Frequently Asked Questions
Logout Confirmation
Are you sure you want to logout?
Logout Confirmation
If you navigate away from this page, you will lose unsaved data. Are you sure you want to logout?
Home
Examples
Login
Address Verification
|
Promise Bridge Session
|
Simple Assessment
|
Repeating Assessment
|
Predictive Text
|
Popup
|
Exception
|
Grid
|
Form
|
Code Block
|
Session Bridge Test
Home
>
Error
Saturday 07/05/2025 03:34 AM PST
Exception Detail Viewer
======================================================================== Environment ======================================================================== Date: 7/5/2025 3:34:34 AM Server: USOLGWWXNV005 Operating System: Win32NT [v6.3.9600.0] Active Drive Size: 0 bytes Active Drive Free Space: 0 bytes Total Physical Memory: 17,179,262,976 bytes Free Physical Memory: 12,212,812,000 bytes User: dsNV_OPEWeb_UAT ======================================================================== 1) Exception: HP.USHC.Common.Tools.Exceptions.HPWebServiceException ======================================================================== Code: 0 FieldErrors: System.Collections.Generic.Dictionary`2[System.String,System.String] Id: feebbfb8725c4282b1a6673f858ed81d Message: Querystring tampering detected. TargetSite: null HelpLink: null Source: null HResult: -2146232832 Support Data: ------------------------------------------------------------------------ User Context User Authenticated: False User ID: User Password: User Profile: <UserProfile xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="1.0" xmlns="http://www.hp.com/ushc/common/schemas/1.0"><ProfileIdSpecified>false</ProfileIdSpecified><SessionId /><UserId /><DisplayName /><EmailAddress /><PhoneNumber /><InvalidChallengeAttempts>0</InvalidChallengeAttempts><IsAccountVerified>false</IsAccountVerified><IsActive>true</IsActive><IsSuperUser>false</IsSuperUser><SecurityRoles /><SecuritySettings><Passphrase /><TokenImage /><ChallengeQuestions /></SecuritySettings><Preferences><FontSize>Normal</FontSize><IsTabStopLabelsEnabled>false</IsTabStopLabelsEnabled><Locale>en-us</Locale><UseHtmlEmail>false</UseHtmlEmail></Preferences></UserProfile> ======================================================================== 2) InnerException: DotNetNuke.Services.Exceptions.PageLoadException ======================================================================== AssemblyVersion: 7.1.2 PortalID: 0 PortalName: HP Healthcare Portal UserID: -1 UserName: ActiveTabID: 54 ActiveTabName: Form RawURL: /hcp42/Examples/Form/tabid/54/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D&AspxAutoDetectCookieSupport=1 AbsoluteURL: /HCP42/Default.aspx AbsoluteURLReferrer: https://portaluat.medicaid.nv.gov/hcp42/Examples/Form/tabid/54/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D UserAgent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) DefaultDataProvider: DotNetNuke.Data.SqlDataProvider, DotNetNuke ExceptionGUID: 851de96e-8eb5-4709-9cb5-1d4b2cc952e3 FileName: null FileLineNumber: 0 FileColumnNumber: 0 Method: HP.USHC.Common.Web.UI.Modules.Base.BaseModule.OnLoad TargetSite: Void ProcessPageLoadException(System.Exception, System.String) Message: Querystring tampering detected. HelpLink: null Source: DotNetNuke HResult: -2146233088 StackTrace: ------------------------------------------------------------------------ at DotNetNuke.Services.Exceptions.Exceptions.ProcessPageLoadException(Exception exc, String URL) at System.Web.UI.Page.HandleError(Exception e) at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) at System.Web.UI.Page.ProcessRequest(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) at System.Web.UI.Page.ProcessRequest() at System.Web.UI.Page.ProcessRequest(HttpContext context) at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() at System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step) at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) ======================================================================== 3) InnerException: HP.USHC.Common.Tools.Exceptions.HPWebApplicationException ======================================================================== Id: 694ed88b0bed4b6880392ae4487e8119 Message: Querystring tampering detected. TargetSite: Void OnLoad(System.EventArgs) HelpLink: null Source: HP.USHC.Common.Web.UI HResult: -2146232832 StackTrace: ------------------------------------------------------------------------ at HP.USHC.Common.Web.UI.Modules.Base.BaseModule.OnLoad(EventArgs e) at HP.USHC.Portal.Shared.Web.UI.Modules.Base.BaseModule.OnLoad(EventArgs e) at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) Support Data: ------------------------------------------------------------------------ Server Variables ALL_HTTP: HTTP_ACCEPT:*/* HTTP_ACCEPT_ENCODING:gzip, br, zstd, deflate HTTP_COOKIE:AspxAutoDetectCookieSupport=1; .ASPXANONYMOUS=GetJGzALNXYH2cdQGnEQ3AGsFMsiT-QSPavfycXdC3DuWyV16b9kiLgTKg0amV5_FYeTux4b0Gpb4WUgzmvhlVIirVQk8c_pSUybBPphvRVGVxfbv2Uaycu9_UBBDpkasqtDtA2 HTTP_HOST:portaluat.medicaid.nv.gov HTTP_REFERER:https://portaluat.medicaid.nv.gov/hcp42/Examples/Form/tabid/54/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D HTTP_USER_AGENT:Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) HTTP_X_FORWARDED_FOR:216.73.216.51 ALL_RAW: Accept: */* Accept-Encoding: gzip, br, zstd, deflate Cookie: AspxAutoDetectCookieSupport=1; .ASPXANONYMOUS=GetJGzALNXYH2cdQGnEQ3AGsFMsiT-QSPavfycXdC3DuWyV16b9kiLgTKg0amV5_FYeTux4b0Gpb4WUgzmvhlVIirVQk8c_pSUybBPphvRVGVxfbv2Uaycu9_UBBDpkasqtDtA2 Host: portaluat.medicaid.nv.gov Referer: https://portaluat.medicaid.nv.gov/hcp42/Examples/Form/tabid/54/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) X-Forwarded-For: 216.73.216.51 APPL_MD_PATH: /LM/W3SVC/2/ROOT/HCP42 APPL_PHYSICAL_PATH: D:\Nevada\OPE\RefImpl\ AUTH_TYPE: AUTH_USER: AUTH_PASSWORD: LOGON_USER: REMOTE_USER: CERT_COOKIE: CERT_FLAGS: CERT_ISSUER: CERT_KEYSIZE: 256 CERT_SECRETKEYSIZE: 2048 CERT_SERIALNUMBER: CERT_SERVER_ISSUER: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 CERT_SERVER_SUBJECT: CN=*.medicaid.nv.gov CERT_SUBJECT: CONTENT_LENGTH: 0 CONTENT_TYPE: GATEWAY_INTERFACE: CGI/1.1 HTTPS: on HTTPS_KEYSIZE: 256 HTTPS_SECRETKEYSIZE: 2048 HTTPS_SERVER_ISSUER: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 HTTPS_SERVER_SUBJECT: CN=*.medicaid.nv.gov INSTANCE_ID: 2 INSTANCE_META_PATH: /LM/W3SVC/2 LOCAL_ADDR: 10.22.18.14 PATH_INFO: /HCP42/Default.aspx PATH_TRANSLATED: D:\Nevada\OPE\RefImpl\Default.aspx QUERY_STRING: TabId=54&p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2fOjHMVe10yR3d7XLRJhOYC8Qg0%3d&AspxAutoDetectCookieSupport=1 REMOTE_ADDR: 10.22.18.10 REMOTE_HOST: 10.22.18.10 REMOTE_PORT: 29771 REQUEST_METHOD: GET SCRIPT_NAME: /HCP42/Default.aspx SERVER_NAME: portaluat.medicaid.nv.gov SERVER_PORT: 443 SERVER_PORT_SECURE: 1 SERVER_PROTOCOL: HTTP/1.1 SERVER_SOFTWARE: Microsoft-IIS/8.5 URL: /HCP42/Default.aspx HTTP_ACCEPT: */* HTTP_ACCEPT_ENCODING: gzip, br, zstd, deflate HTTP_COOKIE: AspxAutoDetectCookieSupport=1; .ASPXANONYMOUS=GetJGzALNXYH2cdQGnEQ3AGsFMsiT-QSPavfycXdC3DuWyV16b9kiLgTKg0amV5_FYeTux4b0Gpb4WUgzmvhlVIirVQk8c_pSUybBPphvRVGVxfbv2Uaycu9_UBBDpkasqtDtA2 HTTP_HOST: portaluat.medicaid.nv.gov HTTP_REFERER: https://portaluat.medicaid.nv.gov/hcp42/Examples/Form/tabid/54/Default.aspx?p13=Y&p3=Y&p6=8yNij9UiLOdU3KiSi%2FOjHMVe10yR3d7XLRJhOYC8Qg0%3D HTTP_USER_AGENT: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) HTTP_X_FORWARDED_FOR: 216.73.216.51 Session State UserSettings: HP.USHC.Common.DataObjectsInt.PortalUserSettings 51D_Expiry_Time: 3155378975999999999 SecurityContext: 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 Request Cookie Collection AspxAutoDetectCookieSupport: 1 .ASPXANONYMOUS: GetJGzALNXYH2cdQGnEQ3AGsFMsiT-QSPavfycXdC3DuWyV16b9kiLgTKg0amV5_FYeTux4b0Gpb4WUgzmvhlVIirVQk8c_pSUybBPphvRVGVxfbv2Uaycu9_UBBDpkasqtDtA2 ASP.NET_SessionId: ikzemiqkl15c5ohsknr52cgb language: en-US Request Form Collection Empty Request Querystring Collection TabId: 54 p13: Y p3: Y p6: 8yNij9UiLOdU3KiSi/OjHMVe10yR3d7XLRJhOYC8Qg0= AspxAutoDetectCookieSupport: 1
R4.2
© 2025 Hewlett-Packard Development Company, L.P. All rights reserved. |
Privacy Notice