Jump to content

raine

New Members
  • Posts

    3
  • Joined

  • Last visited

    Never

Profile Information

  • Gender
    Not Telling

raine's Achievements

Newbie

Newbie (1/5)

0

Reputation

  1. <script> tags and other URL encoded variants of it are often injected into URL POST/GET parameters to perform XSS attacks on a website. So I'm trying to come up with some counter measures.
  2. Oh, no no. My code is all in the <? php ?> tag. What I meant was I was basically tampering with my own parameters in the URL. For example, I typed http://<hostname>/page.php?param=<script> and the server gave me a 406. Actually, the string '<script' is already enough to cause the 406. I can't see how my code is giving me a 406 so I thought it might be the server's problem. Just wanted to see what others think and to see if there is a solution.
  3. I just started learning about regular expresions and was testing what I wrote to see if it was checking my parameters properly and ran into this problem. When I enter <script> as the parameter to pass, the server sends me a 406, saying that the data is not acceptible. I was wondering if this is by design, or if there is a fix for it. Thanks
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.