Security Error 011

[ Go Back ]

Total impact: 46
Affected tags: xss, csrf, id, rfe, lfi

Variable: COOKIE.handl_landing_page | Value: https://ijaazah.com/signin/v2/usernamerecovery?access_type=offline&app_domain=https://ijaazah.com&client_id=413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com&continue=https://accounts.google.com/signin/oauth/legacy/consent?authuser%3Dunknown%26part%3DAJi8hAOCufPxX4CdB2RcUw-SxYOBrzEPs9bXt0KobQJ8V54JOZcbFFuO0Exi3a4sYaurgPAsUMZs8SRenjGxuno10NgeTz85MARYAZWP0KHupBY_sTpCiqlCxGFB724uAm-UZaA35WMNgisvBxg8wigw_ZSyrw0JmFtZoHoFr8-PcDtvZlB7ZkQ9CsuolixaTo9oY3JG8No37L0EyZBcgxjEa8h9Vz2Ich4_6cLszp0o9AhVLydGmXLDJWKT-6MBi3-RwiFdyLpNAuF9SA8QXYfGJx53VMrvor4nR4xJ8m-pwovqUQ51DEdPis2Lv7hrvoIqaJ1Pqq1JMgGS2jDQ0MZdCQrohI-zFQrXy0T-c_6fIyNdQmDO_NlVb4eNTa8_zonGtVEoQWoG9faf3X13sI5y7XkeF3X68QbD_Pd3Bv6Lr3d_KQPAqq1Akf7WxWyPkjECROt9cA5FpDGxR8TQuHE94rFwaGA5Gg%26flowName%3DGeneralOAuthFlow%26as%3DS-418578450%253A1714396100821021%26client_id%3D413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com%23&ddm=0&dsh=S-418578450:1714396100821021&flowName=GeneralOAuthLite&o2v=2&opparams=%253F&prompt=select_account&rart=ANgoxceYc9Gf9fcJcV2DUlcAc8mIAqLQW_kbMXEfxHz36smm5_35ecym4Lubaj9U3m0QYYkhP8dNntSTOCQThF8Ss_EmKKo9XKvxFThR-Cak3ESbMUE-Omw&redirect_uri=https://ijaazah.com/wp-login.php?loginSocial%3Dgoogle&response_type=code&scope=email+profile&service=lso&state=bd10c06b2fcb3fc5092e88016409d570
Impact: 23 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects possible includes and typical script methods | Tags: xss, csrf, id, rfe | ID: 16
Description: Detects very basic XSS probings | Tags: xss, csrf, id, rfe | ID: 21
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61

Variable: COOKIE.handl_url | Value: https://ijaazah.com/signin/v2/usernamerecovery?access_type=offline&app_domain=https://ijaazah.com&client_id=413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com&continue=https://accounts.google.com/signin/oauth/legacy/consent?authuser%3Dunknown%26part%3DAJi8hAOCufPxX4CdB2RcUw-SxYOBrzEPs9bXt0KobQJ8V54JOZcbFFuO0Exi3a4sYaurgPAsUMZs8SRenjGxuno10NgeTz85MARYAZWP0KHupBY_sTpCiqlCxGFB724uAm-UZaA35WMNgisvBxg8wigw_ZSyrw0JmFtZoHoFr8-PcDtvZlB7ZkQ9CsuolixaTo9oY3JG8No37L0EyZBcgxjEa8h9Vz2Ich4_6cLszp0o9AhVLydGmXLDJWKT-6MBi3-RwiFdyLpNAuF9SA8QXYfGJx53VMrvor4nR4xJ8m-pwovqUQ51DEdPis2Lv7hrvoIqaJ1Pqq1JMgGS2jDQ0MZdCQrohI-zFQrXy0T-c_6fIyNdQmDO_NlVb4eNTa8_zonGtVEoQWoG9faf3X13sI5y7XkeF3X68QbD_Pd3Bv6Lr3d_KQPAqq1Akf7WxWyPkjECROt9cA5FpDGxR8TQuHE94rFwaGA5Gg%26flowName%3DGeneralOAuthFlow%26as%3DS-418578450%253A1714396100821021%26client_id%3D413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com%23&ddm=0&dsh=S-418578450:1714396100821021&flowName=GeneralOAuthLite&o2v=2&opparams=%253F&prompt=select_account&rart=ANgoxceYc9Gf9fcJcV2DUlcAc8mIAqLQW_kbMXEfxHz36smm5_35ecym4Lubaj9U3m0QYYkhP8dNntSTOCQThF8Ss_EmKKo9XKvxFThR-Cak3ESbMUE-Omw&redirect_uri=https://ijaazah.com/wp-login.php?loginSocial%3Dgoogle&response_type=code&scope=email+profile&service=lso&state=bd10c06b2fcb3fc5092e88016409d570
Impact: 23 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects possible includes and typical script methods | Tags: xss, csrf, id, rfe | ID: 16
Description: Detects very basic XSS probings | Tags: xss, csrf, id, rfe | ID: 21
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61