Security Error 011

[ Go Back ]

Total impact: 46
Affected tags: xss, csrf, id, rfe, lfi

Variable: COOKIE.handl_landing_page | Value: https://ijaazah.com/signin/v2/usernamerecovery?access_type=offline&app_domain=https://ijaazah.com&client_id=413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com&continue=https://accounts.google.com/signin/oauth/legacy/consent?authuser%3Dunknown%26part%3DAJi8hAOcwL_OOPg4ev37lsHv8huqR7_cjI1kBmQKC81V3ZLguzE9cZtGKF4Ki-sxcyBEQeghlQed6F83B_koGwubKrluTX4n1McK3ptpUj3HERiXXMsxa-z6TFhRlRYUWkalFkbIr_RvMB0v6YTa6pjeawGFnPi_z0lkp_4QzQPM4wnPdKQVH14arvH4I9W8cZ6VSzJ5XIitGQ5sXZbXLd-0kBym7v_lCB_8grFnbluNAlZXuBr84OW_qgxa78VH-mcGA9mUxEx8zqL9CgXyycvGGoWnLCfiq_JD9q8_e3OYLut9DNyirgiYkPgi9NSzxV66ysPZpMHVftmObKiS6Rtnngm9c2JclspLBIrKCcQ2_AQwE3evlay5ZJaZWIdrrmKOdxUPcLFcGBmsTitlvG2wfKtdxGVs-cv6dgn_KDbvK-avHvcF1n_-LmVADT5h5qo-flWG8RN6Lh0dNpy26l6JPXR0pl9LFg%26flowName%3DGeneralOAuthFlow%26as%3DS-1911778522%253A1714314208543115%26client_id%3D413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com%23&ddm=0&dsh=S-1911778522:1714314208543115&flowName=GeneralOAuthLite&o2v=2&opparams=%253F&prompt=select_account&rart=ANgoxcfF2uV1GhSfP_8AuzEJORSf7Y_Br7v6krt8YKlxJ_uaCqPE6W2RKXQY5Fg26feZtDaGCrtYAEbIPD_wLEqjlUB7PNbjl5yJZWk9pyXTqy3b0Ma5rko&redirect_uri=https://ijaazah.com/wp-login.php?loginSocial%3Dgoogle&response_type=code&scope=email+profile&service=lso&state=88da3478296ba8de276bafc2577f2bf1
Impact: 23 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects possible includes and typical script methods | Tags: xss, csrf, id, rfe | ID: 16
Description: Detects very basic XSS probings | Tags: xss, csrf, id, rfe | ID: 21
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61

Variable: COOKIE.handl_url | Value: https://ijaazah.com/signin/v2/usernamerecovery?access_type=offline&app_domain=https://ijaazah.com&client_id=413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com&continue=https://accounts.google.com/signin/oauth/legacy/consent?authuser%3Dunknown%26part%3DAJi8hAOcwL_OOPg4ev37lsHv8huqR7_cjI1kBmQKC81V3ZLguzE9cZtGKF4Ki-sxcyBEQeghlQed6F83B_koGwubKrluTX4n1McK3ptpUj3HERiXXMsxa-z6TFhRlRYUWkalFkbIr_RvMB0v6YTa6pjeawGFnPi_z0lkp_4QzQPM4wnPdKQVH14arvH4I9W8cZ6VSzJ5XIitGQ5sXZbXLd-0kBym7v_lCB_8grFnbluNAlZXuBr84OW_qgxa78VH-mcGA9mUxEx8zqL9CgXyycvGGoWnLCfiq_JD9q8_e3OYLut9DNyirgiYkPgi9NSzxV66ysPZpMHVftmObKiS6Rtnngm9c2JclspLBIrKCcQ2_AQwE3evlay5ZJaZWIdrrmKOdxUPcLFcGBmsTitlvG2wfKtdxGVs-cv6dgn_KDbvK-avHvcF1n_-LmVADT5h5qo-flWG8RN6Lh0dNpy26l6JPXR0pl9LFg%26flowName%3DGeneralOAuthFlow%26as%3DS-1911778522%253A1714314208543115%26client_id%3D413537724008-jifppvvakspa50thkpi47ru8vn7ktapi.apps.googleusercontent.com%23&ddm=0&dsh=S-1911778522:1714314208543115&flowName=GeneralOAuthLite&o2v=2&opparams=%253F&prompt=select_account&rart=ANgoxcfF2uV1GhSfP_8AuzEJORSf7Y_Br7v6krt8YKlxJ_uaCqPE6W2RKXQY5Fg26feZtDaGCrtYAEbIPD_wLEqjlUB7PNbjl5yJZWk9pyXTqy3b0Ma5rko&redirect_uri=https://ijaazah.com/wp-login.php?loginSocial%3Dgoogle&response_type=code&scope=email+profile&service=lso&state=88da3478296ba8de276bafc2577f2bf1
Impact: 23 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript with(), ternary operators and XML predicate attacks | Tags: xss, csrf | ID: 7
Description: Detects possible includes and typical script methods | Tags: xss, csrf, id, rfe | ID: 16
Description: Detects very basic XSS probings | Tags: xss, csrf, id, rfe | ID: 21
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61