It seems the code allows SQL injection. For example, one can insert additional SQL into the run numbers:
e.g.
http://hcalmon.cms/cgi-bin/RunInfoDiffer/viewDiffer.py?runnumber1=300363&runnumber2=300364
versus
http://hcalmon.cms/cgi-bin/RunInfoDiffer/viewDiffer.py?runnumber1=300363%20AND%20name=%27CMS.HCAL_HBHEc:CFGDOC_TXT%27&runnumber2=300364%20AND%20name=%27CMS.HCAL_HBHEc:CFGDOC_TXT%27
This example is relatively harmless, but in principle SQL injection could cause problems in the web server of the app as well as in the database backend.