HTTP Error 404.11 - Not Found
The request filtering module is configured to deny a request that contains a double escape sequence.
Most likely causes:
The request contained a double escape sequence and request filtering is configured on the Web server to deny double escape sequences.
Things you can try:
Verify the configuration/system.webServer/security/requestFiltering@allowDoubleEscaping setting in the applicationhost.config or web.confg file.
Detailed Error Information:
Module
RequestFilteringModule
Notification
BeginRequest
Handler
ExtensionlessUrlHandler-Integrated-4.0
Error Code
0x00000000
Requested URL
https://www.babydream.gr:443/%CE%B5%CE%B9%CE%B4%CE%B7-%CE%BC%CF%80%CE%B1%CE%BD%CE%B9%CE%BF%CF%85-%CF%86%CF%81%CE%BF%CE%BD%CF%84%CE%B9%CE%B4%CE%B1%CF%82-%CE%BA%CE%B1%CE%B9-%CF%80%CE%B1%CE%B9%CE%B4%CE%B9%CE%BA%CE%B1-%CE%B3%CE%B9%CE%BF-%CE%B3%CE%B9%CE%BF/%CF%83%CF%84%CE%BF%CE%BC%CE%B1%CF%84%CE%B9%CE%BA%CE%B7-%CE%BF%CE%B4%CE%BF%CE%BD%CF%84%CE%B9%CE%BA%CE%B7-%CF%86%CF%81%CE%BF%CE%BD%CF%84%CE%B9%CE%B4%CE%B1?katID=100252,&markaID=0&dateadded=&priceFrom=0&priceTo=0&orderBy=[prodPrice]&desc=&prodName=&prods_of_subs=True&fromRow=1&toRow=12
Physical Path
C:\inetpub\wwwroot\%CE%B5%CE%B9%CE%B4%CE%B7-%CE%BC%CF%80%CE%B1%CE%BD%CE%B9%CE%BF%CF%85-%CF%86%CF%81%CE%BF%CE%BD%CF%84%CE%B9%CE%B4%CE%B1%CF%82-%CE%BA%CE%B1%CE%B9-%CF%80%CE%B1%CE%B9%CE%B4%CE%B9%CE%BA%CE%B1-%CE%B3%CE%B9%CE%BF-%CE%B3%CE%B9%CE%BF\%CF%83%CF%84%CE%BF%CE%BC%CE%B1%CF%84%CE%B9%CE%BA%CE%B7-%CE%BF%CE%B4%CE%BF%CE%BD%CF%84%CE%B9%CE%BA%CE%B7-%CF%86%CF%81%CE%BF%CE%BD%CF%84%CE%B9%CE%B4%CE%B1
Logon Method
Not yet determined
Logon User
Not yet determined
More Information:
This is a security feature. Do not change this feature unless the scope of the change is fully understood. You should take a network trace before changing this value to confirm that the request is not malicious. If double escape sequences are allowed by the server, modify the configuration/system.webServer/security/requestFiltering@allowDoubleEscaping setting. This could be caused by a malformed URL sent to the server by a malicious user.
View more information »