The request. form value is detected in the client (tbname = "'; -- <script language =" ja.
Note:The request verification process detects potentially dangerous client input values, and the processing of the request has been aborted. This value may indicate attempts to compromise application security, such as cross-site scripting attacks. By running the page command or
Set validaterequest = false in the configuration section to disable request verification. However, in this case, it is strongly recommended that the application explicitly check all input.
Exception details:System. Web. httprequestvalidationexception: a potentially dangerous request. form value is detected from the client (tbname = "'; -- <script language =" ja.
In the following code, <% @ page validaterequest = "false" Language = "C #" codebehind = "01input. aspx. CS "autoeventwireup =" false "inherits =" commandexample. login "%>Add validaterequest = "false"
Or Add the following code to the Web. config configuration file: <? XML version = "1.0"?>
<Configuration>
<System. Web>
<Compilation defaultlanguage = "C #" DEBUG = "true">
<Compilers>
<Compiler language = "C #" type = "Microsoft. CSHARP. csharpcodeprovider, system, version = 2.0.0.0, culture = neutral, publickeytoken = b77a5c561934e089 "extension = ". CS "compileroptions ="/D: Debug; trace "/> </compilers> </compilation>
<Pages validaterequest = "false" enablesessionstate = "true" enableviewstate = "true"/>
Bytes ----------------------------------------------------------------------------------------------------------------------
<Customerrors defaultredirect = "error.htm" mode = "off"/>
<Globalization fileencoding = "gb2312" requestencoding = "gb2312" responseencoding = "gb2312" Culture = "ZH-CN"/>
<Xhtmlconformance mode = "Legacy"/> </system. Web>
</Configuration>
Configure validaterequest = "false" for all pages of the website ".