Awww.savethegreatbear.org/takeittaller/detail/www.vancouversun.com/news/Part+Seven+What+supertanker+tanks/5960073/story.html/Users/jphillip/Desktop/GBRsite/www.savethegreatbear.org/takeittaller/detail/www.vancouversun.com/news/Part+Seven+What+supertanker+tanks/5960073/story.htmlwww.savethegreatbear.org/takeittaller/detail/a_double_threat/Users/jphillip/Desktop/GBRsite/www.savethegreatbear.org/takeittaller/detail/www.vancouversun.com/news/Part+Seven+What+supertanker+tanks/5960073/story.html.zxA!_d™Not Foundtext/htmlutf-8gzip;Wed, 29 Jul 2020 09:29:52 GMTPR0@A!_X  IIS 7.5 Detailed Error - 404.11 - Not Found

Internet Information Services 7.5

Error Summary

HTTP Error 404.11 - Not Found

The request filtering module is configured to deny a request that contains a double escape sequence.

Detailed Error Information
ModuleRequestFilteringModule
NotificationBeginRequest
HandlerStaticFile
Error Code0x00000000
Requested URLhttp://www.savethegreatbear.org:80/takeittaller/detail/www.vancouversun.com/news/Part+Seven+What+supertanker+tanks/5960073/story.html
Physical Path\\cluster12\Array2\E7SKMC\wwwroot\takeittaller\detail\www.vancouversun.com\news\Part+Seven+What+supertanker+tanks\5960073\story.html
Logon MethodNot yet determined
Logon UserNot yet determined
Failed Request Tracing Log Directory\\cluster12\Array2\E7SKMC\logs\failedrequest
Most likely causes:
  • The request contained a double escape sequence and request filtering is configured on the Web server to deny double escape sequences.
Things you can try:
  • Verify the configuration/system.webServer/security/[email protected] setting in the applicationhost.config or web.confg file.
Links and More Information This is a security feature. Do not change this feature unless the scope of the change is fully understood. You should take a network trace before changing this value to confirm that the request is not malicious. If double escape sequences are allowed by the server, modify the configuration/system.webServer/security/[email protected] setting. This could be caused by a malformed URL sent to the server by a malicious user.

View more information »