".data":
- results = results.filter(books.author.like('%' + form.author.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 52:
-File: flaskbook/app/views.py
- > User input at line 88, trigger word ".data":
- results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 53:
-File: flaskbook/app/views.py
- > User input at line 90, trigger word ".data":
- results = results.filter(books.public.like('%' + form.public.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 54:
-File: flaskbook/app/views.py
- > User input at line 92, trigger word ".data":
- results = results.filter(books.home.like('%' + form.home.data + '%'))
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 55:
-File: flaskbook/app/views.py
- > User input at line 94, trigger word ".data":
- results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-Vulnerability 56:
-File: flaskbook/app/views.py
- > User input at line 97, trigger word ".data":
- results = results.filter(books.name == form.name.data)
-Reassigned in:
- File: flaskbook/app/views.py
- > Line 81: results = books.query
-File: flaskbook/app/views.py
- > reaches line 108, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all())
-
-
-
-yoophi/flaskygram
-https://github.com/yoophi/flaskygram
-Entry file: None
-Scanned: 2016-10-26 00:05:16.486849
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flaskygram.
-
-Ifresher/Flaskr
-https://github.com/Ifresher/Flaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:22.007264
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hongmaoxiao/flasky
-https://github.com/hongmaoxiao/flasky
-Entry file: None
-Scanned: 2016-10-26 00:05:23.519621
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ojgoyal/flaskr
-https://github.com/ojgoyal/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:24.029489
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ojgoyal/flaskr.
-
-hoorn91/flaskproject
-https://github.com/hoorn91/flaskproject
-Entry file: flaskproject/app/hello.py
-Scanned: 2016-10-26 00:05:26.476151
-Vulnerability 1:
-File: flaskproject/app/hello.py
- > User input at line 70, trigger word "get(":
- task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False
-File: flaskproject/app/hello.py
- > reaches line 77, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201)
-
-
-
-jiuhuandao/Flaskr
-https://github.com/jiuhuandao/Flaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:27.017705
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ansel333/flaskr
-https://github.com/ansel333/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:05:28.562201
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ansel333/flaskr.
-
-richardqlin/flaskralchemy
-https://github.com/richardqlin/flaskralchemy
-Entry file: None
-Scanned: 2016-10-26 00:05:35.600190
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy.
-
-shen5630/FlaskProject
-https://github.com/shen5630/FlaskProject
-Entry file: FlaskProject/myRestful/healthcareApi.py
-Scanned: 2016-10-26 00:05:37.990174
-No vulnerabilities found.
-
-
-viprs/FlaskyBlog
-https://github.com/viprs/FlaskyBlog
-Entry file: FlaskyBlog/app/__init__.py
-Scanned: 2016-10-26 00:05:39.842410
-Vulnerability 1:
-File: FlaskyBlog/app/api_1_0/posts.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 18: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 25: post_list = [post.to_json() for post in posts]
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 19: prev_page = None
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 22: next_page = None
-File: FlaskyBlog/app/api_1_0/posts.py
- > reaches line 21, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 2:
-File: FlaskyBlog/app/api_1_0/posts.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 18: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 25: post_list = [post.to_json() for post in posts]
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 19: prev_page = None
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 22: next_page = None
-File: FlaskyBlog/app/api_1_0/posts.py
- > reaches line 24, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 3:
-File: FlaskyBlog/app/api_1_0/posts.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 18: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 25: post_list = [post.to_json() for post in posts]
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 19: prev_page = None
- File: FlaskyBlog/app/api_1_0/posts.py
- > Line 22: next_page = None
-File: FlaskyBlog/app/api_1_0/posts.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''total_count''page_count'post_listprev_pagenext_pagepagination.totalpost_list.__len__())
-
-Vulnerability 4:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 15: users = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 22: user_list = [user.to_json() for user in users]
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 16: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 19: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 18, trigger word "url_for(":
- prev_page = url_for('api.get_users',page=page - 1, _external=True)
-
-Vulnerability 5:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 15: users = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 22: user_list = [user.to_json() for user in users]
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 16: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 19: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 21, trigger word "url_for(":
- next_page = url_for('api.get_users',page=page + 1, _external=True)
-
-Vulnerability 6:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 11, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 15: users = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 22: user_list = [user.to_json() for user in users]
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 16: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 19: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 23, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users''prev_page''next_page''total_count''page_count'user_listprev_pagenext_pagepagination.totaluser_list.__len__())
-
-Vulnerability 7:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 49: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 48, trigger word "url_for(":
- prev_page = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 8:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 49: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 51, trigger word "url_for(":
- next_page = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 9:
-File: FlaskyBlog/app/api_1_0/users.py
- > User input at line 41, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 45: posts = pagination.items
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 46: prev_page = None
- File: FlaskyBlog/app/api_1_0/users.py
- > Line 49: next_page = None
-File: FlaskyBlog/app/api_1_0/users.py
- > reaches line 52, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total)
-
-Vulnerability 10:
-File: FlaskyBlog/app/main/views.py
- > User input at line 26, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 27: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 31: posts = pagination.items
- File: FlaskyBlog/app/main/views.py
- > Line 24: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskyBlog/app/main/views.py
- > reaches line 32, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination)
-
-Vulnerability 11:
-File: FlaskyBlog/app/main/views.py
- > User input at line 47, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 50: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: FlaskyBlog/app/main/views.py
- > Line 52: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 55: comments = pagination.items
- File: FlaskyBlog/app/main/views.py
- > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: FlaskyBlog/app/main/views.py
- > reaches line 56, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 12:
-File: FlaskyBlog/app/main/views.py
- > User input at line 170, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 171: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: FlaskyBlog/app/main/views.py
- > Line 169: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskyBlog/app/main/views.py
- > reaches line 177, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 13:
-File: FlaskyBlog/app/main/views.py
- > User input at line 187, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 188: pagination = user.follower.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 192: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: FlaskyBlog/app/main/views.py
- > Line 186: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: FlaskyBlog/app/main/views.py
- > reaches line 194, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 14:
-File: FlaskyBlog/app/main/views.py
- > User input at line 203, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: FlaskyBlog/app/main/views.py
- > Line 204: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: FlaskyBlog/app/main/views.py
- > Line 207: comments = pagination.items
-File: FlaskyBlog/app/main/views.py
- > reaches line 208, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page)
-
-
-
-thunn/Flaskr1
-https://github.com/thunn/Flaskr1
-Entry file: Flaskr1/flaskr.py
-Scanned: 2016-10-26 00:05:41.159625
-No vulnerabilities found.
-
-
-thejojo87/FlaskBlog
-https://github.com/thejojo87/FlaskBlog
-Entry file: FlaskBlog/final/app/__init__.py
-Scanned: 2016-10-26 00:05:43.496421
-No vulnerabilities found.
-
-
-er3456qi/FlaskTutorial
-https://github.com/er3456qi/FlaskTutorial
-Entry file: FlaskTutorial/flaskr.py
-Scanned: 2016-10-26 00:05:44.866023
-No vulnerabilities found.
-
-
-PaperAndColours/flaskImage
-https://github.com/PaperAndColours/flaskImage
-Entry file: flaskImage/app.py
-Scanned: 2016-10-26 00:05:47.621161
-No vulnerabilities found.
-
-
-hamartia0/FlaskWeb
-https://github.com/hamartia0/FlaskWeb
-Entry file: FlaskWeb/web3b.py
-Scanned: 2016-10-26 00:05:51.660757
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-rmGuarachi/flask2
-https://github.com/rmGuarachi/flask2
-Entry file: flask2/flask2/app/__init__.py
-Scanned: 2016-10-26 00:05:53.478082
-No vulnerabilities found.
