0 Members and 1 Guest are viewing this topic.
=== Triggered rule ===alert(url_content:"%3C"; url_content:"%2F"; url_content:"%3E"; msg:"Suspicious looking GET request containing %3C, %3E, and %2F. Suspiciously HTML-like."; reference:url,http://ha.ckers.org/xss.html; reference:url,http://en.wikipedia.org/wiki/Cross-site_scripting;)=== Request URL ===http://www.google.com/search?client=flock&channel={flock:context}&q=PHP+error%3A+Fatal+error%3C%2Fb%3E%3A+Call+to+undefined+function+ilk_resmi_al%28%29+in+%3Cb%3E%2F&ie=utf-8&oe=utf-8&aq=t
Revealing data or debugging information helps an adversary learn about the system and form a plan of attack.