Frequently Asked Questions
Logout Confirmation
Are you sure you want to logout?
Logout Confirmation
If you navigate away from this page, you will lose unsaved data. Are you sure you want to logout?
Home
Examples
Login
Address Verification
|
Promise Bridge Session
|
Simple Assessment
|
Repeating Assessment
|
Predictive Text
|
Popup
|
Exception
|
Grid
|
Form
|
Code Block
|
Session Bridge Test
Home
>
Error
Saturday 07/05/2025 02:30 AM PST
Exception Detail Viewer
======================================================================== Environment ======================================================================== Date: 7/5/2025 2:30:19 AM Server: USOLGWWXNV005 Operating System: Win32NT [v6.3.9600.0] Active Drive Size: 0 bytes Active Drive Free Space: 0 bytes Total Physical Memory: 17,179,262,976 bytes Free Physical Memory: 12,288,364,000 bytes User: dsNV_OPEWeb_UAT ======================================================================== 1) Exception: HP.USHC.Common.Tools.Exceptions.HPWebServiceException ======================================================================== Code: 0 FieldErrors: System.Collections.Generic.Dictionary`2[System.String,System.String] Id: 19b513600c9c4510b2800f5bf5c0071b Message: Querystring tampering detected. TargetSite: null HelpLink: null Source: null HResult: -2146232832 Support Data: ------------------------------------------------------------------------ User Context User Authenticated: False User ID: User Password: User Profile: <UserProfile xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="1.0" xmlns="http://www.hp.com/ushc/common/schemas/1.0"><ProfileIdSpecified>false</ProfileIdSpecified><SessionId /><UserId /><DisplayName /><EmailAddress /><PhoneNumber /><InvalidChallengeAttempts>0</InvalidChallengeAttempts><IsAccountVerified>false</IsAccountVerified><IsActive>true</IsActive><IsSuperUser>false</IsSuperUser><SecurityRoles /><SecuritySettings><Passphrase /><TokenImage /><ChallengeQuestions /></SecuritySettings><Preferences><FontSize>Normal</FontSize><IsTabStopLabelsEnabled>false</IsTabStopLabelsEnabled><Locale>en-us</Locale><UseHtmlEmail>false</UseHtmlEmail></Preferences></UserProfile> ======================================================================== 2) InnerException: DotNetNuke.Services.Exceptions.PageLoadException ======================================================================== AssemblyVersion: 7.1.2 PortalID: 0 PortalName: HP Healthcare Portal UserID: -1 UserName: ActiveTabID: 850 ActiveTabName: Address Verification RawURL: /hcp42/Examples/AddressVerification/tabid/850/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D&AspxAutoDetectCookieSupport=1 AbsoluteURL: /HCP42/Default.aspx AbsoluteURLReferrer: https://portaluat.medicaid.nv.gov/hcp42/Examples/AddressVerification/tabid/850/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D UserAgent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) DefaultDataProvider: DotNetNuke.Data.SqlDataProvider, DotNetNuke ExceptionGUID: a412c308-ad34-4243-9fe6-53b0506c1fa0 FileName: null FileLineNumber: 0 FileColumnNumber: 0 Method: HP.USHC.Common.Web.UI.Modules.Base.BaseModule.OnLoad TargetSite: Void ProcessPageLoadException(System.Exception, System.String) Message: Querystring tampering detected. HelpLink: null Source: DotNetNuke HResult: -2146233088 StackTrace: ------------------------------------------------------------------------ at DotNetNuke.Services.Exceptions.Exceptions.ProcessPageLoadException(Exception exc, String URL) at System.Web.UI.Page.HandleError(Exception e) at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) at System.Web.UI.Page.ProcessRequest(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) at System.Web.UI.Page.ProcessRequest() at System.Web.UI.Page.ProcessRequest(HttpContext context) at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() at System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step) at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) ======================================================================== 3) InnerException: HP.USHC.Common.Tools.Exceptions.HPWebApplicationException ======================================================================== Id: cc643348eaaa42ad8eaab2d5a540fd7f Message: Querystring tampering detected. TargetSite: Void OnLoad(System.EventArgs) HelpLink: null Source: HP.USHC.Common.Web.UI HResult: -2146232832 StackTrace: ------------------------------------------------------------------------ at HP.USHC.Common.Web.UI.Modules.Base.BaseModule.OnLoad(EventArgs e) at HP.USHC.Portal.Shared.Web.UI.Modules.Base.BaseModule.OnLoad(EventArgs e) at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) Support Data: ------------------------------------------------------------------------ Server Variables ALL_HTTP: HTTP_ACCEPT:*/* HTTP_ACCEPT_ENCODING:gzip, br, zstd, deflate HTTP_COOKIE:AspxAutoDetectCookieSupport=1; .ASPXANONYMOUS=BA8Jw2SQv4ArtWMNEcKhh_MQxpsZ7tWL2oT6hAg_9rjO8Y7V5HeCc2fYmJ78STHQYYjVL3lrt8C5O4KsBRWpul75UkoJrfkG8K-PVzC6-JFVCyBJVWjEWgtxO1YMjLcMM09oig2 HTTP_HOST:portaluat.medicaid.nv.gov HTTP_REFERER:https://portaluat.medicaid.nv.gov/hcp42/Examples/AddressVerification/tabid/850/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D HTTP_USER_AGENT:Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) HTTP_X_FORWARDED_FOR:216.73.216.51 ALL_RAW: Accept: */* Accept-Encoding: gzip, br, zstd, deflate Cookie: AspxAutoDetectCookieSupport=1; .ASPXANONYMOUS=BA8Jw2SQv4ArtWMNEcKhh_MQxpsZ7tWL2oT6hAg_9rjO8Y7V5HeCc2fYmJ78STHQYYjVL3lrt8C5O4KsBRWpul75UkoJrfkG8K-PVzC6-JFVCyBJVWjEWgtxO1YMjLcMM09oig2 Host: portaluat.medicaid.nv.gov Referer: https://portaluat.medicaid.nv.gov/hcp42/Examples/AddressVerification/tabid/850/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) X-Forwarded-For: 216.73.216.51 APPL_MD_PATH: /LM/W3SVC/2/ROOT/HCP42 APPL_PHYSICAL_PATH: D:\Nevada\OPE\RefImpl\ AUTH_TYPE: AUTH_USER: AUTH_PASSWORD: LOGON_USER: REMOTE_USER: CERT_COOKIE: CERT_FLAGS: CERT_ISSUER: CERT_KEYSIZE: 256 CERT_SECRETKEYSIZE: 2048 CERT_SERIALNUMBER: CERT_SERVER_ISSUER: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 CERT_SERVER_SUBJECT: CN=*.medicaid.nv.gov CERT_SUBJECT: CONTENT_LENGTH: 0 CONTENT_TYPE: GATEWAY_INTERFACE: CGI/1.1 HTTPS: on HTTPS_KEYSIZE: 256 HTTPS_SECRETKEYSIZE: 2048 HTTPS_SERVER_ISSUER: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 HTTPS_SERVER_SUBJECT: CN=*.medicaid.nv.gov INSTANCE_ID: 2 INSTANCE_META_PATH: /LM/W3SVC/2 LOCAL_ADDR: 10.22.18.14 PATH_INFO: /HCP42/Default.aspx PATH_TRANSLATED: D:\Nevada\OPE\RefImpl\Default.aspx QUERY_STRING: TabId=850&p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2fOjHMVe10yR3d7XLRJhOYC8Qg0%3d&AspxAutoDetectCookieSupport=1 REMOTE_ADDR: 10.22.18.10 REMOTE_HOST: 10.22.18.10 REMOTE_PORT: 5682 REQUEST_METHOD: GET SCRIPT_NAME: /HCP42/Default.aspx SERVER_NAME: portaluat.medicaid.nv.gov SERVER_PORT: 443 SERVER_PORT_SECURE: 1 SERVER_PROTOCOL: HTTP/1.1 SERVER_SOFTWARE: Microsoft-IIS/8.5 URL: /HCP42/Default.aspx HTTP_ACCEPT: */* HTTP_ACCEPT_ENCODING: gzip, br, zstd, deflate HTTP_COOKIE: AspxAutoDetectCookieSupport=1; .ASPXANONYMOUS=BA8Jw2SQv4ArtWMNEcKhh_MQxpsZ7tWL2oT6hAg_9rjO8Y7V5HeCc2fYmJ78STHQYYjVL3lrt8C5O4KsBRWpul75UkoJrfkG8K-PVzC6-JFVCyBJVWjEWgtxO1YMjLcMM09oig2 HTTP_HOST: portaluat.medicaid.nv.gov HTTP_REFERER: https://portaluat.medicaid.nv.gov/hcp42/Examples/AddressVerification/tabid/850/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D HTTP_USER_AGENT: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) HTTP_X_FORWARDED_FOR: 216.73.216.51 Session State UserSettings: HP.USHC.Common.DataObjectsInt.PortalUserSettings 51D_Expiry_Time: 3155378975999999999 SecurityContext: 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 Request Cookie Collection AspxAutoDetectCookieSupport: 1 .ASPXANONYMOUS: BA8Jw2SQv4ArtWMNEcKhh_MQxpsZ7tWL2oT6hAg_9rjO8Y7V5HeCc2fYmJ78STHQYYjVL3lrt8C5O4KsBRWpul75UkoJrfkG8K-PVzC6-JFVCyBJVWjEWgtxO1YMjLcMM09oig2 ASP.NET_SessionId: okh23erqducmr4bfissnfcd3 language: en-US Request Form Collection Empty Request Querystring Collection TabId: 850 p13: Y p3: Y p6: 8yNij9UiLOdU3KiSi/OjHMVe10yR3d7XLRJhOYC8Qg0= AspxAutoDetectCookieSupport: 1
R4.2
© 2025 Hewlett-Packard Development Company, L.P. All rights reserved. |
Privacy Notice