-
-
-maheskett/flask-testing
-https://github.com/maheskett/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-26 00:06:00.413746
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kellyhiggins/Flask-testing
-https://github.com/kellyhiggins/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-26 00:06:02.520113
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-laurensila/flask-testing
-https://github.com/laurensila/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-26 00:06:04.309419
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sugarguo/flask-login
-https://github.com/sugarguo/flask-login
-Entry file: flask-login/yan.py
-Scanned: 2016-10-26 00:06:11.067297
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Afghary/bloggingFlask
-https://github.com/Afghary/bloggingFlask
-Entry file: bloggingFlask/src/app.py
-Scanned: 2016-10-26 00:06:12.505446
-No vulnerabilities found.
-
-
-DANWINS-LLC/flask-starter
-https://github.com/DANWINS-LLC/flask-starter
-Entry file: None
-Scanned: 2016-10-26 00:06:13.021728
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/DANWINS-LLC/flask-starter.
-
-coffee-world/flask_wd
-https://github.com/coffee-world/flask_wd
-Entry file: flask_wd/hello.py
-Scanned: 2016-10-26 00:06:14.595107
-No vulnerabilities found.
-
-
-jiang2/flask-rest
-https://github.com/jiang2/flask-rest
-Entry file: None
-Scanned: 2016-10-26 00:06:16.387055
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jiang2/flask-rest.
-
-progBill/flask_blueprint
-https://github.com/progBill/flask_blueprint
-Entry file: flask_blueprint/__init__.py
-Scanned: 2016-10-26 00:06:17.751660
-No vulnerabilities found.
-
-
-carlsagan21/flask-crawler
-https://github.com/carlsagan21/flask-crawler
-Entry file: flask-crawler/flask-crawler.py
-Scanned: 2016-10-26 00:06:19.031588
-No vulnerabilities found.
-
-
-jdesilvio/flask-deploy
-https://github.com/jdesilvio/flask-deploy
-Entry file: None
-Scanned: 2016-10-26 00:06:19.546025
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jdesilvio/flask-deploy.
-
-stanliski/flask-dev
-https://github.com/stanliski/flask-dev
-Entry file: None
-Scanned: 2016-10-26 00:06:22.895051
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-paceko/testing-flask
-https://github.com/paceko/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:06:24.788009
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-minyisme/flask-testing
-https://github.com/minyisme/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-26 00:06:26.593665
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-cristinamclarkin/Flask-testing
-https://github.com/cristinamclarkin/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-26 00:06:28.478066
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kindoprec/flask-boot
-https://github.com/kindoprec/flask-boot
-Entry file: flask-boot/app.py
-Scanned: 2016-10-26 00:06:29.805945
-Vulnerability 1:
-File: flask-boot/app.py
- > User input at line 15, trigger word "get(":
- out = 'Hello ' + request.args.get('name', '')
-File: flask-boot/app.py
- > reaches line 16, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(output=out)
-
-
-
-enlacee/appFlask
-https://github.com/enlacee/appFlask
-Entry file: appFlask/web/hello.py
-Scanned: 2016-10-26 00:06:31.105936
-No vulnerabilities found.
-
-
-shuangfu/learnFlask
-https://github.com/shuangfu/learnFlask
-Entry file: None
-Scanned: 2016-10-26 00:06:32.123709
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/shuangfu/learnFlask.
-
-andresmguk/flask-blog
-https://github.com/andresmguk/flask-blog
-Entry file: None
-Scanned: 2016-10-26 00:06:36.157098
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-tnygren/flask-testing
-https://github.com/tnygren/flask-testing
-Entry file: flask-testing/megaTutorial/app/__init__.py
-Scanned: 2016-10-26 00:06:38.595947
-No vulnerabilities found.
-
-
-licsh/flask_app
-https://github.com/licsh/flask_app
-Entry file: None
-Scanned: 2016-10-26 00:06:39.115364
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-saampandit/flask-intro
-https://github.com/saampandit/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-26 00:06:46.113105
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro/venv/lib/python2.7/sre_compile.py
-
-jlberzal/Flask-User
-https://github.com/jlberzal/Flask-User
-Entry file: Flask-User/flask_user/tests/tst_app.py
-Scanned: 2016-10-26 00:06:48.396747
-Vulnerability 1:
-File: Flask-User/flask_user/tests/tst_app.py
- > User input at line 119, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation)
-Reassigned in:
- File: Flask-User/flask_user/tests/tst_app.py
- > Line 120: user_manager = UserManager(db_adapter, app)
-File: Flask-User/flask_user/tests/tst_app.py
- > reaches line 123, trigger word "filter(":
- if not User.query.filter(User.username == 'member').first():
-
-Vulnerability 2:
-File: Flask-User/flask_user/tests/tst_app.py
- > User input at line 119, trigger word "SQLAlchemy":
- db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation)
-Reassigned in:
- File: Flask-User/flask_user/tests/tst_app.py
- > Line 120: user_manager = UserManager(db_adapter, app)
-File: Flask-User/flask_user/tests/tst_app.py
- > reaches line 130, trigger word "filter(":
- if not User.query.filter(User.username == 'user007').first():
-
-Vulnerability 3:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 59, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-
-Vulnerability 4:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 59, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-
-Vulnerability 5:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 71, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.manage_emails'))
-
-Vulnerability 6:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 71, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.manage_emails'))
-
-Vulnerability 7:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 75, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-
-Vulnerability 8:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 75, trigger word "url_for(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-
-Vulnerability 9:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 98, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm'))
-
-Vulnerability 10:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 98, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm'))
-
-Vulnerability 11:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 101, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary'))
-
-Vulnerability 12:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 101, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary'))
-
-Vulnerability 13:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 59, trigger word "form(":
- response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 104, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete'))
-
-Vulnerability 14:
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > User input at line 75, trigger word "form(":
- response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2)
-File: Flask-User/flask_user/tests/test_multiple_emails.py
- > reaches line 104, trigger word "url_for(":
- response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete'))
-
-
-
-Danielyao0312/flask-intro
-https://github.com/Danielyao0312/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-26 00:06:50.157671
-No vulnerabilities found.
-
-
-eduardoferrandezr/flask-bokeh
-https://github.com/eduardoferrandezr/flask-bokeh
-Entry file: flask-bokeh/app.py
-Scanned: 2016-10-26 00:06:51.466521
-No vulnerabilities found.
-
-
-zachwooddoughty/flask-tester
-https://github.com/zachwooddoughty/flask-tester
-Entry file: flask-tester/hello.py
-Scanned: 2016-10-26 00:06:52.749383
-No vulnerabilities found.
-
-
-rd82/flask-tute
-https://github.com/rd82/flask-tute
-Entry file: flask-tute/app/__init__.py
-Scanned: 2016-10-26 00:06:54.182937
-No vulnerabilities found.
-
-
-dencynluv/testing-flask
-https://github.com/dencynluv/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:07:01.100973
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-efrainmunoz/flask-blog
-https://github.com/efrainmunoz/flask-blog
-Entry file: None
-Scanned: 2016-10-26 00:07:01.633959
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-bdhammel/asteroid-flask
-https://github.com/bdhammel/asteroid-flask
-Entry file: asteroid-flask/game.py
-Scanned: 2016-10-26 00:07:11.269929
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-dflee/testing-flask
-https://github.com/dflee/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:07:13.191784
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Ihyatt/testing-flask
-https://github.com/Ihyatt/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:07:14.974621
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-gyermolenko/flask-modelhistory
-https://github.com/gyermolenko/flask-modelhistory
-Entry file: flask-modelhistory/example/app/__init__.py
-Scanned: 2016-10-26 00:07:16.377808
-No vulnerabilities found.
