A potentially dangerous Request.Form value was detected from the client (X="<?php /* SQL Kodlar&...").
Description: Request Validation has detected a potentially dangerous client input value, and processing of the request has been aborted. This value may indicate an attempt to compromise the security of your application, such as a cross-site scripting attack. To allow pages to override application request validation settings, set the requestValidationMode attribute in the httpRuntime configuration section to requestValidationMode="2.0". Example: <httpRuntime requestValidationMode="2.0" />. After setting this value, you can then disable request validation by setting validateRequest="false" in the Page directive or in the <pages> configuration section. However, it is strongly recommended that your application explicitly check all inputs in this case. For more information, seehttp://go.microsoft.com/fwlink/?LinkId=153133.
Exception Details: System.Web.HttpRequestValidationException: A potentially dangerous Request.Form value was detected from the client (X="<?php /* SQL Kodlar&...").
Source Error:
An unhandled exception was generated during the execution of the current web request. Information regarding the origin and location of the exception can be identified using the exception stack trace below.
Stack Trace:
[HttpRequestValidationException (0x80004005): A potentially dangerous Request.Form value was detected from the client (X="<?php /* SQL Kodlar&...").] System.Web.HttpRequest.ValidateString(String value, String collectionKey, RequestValidationSource requestCollection) +8730676 System.Web.HttpRequest.ValidateNameValueCollection(NameValueCollection nvc, RequestValidationSource requestCollection) +122 System.Web.HttpRequest.get_Form() +114 System.Web.HttpRequest.FillInParamsCollection() +37 System.Web.HttpRequest.GetParams() +75 System.Web.HttpRequest.get_Params() +30 ASPNetPortal.Global1.Application_BeginRequest(Object sender, EventArgs e) +2675 System.Web.SyncEventExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() +148 System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) +75
validateRequest="false" yapman lazım ama bu olay ciddi hack yöntemlerinin kapısını açar. Ben bir kaç yerde kullandım ama sayfada daha başka güvenlik önlemleri aldım. Dikkatli olmak lazım :)