Security Error 011

[ Go Back ]

Total impact: 24
Affected tags: xss, csrf, id, rfe, format string

Variable: REQUEST.redirect_to | Value: http://guilanian.ir/%D9%BE%D8%A7%D9%8A%D8%AA%D8%AE%D8%AA%E2%80%8C-%D8%AC%D9%88%D8%B1%D8%A7%D8%A8-%E2%80%8C%D8%AC%D9%87%D8%A7%D9%86%E2%80%8C-%D9%83%D8%AC%D8%A7%D8%B3%D8%AA-%D8%9F/
Impact: 12 | Tags: xss, csrf, id, rfe, format string
Description: Detects halfwidth/fullwidth encoded unicode HTML breaking attempts | Tags: xss, csrf | ID: 13
Description: Detects nullbytes and other dangerous characters | Tags: id, rfe, xss | ID: 39
Description: Looking for a format string attack | Tags: format string | ID: 75

Variable: GET.redirect_to | Value: http://guilanian.ir/%D9%BE%D8%A7%D9%8A%D8%AA%D8%AE%D8%AA%E2%80%8C-%D8%AC%D9%88%D8%B1%D8%A7%D8%A8-%E2%80%8C%D8%AC%D9%87%D8%A7%D9%86%E2%80%8C-%D9%83%D8%AC%D8%A7%D8%B3%D8%AA-%D8%9F/
Impact: 12 | Tags: xss, csrf, id, rfe, format string
Description: Detects halfwidth/fullwidth encoded unicode HTML breaking attempts | Tags: xss, csrf | ID: 13
Description: Detects nullbytes and other dangerous characters | Tags: id, rfe, xss | ID: 39
Description: Looking for a format string attack | Tags: format string | ID: 75