-
-
-hiro93n/sample_flask
-https://github.com/hiro93n/sample_flask
-Entry file: sample_flask/tutorial/flaskr/__init__.py
-Scanned: 2016-10-26 00:07:17.717242
-No vulnerabilities found.
-
-
-DraZoro/flask_learning
-https://github.com/DraZoro/flask_learning
-Entry file: flask_learning/flaskr.py
-Scanned: 2016-10-26 00:07:19.017833
-No vulnerabilities found.
-
-
-skols/flask_blog
-https://github.com/skols/flask_blog
-Entry file: None
-Scanned: 2016-10-26 00:07:19.534686
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-eleweek/Mastering_Flask
-https://github.com/eleweek/Mastering_Flask
-Entry file: Mastering_Flask/section2/app.py
-Scanned: 2016-10-26 00:07:21.993239
-No vulnerabilities found.
-
-
-Mingz2013/demo.flasky
-https://github.com/Mingz2013/demo.flasky
-Entry file: None
-Scanned: 2016-10-26 00:07:22.547960
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ahumeijun/RestfulTest
-https://github.com/ahumeijun/RestfulTest
-Entry file: RestfulTest/app/__init__.py
-Scanned: 2016-10-26 00:07:23.836500
-No vulnerabilities found.
-
-
-jlberzal/my_app
-https://github.com/jlberzal/my_app
-Entry file: my_app/app/__init__.py
-Scanned: 2016-10-26 00:07:25.409671
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Kathure/microblg
-https://github.com/Kathure/microblg
-Entry file: microblg/app/__init__.py
-Scanned: 2016-10-26 00:07:37.485208
-No vulnerabilities found.
-
-
-hufan-Akari/BookLibrary
-https://github.com/hufan-Akari/BookLibrary
-Entry file: BookLibrary/app/__init__.py
-Scanned: 2016-10-26 00:07:39.818030
-Vulnerability 1:
-File: BookLibrary/app/main/auth/views.py
- > User input at line 14, trigger word ".data":
- the_user = User.query.filter(User.email.ilike(login_form.email.data)).first()
-File: BookLibrary/app/main/auth/views.py
- > reaches line 14, trigger word "filter(":
- the_user = User.query.filter(User.email.ilike(login_form.email.data)).first()
-
-Vulnerability 2:
-File: BookLibrary/app/main/auth/views.py
- > User input at line 14, trigger word ".data":
- the_user = User.query.filter(User.email.ilike(login_form.email.data)).first()
-File: BookLibrary/app/main/auth/views.py
- > reaches line 17, trigger word "flash(":
- flash('登录成功! 欢迎您 %s!' % the_user.name, 'success')
-
-Vulnerability 3:
-File: BookLibrary/app/main/book/views.py
- > User input at line 14, trigger word "get(":
- search_word = request.args.get('search', None)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 23: search_word = search_word.strip()
- File: BookLibrary/app/main/book/views.py
- > Line 28: search_form.search.data = search_word
-File: BookLibrary/app/main/book/views.py
- > reaches line 24, trigger word "filter(":
- the_books = the_books.filter(db.or_(Book.title.ilike('%%%s%%' % search_word), Book.author.ilike('%%%s%%' % search_word), Book.isbn.ilike('%%%s%%' % search_word), Book.tags.any(Tag.name.ilike('%%%s%%' % search_word)), Book.subtitle.ilike('%%%s%%' % search_word))).outerjoin(Log).group_by(Book.id).order_by(db.func.count(Log.id).desc())
-
-Vulnerability 4:
-File: BookLibrary/app/main/book/views.py
- > User input at line 16, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 32: pagination = the_books.paginate(page,per_page=8)
- File: BookLibrary/app/main/book/views.py
- > Line 33: result_books = pagination.items
-File: BookLibrary/app/main/book/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book.html',books=result_books, pagination=pagination, search_form=search_form, title='书籍清单')
-
-Vulnerability 5:
-File: BookLibrary/app/main/book/views.py
- > User input at line 46, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 50: pagination = the_book.logs.filter_by(returned=show - 1).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5)
- File: BookLibrary/app/main/book/views.py
- > Line 53: pagination = the_book.comments.filter_by(deleted=0).order_by(Comment.edit_timestamp.desc()).paginate(page,per_page=5)
- File: BookLibrary/app/main/book/views.py
- > Line 56: data = pagination.items
-File: BookLibrary/app/main/book/views.py
- > reaches line 57, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book_detail.html',book=the_book, data=data, pagination=pagination, form=form, title=the_book.title)
-
-Vulnerability 6:
-File: BookLibrary/app/main/book/views.py
- > User input at line 112, trigger word ".data":
- new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '')
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书')
-File: BookLibrary/app/main/book/views.py
- > reaches line 131, trigger word "flash(":
- flash('书籍 %s 已添加至图书馆!' % new_book.title, 'success')
-
-Vulnerability 7:
-File: BookLibrary/app/main/book/views.py
- > User input at line 112, trigger word ".data":
- new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '')
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书')
-File: BookLibrary/app/main/book/views.py
- > reaches line 132, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id))
-
-Vulnerability 8:
-File: BookLibrary/app/main/book/views.py
- > User input at line 112, trigger word ".data":
- new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '')
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书')
-File: BookLibrary/app/main/book/views.py
- > reaches line 132, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id))
-
-Vulnerability 9:
-File: BookLibrary/app/main/book/views.py
- > User input at line 161, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/book/views.py
- > Line 179: pagination = the_books.paginate(page,per_page=8)
- File: BookLibrary/app/main/book/views.py
- > Line 180: data = pagination.items
- File: BookLibrary/app/main/book/views.py
- > Line 167: data = None
- File: BookLibrary/app/main/book/views.py
- > Line 168: pagination = None
-File: BookLibrary/app/main/book/views.py
- > reaches line 182, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('book_tag.html',tags=the_tags, title='Tags', search_form=search_form, books=data, pagination=pagination)
-
-Vulnerability 10:
-File: BookLibrary/app/main/log/views.py
- > User input at line 14, trigger word "get(":
- book_id = request.args.get('book_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 15: the_book = Book.query.get_or_404(book_id)
- File: BookLibrary/app/main/log/views.py
- > Line 19: result = current_user.borrow_book(the_book)
- File: BookLibrary/app/main/log/views.py
- > Line 19: message = current_user.borrow_book(the_book)
-File: BookLibrary/app/main/log/views.py
- > reaches line 20, trigger word "flash(":
- flash(message, result'success''danger')
-
-Vulnerability 11:
-File: BookLibrary/app/main/log/views.py
- > User input at line 14, trigger word "get(":
- book_id = request.args.get('book_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 15: the_book = Book.query.get_or_404(book_id)
- File: BookLibrary/app/main/log/views.py
- > Line 19: result = current_user.borrow_book(the_book)
- File: BookLibrary/app/main/log/views.py
- > Line 19: message = current_user.borrow_book(the_book)
-File: BookLibrary/app/main/log/views.py
- > reaches line 22, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id))
-
-Vulnerability 12:
-File: BookLibrary/app/main/log/views.py
- > User input at line 14, trigger word "get(":
- book_id = request.args.get('book_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 15: the_book = Book.query.get_or_404(book_id)
- File: BookLibrary/app/main/log/views.py
- > Line 19: result = current_user.borrow_book(the_book)
- File: BookLibrary/app/main/log/views.py
- > Line 19: message = current_user.borrow_book(the_book)
-File: BookLibrary/app/main/log/views.py
