Security Error 011

[ Go Back ]

Total impact: 24
Affected tags: xss, csrf, id, rfe, format string

Variable: REQUEST.redirect_to | Value: http://guilanian.ir/%D9%85%D8%AC%D9%84%D8%B3-%D8%A8%D8%A7-%D9%82%D8%B7%D8%B9-%DB%8C%D8%A7%D8%B1%D8%A7%D9%86%D9%87%E2%80%8C%E2%80%8C%D9%87%D8%A7-%D9%85%D8%AE%D8%A7%D9%84%D9%81-%D8%A7%D8%B3%D8%AA/
Impact: 12 | Tags: xss, csrf, id, rfe, format string
Description: Detects halfwidth/fullwidth encoded unicode HTML breaking attempts | Tags: xss, csrf | ID: 13
Description: Detects nullbytes and other dangerous characters | Tags: id, rfe, xss | ID: 39
Description: Looking for a format string attack | Tags: format string | ID: 75

Variable: GET.redirect_to | Value: http://guilanian.ir/%D9%85%D8%AC%D9%84%D8%B3-%D8%A8%D8%A7-%D9%82%D8%B7%D8%B9-%DB%8C%D8%A7%D8%B1%D8%A7%D9%86%D9%87%E2%80%8C%E2%80%8C%D9%87%D8%A7-%D9%85%D8%AE%D8%A7%D9%84%D9%81-%D8%A7%D8%B3%D8%AA/
Impact: 12 | Tags: xss, csrf, id, rfe, format string
Description: Detects halfwidth/fullwidth encoded unicode HTML breaking attempts | Tags: xss, csrf | ID: 13
Description: Detects nullbytes and other dangerous characters | Tags: id, rfe, xss | ID: 39
Description: Looking for a format string attack | Tags: format string | ID: 75