- > reaches line 22, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id))
-
-Vulnerability 13:
-File: BookLibrary/app/main/log/views.py
- > User input at line 29, trigger word "get(":
- log_id = request.args.get('log_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 33: the_log = Log.query.get(log_id)
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
-File: BookLibrary/app/main/log/views.py
- > reaches line 40, trigger word "flash(":
- flash(message, result'success''danger')
-
-Vulnerability 14:
-File: BookLibrary/app/main/log/views.py
- > User input at line 33, trigger word "get(":
- the_log = Log.query.get(log_id)
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
-File: BookLibrary/app/main/log/views.py
- > reaches line 40, trigger word "flash(":
- flash(message, result'success''danger')
-
-Vulnerability 15:
-File: BookLibrary/app/main/log/views.py
- > User input at line 29, trigger word "get(":
- log_id = request.args.get('log_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 33: the_log = Log.query.get(log_id)
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
-File: BookLibrary/app/main/log/views.py
- > reaches line 42, trigger word "redirect(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id))
-
-Vulnerability 16:
-File: BookLibrary/app/main/log/views.py
- > User input at line 29, trigger word "get(":
- log_id = request.args.get('log_id')
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 33: the_log = Log.query.get(log_id)
- File: BookLibrary/app/main/log/views.py
- > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first()
- File: BookLibrary/app/main/log/views.py
- > Line 39: result = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 39: message = current_user.return_book(the_log)
- File: BookLibrary/app/main/log/views.py
- > Line 31: the_log = None
-File: BookLibrary/app/main/log/views.py
- > reaches line 42, trigger word "url_for(":
- ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id))
-
-Vulnerability 17:
-File: BookLibrary/app/main/log/views.py
- > User input at line 52, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/log/views.py
- > Line 53: pagination = Log.query.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=10)
- File: BookLibrary/app/main/log/views.py
- > Line 54: logs = pagination.items
-File: BookLibrary/app/main/log/views.py
- > reaches line 55, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('logs_info.html',logs=logs, pagination=pagination, title='借阅信息')
-
-Vulnerability 18:
-File: BookLibrary/app/main/user/views.py
- > User input at line 14, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/user/views.py
- > Line 15: pagination = User.query.order_by(User.id.desc()).paginate(page,per_page=10)
- File: BookLibrary/app/main/user/views.py
- > Line 16: users = pagination.items
-File: BookLibrary/app/main/user/views.py
- > reaches line 17, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',users=users, pagination=pagination, title='已注册用户')
-
-Vulnerability 19:
-File: BookLibrary/app/main/user/views.py
- > User input at line 28, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: BookLibrary/app/main/user/views.py
- > Line 29: pagination = the_user.logs.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5)
- File: BookLibrary/app/main/user/views.py
- > Line 31: logs = pagination.items
-File: BookLibrary/app/main/user/views.py
- > reaches line 33, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user_detail.html',user=the_user, logs=logs, pagination=pagination, title='用户: ' + the_user.name)
-
-
-
-katietarng/hb-testing-flask
-https://github.com/katietarng/hb-testing-flask
-Entry file: hb-testing-flask/party.py
-Scanned: 2016-10-26 00:07:41.713939
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lkpanganiban/flask-restful-example
-https://github.com/lkpanganiban/flask-restful-example
-Entry file: flask-restful-example/run.py
-Scanned: 2016-10-26 00:07:43.038584
-No vulnerabilities found.
-
-
-qefir/Black-Jack-Flask-game
-https://github.com/qefir/Black-Jack-Flask-game
-Entry file: Black-Jack-Flask-game/BJenv/lib/python3.4/site-packages/flask_openid.py
-Scanned: 2016-10-26 00:07:52.507948
-No vulnerabilities found.
-An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label'
-
-p00gz/OLD-flask-imdbratings-app
-https://github.com/p00gz/OLD-flask-imdbratings-app
-Entry file: OLD-flask-imdbratings-app/imdbRatings/__init__.py
-Scanned: 2016-10-26 00:07:55.904411
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lysdexia/flask-svg-barcode
-https://github.com/lysdexia/flask-svg-barcode
-Entry file: None
-Scanned: 2016-10-26 00:07:57.324881
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/lysdexia/flask-svg-barcode.
-
-Tiago-Lira/cookiecutter-flask-websocket
-https://github.com/Tiago-Lira/cookiecutter-flask-websocket
-Entry file: None
-Scanned: 2016-10-26 00:07:58.740094
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Tiago-Lira/cookiecutter-flask-websocket.
-
-davejonesbkk/flask_by_example
-https://github.com/davejonesbkk/flask_by_example
-Entry file: flask_by_example/app.py
-Scanned: 2016-10-26 00:08:03.889146
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/operator.py
-
-efrainmunoz/flask-hello-world
-https://github.com/efrainmunoz/flask-hello-world
-Entry file: None
-Scanned: 2016-10-26 00:08:04.479567
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-pankajkmrgupta/flask-video-stream
-https://github.com/pankajkmrgupta/flask-video-stream
-Entry file: flask-video-stream/app.py
-Scanned: 2016-10-26 00:08:06.283379
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-askiefer/flask-testing-2
-https://github.com/askiefer/flask-testing-2
-Entry file: flask-testing-2/party.py
-Scanned: 2016-10-26 00:08:08.084469
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-apaoing/apaoing-one-flask
-https://github.com/apaoing/apaoing-one-flask
-Entry file: apaoing-one-flask/hello.py
-Scanned: 2016-10-26 00:08:09.435053
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-njurgens/cookbook-api-flask
-https://github.com/njurgens/cookbook-api-flask
-Entry file: cookbook-api-flask/cookbook_api/app.py
-Scanned: 2016-10-26 00:08:11.354814
-No vulnerabilities found.
-
-
-jestoc01/flask-hello-world
-https://github.com/jestoc01/flask-hello-world
-Entry file: None
-Scanned: 2016-10-26 00:08:11.877066
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-responsible/Flask-Restful-Role-Auth
-https://github.com/responsible/Flask-Restful-Role-Auth
-Entry file: Flask-Restful-Role-Auth/App/__init__.py
-Scanned: 2016-10-26 00:08:13.206243
-Vulnerability 1:
-File: Flask-Restful-Role-Auth/App/__init__.py
- > User input at line 9, trigger word "SQLAlchemy":
- db = SQLAlchemy(app)
-Reassigned in:
- File: Flask-Restful-Role-Auth/App/__init__.py
- > Line 15: user_datastore = SQLAlchemyUserDatastore(db, User, Role)
- File: Flask-Restful-Role-Auth/App/__init__.py
- > Line 16: security = Security().init_app(app, user_datastore,register_blueprint=False)
-File: Flask-Restful-Role-Auth/App/__init__.py
- > reaches line 25, trigger word "execute(":
- db.engine.execute(roles_users.insert(),user_id=1, role_id=1)
-
-
-
-dyllanwli/MyFlaskProject
-https://github.com/dyllanwli/MyFlaskProject
-Entry file: MyFlaskProject/hello.py
-Scanned: 2016-10-26 00:08:14.522639
-No vulnerabilities found.
-
-
-Almazi/1.flask_hello_world
-https://github.com/Almazi/1.flask_hello_world
-Entry file: None
-Scanned: 2016-10-26 00:08:19.060641
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/Almazi/1.flask_hello_world.
-
-johnwheeler/flask-ask
-https://github.com/johnwheeler/flask-ask
-Entry file: flask-ask/samples/session/session.py
-Scanned: 2016-10-26 00:08:22.267073
-Vulnerability 1:
-File: flask-ask/samples/session/session.py
- > User input at line 39, trigger word "get(":
- color = session.attributes.get(COLOR_KEY)
-Reassigned in:
- File: flask-ask/samples/session/session.py
- > Line 42: ret_MAYBE_FUNCTION_NAME = statement(statement_text).simple_card(card_title, statement_text)
- File: flask-ask/samples/session/session.py
- > Line 45: ret_MAYBE_FUNCTION_NAME = question(question_text).reprompt(question_text).simple_card(card_title, question_text)
-File: flask-ask/samples/session/session.py
- > reaches line 41, trigger word "render_template(":
- statement_text = render_template('known_color_bye',color=color)
-
-
-
-parampara/flask
-https://github.com/parampara/flask
-Entry file: None
-Scanned: 2016-10-26 00:08:22.811614
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-maxweiber/flask
-https://github.com/maxweiber/flask
-Entry file: None
-Scanned: 2016-10-26 00:08:23.339498
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-syntaxSizer/flask
-https://github.com/syntaxSizer/flask
-Entry file: None
-Scanned: 2016-10-26 00:08:23.881442
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-gabrielecker/Flask
-https://github.com/gabrielecker/Flask
-Entry file: None
-Scanned: 2016-10-26 00:08:24.408281
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-ryanmthompson/flask
-https://github.com/ryanmthompson/flask
-Entry file: None
-Scanned: 2016-10-26 00:08:24.911699
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-miguelgrinberg/flack
-https://github.com/miguelgrinberg/flack
-Entry file: flack/flack/__init__.py
-Scanned: 2016-10-26 00:08:26.485313
-Vulnerability 1:
-File: flack/flack/api/messages.py
- > User input at line 36, trigger word "get(":
- since = int(request.args.get('updated_since', '0'))
-Reassigned in:
- File: flack/flack/api/messages.py
- > Line 40: since = day_ago
-File: flack/flack/api/messages.py
- > reaches line 41, trigger word "filter(":
- msgs = Message.query.filter(Message.updated_at > since).order_by(Message.updated_at)
-
-Vulnerability 2:
-File: flack/flack/api/users.py
- > User input at line 38, trigger word "get(":
- users = users.filter_by(online=request.args.get('online') != '0')
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
-File: flack/flack/api/users.py
- > reaches line 40, trigger word "filter(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-
-Vulnerability 3:
-File: flack/flack/api/users.py
- > User input at line 40, trigger word "get(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
- File: flack/flack/api/users.py
- > Line 38: users = users.filter_by(online=request.args.get('online') != '0')
-File: flack/flack/api/users.py
- > reaches line 40, trigger word "filter(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-
-Vulnerability 4:
-File: flack/flack/api/users.py
- > User input at line 38, trigger word "get(":
- users = users.filter_by(online=request.args.get('online') != '0')
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
-File: flack/flack/api/users.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()])
-
-Vulnerability 5:
-File: flack/flack/api/users.py
- > User input at line 40, trigger word "get(":
- users = users.filter(User.updated_at > int(request.args.get('updated_since')))
-Reassigned in:
- File: flack/flack/api/users.py
- > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc())
- File: flack/flack/api/users.py
- > Line 38: users = users.filter_by(online=request.args.get('online') != '0')
-File: flack/flack/api/users.py
- > reaches line 42, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()])
-
-
-
-TwilioDevEd/sms2fa-flask
-https://github.com/TwilioDevEd/sms2fa-flask
-Entry file: sms2fa-flask/sms2fa_flask/__init__.py
-Scanned: 2016-10-26 00:08:29.288598
-Vulnerability 1:
-File: sms2fa-flask/sms2fa_flask/views.py
- > User input at line 51, trigger word "get(":
- user = User.query.get(session.get('user_email', '')) or abort(401)
-Reassigned in:
- File: sms2fa-flask/sms2fa_flask/views.py
- > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('secret_page'))
-File: sms2fa-flask/sms2fa_flask/views.py
- > reaches line 59, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('confirmation.html',user=user)
-
-
-
-RoseOu/Flask-learning
-https://github.com/RoseOu/Flask-learning
-Entry file: None
-Scanned: 2016-10-26 00:08:29.819319
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg
-https://github.com/YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg
-Entry file: uwsgi-nginx-flask-docker-for-sinaimg/flask/app/main.py
-Scanned: 2016-10-26 00:08:31.600523
-No vulnerabilities found.
-
-
-datademofun/heroku-basic-flask
-https://github.com/datademofun/heroku-basic-flask
-Entry file: heroku-basic-flask/app.py
-Scanned: 2016-10-26 00:08:33.644797
-No vulnerabilities found.
-
-
-amey-sam/Flask-MailGun
-https://github.com/amey-sam/Flask-MailGun
-Entry file: None
-Scanned: 2016-10-26 00:08:38.165889
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun.
-
-efrainmunoz/flasktaskr
-https://github.com/efrainmunoz/flasktaskr
-Entry file: None
-Scanned: 2016-10-26 00:08:40.677028
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-DullSmile/flasky
-https://github.com/DullSmile/flasky
-Entry file: None
-Scanned: 2016-10-26 00:08:43.678052
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-andresmguk/flasktaskr
-https://github.com/andresmguk/flasktaskr
-Entry file: None
-Scanned: 2016-10-26 00:08:53.216222
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-minc-yang/flaskdemo
-https://github.com/minc-yang/flaskdemo
-Entry file: None
-Scanned: 2016-10-26 00:08:56.741432
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-yvonnendutaw/flaskbook
-https://github.com/yvonnendutaw/flaskbook
-Entry file: flaskbook/app/__init__.py
-Scanned: 2016-10-26 00:08:59.215027
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zjl1110/flaskdemo
-https://github.com/zjl1110/flaskdemo
-Entry file: None
-Scanned: 2016-10-26 00:08:59.758179
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-chestnutme/flaskie
-https://github.com/chestnutme/flaskie
-Entry file: flaskie/app/__init__.py
-Scanned: 2016-10-26 00:09:06.375724
-Vulnerability 1:
-File: flaskie/app/main/views.py
- > User input at line 18, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 29: posts = pagination.items
- File: flaskie/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskie/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 2:
-File: flaskie/app/main/views.py
- > User input at line 21, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 19: show_followed = False
- File: flaskie/app/main/views.py
- > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flaskie/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination)
-
-Vulnerability 3:
-File: flaskie/app/main/views.py
- > User input at line 36, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 37: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 39: posts = pagination.items
-File: flaskie/app/main/views.py
- > reaches line 40, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flaskie/app/main/views.py
- > User input at line 95, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 97: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1
- File: flaskie/app/main/views.py
- > Line 99: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 102: comments = pagination.items
- File: flaskie/app/main/views.py
- > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1))
-File: flaskie/app/main/views.py
- > reaches line 103, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination)
-
-Vulnerability 5:
-File: flaskie/app/main/views.py
- > User input at line 158, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 159: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flaskie/app/main/views.py
- > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flaskie/app/main/views.py
- > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flaskie/app/main/views.py
- > reaches line 164, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 6:
-File: flaskie/app/main/views.py
- > User input at line 174, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flaskie/app/main/views.py
- > Line 175: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'])
- File: flaskie/app/main/views.py
- > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flaskie/app/main/views.py
- > Line 173: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index'))
-File: flaskie/app/main/views.py
- > reaches line 179, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-fengyu225/flaskr
-https://github.com/fengyu225/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:09:06.907765
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/fengyu225/flaskr.
-
-jbussdieker/flaskr
-https://github.com/jbussdieker/flaskr
-Entry file: None
-Scanned: 2016-10-26 00:09:07.425537
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/jbussdieker/flaskr.
-
-richardqlin/flaskralchemy
-https://github.com/richardqlin/flaskralchemy
-Entry file: None
-Scanned: 2016-10-26 00:09:08.946938
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy.
-
-garaud/flask-restplus-meetup
-https://github.com/garaud/flask-restplus-meetup
-Entry file: flask-restplus-meetup/musicapp.py
-Scanned: 2016-10-26 00:09:11.400852
-No vulnerabilities found.
-
-
-ibrahimirdem/flask-numaradan-isim
-https://github.com/ibrahimirdem/flask-numaradan-isim
-Entry file: flask-numaradan-isim/app.py
-Scanned: 2016-10-26 00:09:12.799141
-Vulnerability 1:
-File: flask-numaradan-isim/app.py
- > User input at line 18, trigger word "form[":
- gelen = request.form['numara']
-Reassigned in:
- File: flask-numaradan-isim/app.py
- > Line 22: sonuc = fonksiyonlar.numara_denetim(gelen)
- File: flask-numaradan-isim/app.py
- > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home'))
- File: flask-numaradan-isim/app.py
- > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home'))
-File: flask-numaradan-isim/app.py
- > reaches line 25, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('sonuc.html',dogruluk=sonuc[0], isim=sonuc[1], id=sonuc[2])
-
-
-
-andresmguk/flasktaskr1
-https://github.com/andresmguk/flasktaskr1
-Entry file: flasktaskr1/views.py
-Scanned: 2016-10-26 00:09:15.990151
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-andresmguk/flasktaskr2
-https://github.com/andresmguk/flasktaskr2
-Entry file: flasktaskr2/views.py
-Scanned: 2016-10-26 00:09:19.313147
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-belljustin/FlaskDeploy
-https://github.com/belljustin/FlaskDeploy
-Entry file: FlaskDeploy/deploy.py
-Scanned: 2016-10-26 00:09:20.652692
-No vulnerabilities found.
-
-
-ArvidQuarshie/FlaskAuthentication
-https://github.com/ArvidQuarshie/FlaskAuthentication
-Entry file: None
-Scanned: 2016-10-26 00:09:23.549071
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/ArvidQuarshie/FlaskAuthentication.
-
-zjyExcelsior/FlaskSkeleton
-https://github.com/zjyExcelsior/FlaskSkeleton
-Entry file: FlaskSkeleton/myapp/__init__.py
-Scanned: 2016-10-26 00:09:24.884187
-No vulnerabilities found.
-
-
-er3456qi/FlaskTutorial
-https://github.com/er3456qi/FlaskTutorial
-Entry file: FlaskTutorial/flaskr.py
-Scanned: 2016-10-26 00:09:26.300329
-No vulnerabilities found.
-
-
-kelvinmuchui/flaskApp
-https://github.com/kelvinmuchui/flaskApp
-Entry file: flaskApp/app.py
-Scanned: 2016-10-26 00:09:29.510769
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ptomelle/flaskNew
-https://github.com/ptomelle/flaskNew
-Entry file: flaskNew/wsgi/myflaskapp.py
-Scanned: 2016-10-26 00:09:31.305153
-No vulnerabilities found.
-
-
-sr77/Restaurant-Web-Application
-https://github.com/sr77/Restaurant-Web-Application
-Entry file: Restaurant-Web-Application/project.py
-Scanned: 2016-10-26 00:09:32.752271
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Almazi/Flask_Project_RealPython
-https://github.com/Almazi/Flask_Project_RealPython
-Entry file: Flask_Project_RealPython/app.py
-Scanned: 2016-10-26 00:09:34.670104
-No vulnerabilities found.
-
-
-hamidfzm/Rest-in-Flask
-https://github.com/hamidfzm/Rest-in-Flask
-Entry file: Rest-in-Flask/application/__init__.py
-Scanned: 2016-10-26 00:09:36.143317
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zhujinliang/flask-based-web-framework
-https://github.com/zhujinliang/flask-based-web-framework
-Entry file: flask-based-web-framework/core/__init__.py
-Scanned: 2016-10-26 00:09:38.798631
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-lipemorais/todo-flask
-https://github.com/lipemorais/todo-flask
-Entry file: todo-flask/server.py
-Scanned: 2016-10-26 00:09:40.106621
-No vulnerabilities found.
-
-
-tonuidavies/Blog-flask
-https://github.com/tonuidavies/Blog-flask
-Entry file: None
-Scanned: 2016-10-26 00:09:48.976528
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-LpanatoPlanzi/flask-app
-https://github.com/LpanatoPlanzi/flask-app
-Entry file: flask-app/wsgi/myflaskapp.py
-Scanned: 2016-10-26 00:09:50.570046
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-ksripathi/flask-app
-https://github.com/ksripathi/flask-app
-Entry file: flask-app/apilayer.py
-Scanned: 2016-10-26 00:09:52.054956
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-maheskett/flask-testing
-https://github.com/maheskett/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-26 00:09:53.843421
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-kellyhiggins/Flask-testing
-https://github.com/kellyhiggins/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-26 00:09:55.708156
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-laurensila/flask-testing
-https://github.com/laurensila/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-26 00:09:57.473096
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-jaronoff97/Flask-Boilerplate
-https://github.com/jaronoff97/Flask-Boilerplate
-Entry file: Flask-Boilerplate/flaskapp.py
-Scanned: 2016-10-26 00:09:58.924337
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-zjl1110/flask-demo
-https://github.com/zjl1110/flask-demo
-Entry file: None
-Scanned: 2016-10-26 00:10:03.885769
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-hadesong/Flask_Issues
-https://github.com/hadesong/Flask_Issues
-Entry file: None
-Scanned: 2016-10-26 00:10:05.193312
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/hadesong/Flask_Issues.
-
-jayanth2810/Heroku_Flask
-https://github.com/jayanth2810/Heroku_Flask
-Entry file: Heroku_Flask/app/app.py
-Scanned: 2016-10-26 00:10:06.505511
-No vulnerabilities found.
-
-
-ArvidQuarshie/DiscoverFlask
-https://github.com/ArvidQuarshie/DiscoverFlask
-Entry file: None
-Scanned: 2016-10-26 00:10:10.725640
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-kosma24/labrat-flask
-https://github.com/kosma24/labrat-flask
-Entry file: labrat-flask/lab.py
-Scanned: 2016-10-26 00:10:12.544968
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-paceko/testing-flask
-https://github.com/paceko/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:10:14.431727
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-minyisme/flask-testing
-https://github.com/minyisme/flask-testing
-Entry file: flask-testing/party.py
-Scanned: 2016-10-26 00:10:16.320005
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-cristinamclarkin/Flask-testing
-https://github.com/cristinamclarkin/Flask-testing
-Entry file: Flask-testing/party.py
-Scanned: 2016-10-26 00:10:18.284386
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-sangqt/learn-flask
-https://github.com/sangqt/learn-flask
-Entry file: None
-Scanned: 2016-10-26 00:10:18.830988
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-nathanism/flask-app
-https://github.com/nathanism/flask-app
-Entry file: flask-app/app/__init__.py
-Scanned: 2016-10-26 00:10:24.111059
-No vulnerabilities found.
-
-
-iuhsihsow/hello_flask
-https://github.com/iuhsihsow/hello_flask
-Entry file: hello_flask/app/__init__.py
-Scanned: 2016-10-26 00:10:25.531939
-No vulnerabilities found.
-
-
-amsuny/flask-site
-https://github.com/amsuny/flask-site
-Entry file: flask-site/flask-site.py
-Scanned: 2016-10-26 00:10:26.858006
-No vulnerabilities found.
-
-
-bigzhao/Flask-Tasks
-https://github.com/bigzhao/Flask-Tasks
-Entry file: Flask-Tasks/flasktask/app/__init__.py
-Scanned: 2016-10-26 00:10:29.151660
-Vulnerability 1:
-File: Flask-Tasks/flasktask/app/auth/views.py
- > User input at line 124, trigger word "files[":
- file = request.files['file']
-Reassigned in:
- File: Flask-Tasks/flasktask/app/auth/views.py
- > Line 129: filename = secure_filename(file.filename)
-File: Flask-Tasks/flasktask/app/auth/views.py
- > reaches line 131, trigger word "url_for(":
- current_user.image_url = url_for('auth.static',filename='%s/%s' % ('avatar', filename))
-
-Vulnerability 2:
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_posts',page=page - 1, _external=True)
-
-Vulnerability 3:
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_posts',page=page + 1, _external=True)
-
-Vulnerability 4:
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 14: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/posts.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 5:
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > reaches line 22, trigger word "url_for(":
- prev = url_for('api.get_user_posts',page=page - 1, _external=True)
-
-Vulnerability 6:
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > reaches line 25, trigger word "url_for(":
- next = url_for('api.get_user_posts',page=page + 1, _external=True)
-
-Vulnerability 7:
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > User input at line 15, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 19: posts = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 20: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > Line 23: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/users.py
- > reaches line 26, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total)
-
-Vulnerability 8:
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > reaches line 17, trigger word "url_for(":
- prev = url_for('api.get_comments',page=page - 1, _external=True)
-
-Vulnerability 9:
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > reaches line 20, trigger word "url_for(":
- next = url_for('api.get_comments',page=page + 1, _external=True)
-
-Vulnerability 10:
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > User input at line 10, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 14: comments = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 15: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > Line 18: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/comments.py
- > reaches line 21, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total)
-
-Vulnerability 11:
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 13: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 14: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 17: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > reaches line 16, trigger word "url_for(":
- prev = url_for('api.get_tasks',page=page - 1, _external=True)
-
-Vulnerability 12:
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 13: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 14: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 17: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > reaches line 19, trigger word "url_for(":
- next = url_for('api.get_tasks',page=page + 1, _external=True)
-
-Vulnerability 13:
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > User input at line 9, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 13: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 14: prev = None
- File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > Line 17: next = None
-File: Flask-Tasks/flasktask/app/api_1_0/tasks.py
- > reaches line 20, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify('tasks''prev''next''count'[task.to_json() for task in tasks]prevnextpagination.total)
-
-Vulnerability 14:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 26, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 28: pagination = current_user.circles[-1].tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 31: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 15:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 33, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 34, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 16:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 53, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 57: pagination = c.tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 60: tasks = pagination.items
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 63, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 17:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 62, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 63, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 18:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 167, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 168, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('circle.html',new_messages=int(new_messages))
-
-Vulnerability 19:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 189, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/main/views.py
- > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.circle'))
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 190, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('create_circle.html',new_messages=int(new_messages), form=form)
-
-Vulnerability 20:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 196, trigger word "get(":
- message = request.form.get('message')
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 200, trigger word "filter(":
- c = db.session.query(Circle).filter(Circle.name.like('%' + message + '%')).all()
-
-Vulnerability 21:
-File: Flask-Tasks/flasktask/app/main/views.py
- > User input at line 202, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-File: Flask-Tasks/flasktask/app/main/views.py
- > reaches line 203, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('search_circle.html',new_messages=int(new_messages), circles=c)
-
-Vulnerability 22:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 22, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 23: pagination = current_user.circles[-1].posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 26: posts = pagination.items
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 23:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 28, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 29, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages))
-
-Vulnerability 24:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 45, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 46: pagination = c.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 49: posts = pagination.items
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 25:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 51, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id))
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 52, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages))
-
-Vulnerability 26:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 94, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 95: pagination = user.posts.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 98: posts = pagination.items
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 100: posts = []
- File: Flask-Tasks/flasktask/app/blog/views.py
- > Line 101: posts = pagination.items
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 104, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages))
-
-Vulnerability 27:
-File: Flask-Tasks/flasktask/app/blog/views.py
- > User input at line 103, trigger word "get(":
- new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8')
-File: Flask-Tasks/flasktask/app/blog/views.py
- > reaches line 104, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages))
-
-
-
-nlesc-sherlock/spark-flask
-https://github.com/nlesc-sherlock/spark-flask
-Entry file: spark-flask/app.py
-Scanned: 2016-10-26 00:10:30.566900
-No vulnerabilities found.
-
-
-linked0/first-flask
-https://github.com/linked0/first-flask
-Entry file: first-flask/main.py
-Scanned: 2016-10-26 00:10:31.881987
-No vulnerabilities found.
-
-
-mprather1/flask_hello
-https://github.com/mprather1/flask_hello
-Entry file: flask_hello/hello_world.py
-Scanned: 2016-10-26 00:10:33.193567
-No vulnerabilities found.
-
-
-9217392354A/flask-stuff
-https://github.com/9217392354A/flask-stuff
-Entry file: flask-stuff/__init__.py
-Scanned: 2016-10-26 00:10:37.211168
-No vulnerabilities found.
-
-
-M4riacg/api-flask
-https://github.com/M4riacg/api-flask
-Entry file: api-flask/api_flask.py
-Scanned: 2016-10-26 00:10:38.522176
-No vulnerabilities found.
-
-
-gpgomes/pyFlask
-https://github.com/gpgomes/pyFlask
-Entry file: pyFlask/server.py
-Scanned: 2016-10-26 00:10:39.834313
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Nana2mini/Flask-Blog
-https://github.com/Nana2mini/Flask-Blog
-Entry file: None
-Scanned: 2016-10-26 00:10:40.495536
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-dencynluv/testing-flask
-https://github.com/dencynluv/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:10:42.301526
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-efrainmunoz/flask-blog
-https://github.com/efrainmunoz/flask-blog
-Entry file: None
-Scanned: 2016-10-26 00:10:49.843646
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-BethMwangi/flask-intro
-https://github.com/BethMwangi/flask-intro
-Entry file: flask-intro/app.py
-Scanned: 2016-10-26 00:10:54.341849
-No vulnerabilities found.
-An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro/flask/lib/python2.7/sre_compile.py
-
-zjl1110/flask-blogmy
-https://github.com/zjl1110/flask-blogmy
-Entry file: None
-Scanned: 2016-10-26 00:10:58.861506
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-skrillex581/flask-insight
-https://github.com/skrillex581/flask-insight
-Entry file: flask-insight/app/__init__.py
-Scanned: 2016-10-26 00:11:00.352910
-No vulnerabilities found.
-
-
-balalay12/flask-cachlka
-https://github.com/balalay12/flask-cachlka
-Entry file: flask-cachlka/app/__init__.py
-Scanned: 2016-10-26 00:11:02.105224
-Vulnerability 1:
-File: flask-cachlka/app/views.py
- > User input at line 230, trigger word "get(":
- repeat = Repeats.query.get(int(id))
-Reassigned in:
- File: flask-cachlka/app/views.py
- > Line 231: s = Sets.query.get(repeat.set_id)
- File: flask-cachlka/app/views.py
- > Line 233: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе'))
- File: flask-cachlka/app/views.py
- > Line 235: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.'))
-File: flask-cachlka/app/views.py
- > reaches line 236, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(repeat=repeat.serialize)
-
-Vulnerability 2:
-File: flask-cachlka/app/views.py
- > User input at line 293, trigger word "get(":
- category = Categories.query.get(int(id))
-File: flask-cachlka/app/views.py
- > reaches line 294, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(exercises=[exercise.serialize for exercise in category.exercises.all()])
-
-Vulnerability 3:
-File: flask-cachlka/app/views.py
- > User input at line 312, trigger word "get(":
- body_size = BodySize.query.get(int(id))
-Reassigned in:
- File: flask-cachlka/app/views.py
- > Line 314: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе'))
- File: flask-cachlka/app/views.py
- > Line 316: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.'))
-File: flask-cachlka/app/views.py
- > reaches line 317, trigger word "jsonify(":
- ret_MAYBE_FUNCTION_NAME = jsonify(body_size=body_size.serialize)
-
-
-
-mythreyaraj/python-flask
-https://github.com/mythreyaraj/python-flask
-Entry file: python-flask/app.py
-Scanned: 2016-10-26 00:11:03.583590
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Lypzero/flask_studing
-https://github.com/Lypzero/flask_studing
-Entry file: flask_studing/app/__init__.py
-Scanned: 2016-10-26 00:11:05.172535
-Vulnerability 1:
-File: flask_studing/app/main/views.py
- > User input at line 20, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 28: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 29: posts = pagination.items
- File: flask_studing/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 2:
-File: flask_studing/app/main/views.py
- > User input at line 23, trigger word "get(":
- show_followed = bool(request.cookies.get('show_followed', ''))
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 21: show_followed = False
- File: flask_studing/app/main/views.py
- > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 30, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed)
-
-Vulnerability 3:
-File: flask_studing/app/main/views.py
- > User input at line 42, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 43: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 46: posts = pagination.items
-File: flask_studing/app/main/views.py
- > reaches line 47, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination)
-
-Vulnerability 4:
-File: flask_studing/app/main/views.py
- > User input at line 108, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 109: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 110: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items]
- File: flask_studing/app/main/views.py
- > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 111, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows)
-
-Vulnerability 5:
-File: flask_studing/app/main/views.py
- > User input at line 119, trigger word "get(":
- page = request.args.get('page', 1,type=int)
-Reassigned in:
- File: flask_studing/app/main/views.py
- > Line 120: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False)
- File: flask_studing/app/main/views.py
- > Line 123: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items]
- File: flask_studing/app/main/views.py
- > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index'))
-File: flask_studing/app/main/views.py
- > reaches line 125, trigger word "render_template(":
- ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows)
-
-
-
-dflee/testing-flask
-https://github.com/dflee/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:11:07.094088
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Ihyatt/testing-flask
-https://github.com/Ihyatt/testing-flask
-Entry file: testing-flask/party.py
-Scanned: 2016-10-26 00:11:08.888637
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-stefanbro/flask-circle
-https://github.com/stefanbro/flask-circle
-Entry file: flask-circle/app/__init__.py
-Scanned: 2016-10-26 00:11:10.693165
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-Clemenshemmerling/flask-docker
-https://github.com/Clemenshemmerling/flask-docker
-Entry file: flask-docker/app/app.py
-Scanned: 2016-10-26 00:11:12.058812
-No vulnerabilities found.
-
-
-rajatgermany/Rajat5
-https://github.com/rajatgermany/Rajat5
-Entry file: Rajat5/newforms.py
-Scanned: 2016-10-26 00:11:13.409854
-No vulnerabilities found.
-
-
-amirthn/irpycoderzz
-https://github.com/amirthn/irpycoderzz
-Entry file: irpycoderzz/app.py
-Scanned: 2016-10-26 00:11:14.712784
-No vulnerabilities found.
-
-
-chxy325/studyflask
-https://github.com/chxy325/studyflask
-Entry file: studyflask/hello.py
-Scanned: 2016-10-26 00:11:16.024243
-No vulnerabilities found.
-
-
-moling3650/microblog
-https://github.com/moling3650/microblog
-Entry file: None
-Scanned: 2016-10-26 00:11:17.555613
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/moling3650/microblog.
-
-gekorob/liebraryrest
-https://github.com/gekorob/liebraryrest
-Entry file: liebraryrest/liebraryrest/app.py
-Scanned: 2016-10-26 00:11:20.114302
-Vulnerability 1:
-File: liebraryrest/liebraryrest/api/authors.py
- > User input at line 14, trigger word "get(":
- qry = qry.filter(Author.name.contains(request.args.get('name')))
-Reassigned in:
- File: liebraryrest/liebraryrest/api/authors.py
- > Line 11: qry = Author.query
-File: liebraryrest/liebraryrest/api/authors.py
- > reaches line 14, trigger word "filter(":
- qry = qry.filter(Author.name.contains(request.args.get('name')))
-
-
-
-jlanio/Flask-RestlessLoginToken
-https://github.com/jlanio/Flask-RestlessLoginToken
-Entry file: Flask-RestlessLoginToken/models.py
-Scanned: 2016-10-26 00:11:25.446055
-No vulnerabilities found.
-
-
-vibhor1510/COMS-6156-Flask-App
-https://github.com/vibhor1510/COMS-6156-Flask-App
-Entry file: None
-Scanned: 2016-10-26 00:11:29.833980
-No vulnerabilities found.
-An Error occurred while scanning the repo: No entry path found in repo https://github.com/vibhor1510/COMS-6156-Flask-App.
-
-azedlee/flask_hello_world
-https://github.com/azedlee/flask_hello_world
-Entry file: flask_hello_world/hello_world.py
-Scanned: 2016-10-26 00:11:32.600006
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown :-(
-
-BeenzSyed/flask-random-quote
-https://github.com/BeenzSyed/flask-random-quote
-Entry file: flask-random-quote/app.py
-Scanned: 2016-10-26 00:11:33.920832
-No vulnerabilities found.
-
-
-Firdaus1/Hello_world_Flask
-https://github.com/Firdaus1/Hello_world_Flask
-Entry file: Hello_world_Flask/FirdausCS3320.py
-Scanned: 2016-10-26 00:11:35.235462
-No vulnerabilities found.
-
-
-JesseE/flask-demo-viewer
-https://github.com/JesseE/flask-demo-viewer
-Entry file: None
-Scanned: 2016-10-26 00:11:39.623371
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-katietarng/hb-testing-flask
-https://github.com/katietarng/hb-testing-flask
-Entry file: None
-Scanned: 2016-10-26 00:11:40.162192
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-HenryZivers/Flask-Microblog-App
-https://github.com/HenryZivers/Flask-Microblog-App
-Entry file: None
-Scanned: 2016-10-26 00:11:40.711889
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-stack-templates/cde-flask-init-project
-https://github.com/stack-templates/cde-flask-init-project
-Entry file: None
-Scanned: 2016-10-26 00:11:41.269722
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Skycker/lsa-flask-preview
-https://github.com/Skycker/lsa-flask-preview
-Entry file: None
-Scanned: 2016-10-26 00:11:41.808073
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-aurora71/flask-Smart-seat-realtime
-https://github.com/aurora71/flask-Smart-seat-realtime
-Entry file: None
-Scanned: 2016-10-26 00:11:42.350985
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-s4swadhin/flask-hello-world
-https://github.com/s4swadhin/flask-hello-world
-Entry file: None
-Scanned: 2016-10-26 00:11:42.881762
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-matthewR1993/flask-gant-fun
-https://github.com/matthewR1993/flask-gant-fun
-Entry file: None
-Scanned: 2016-10-26 00:11:50.456578
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-parampara/flask
-https://github.com/parampara/flask
-Entry file: None
-Scanned: 2016-10-26 00:12:00.028840
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-glrh111/flask
-https://github.com/glrh111/flask
-Entry file: None
-Scanned: 2016-10-26 00:12:01.549573
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-rakeshkirola/Flask
-https://github.com/rakeshkirola/Flask
-Entry file: None
-Scanned: 2016-10-26 00:12:03.067923
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-caibitim/Flask
-https://github.com/caibitim/Flask
-Entry file: None
-Scanned: 2016-10-26 00:12:04.598459
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-zhangsen1992/flask
-https://github.com/zhangsen1992/flask
-Entry file: None
-Scanned: 2016-10-26 00:12:06.110296
-No vulnerabilities found.
-An Error occurred while scanning the repo: Other Error Unknown while cloning :-(
-
-Mufflerman/Flask
-https://github.com/Mufflerman/Flask
-Entry file: None
-Scanned: 2016-10-26 00:12:07
\ No newline at end of file