@@ -111,7 +111,7 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
111
111
| ** [ APPLICATION-ATTACK-RFI] ( #drs931-10 ) ** | Protection against remote file inclusion attacks|
112
112
| ** [ APPLICATION-ATTACK-RCE] ( #drs932-10 ) ** | Protection against remote command execution|
113
113
| ** [ APPLICATION-ATTACK-PHP] ( #drs933-10 ) ** | Protect against PHP-injection attacks|
114
- | ** [ CROSS-SITE-SCRIPTING ] ( #drs941-10 ) ** | XSS - Cross -site Scripting |
114
+ | ** [ APPLICATION-ATTACK-XSS ] ( #drs941-10 ) ** | Protect against cross -site scripting attacks |
115
115
| ** [ APPLICATION-ATTACK-SQLI] ( #drs942-10 ) ** | Protect against SQL-injection attacks|
116
116
| ** [ APPLICATION-ATTACK-SESSION-FIXATION] ( #drs943-10 ) ** | Protect against session-fixation attacks|
117
117
| ** [ APPLICATION-ATTACK-SESSION-JAVA] ( #drs944-10 ) ** | Protect against JAVA attacks|
@@ -238,12 +238,10 @@ Front Door.
238
238
| 933110| PHP Injection Attack: PHP Script File Upload Found|
239
239
| 933120| PHP Injection Attack: Configuration Directive Found|
240
240
| 933130| PHP Injection Attack: Variables Found|
241
- | 933131| PHP Injection Attack: Variables Found|
242
241
| 933140| PHP Injection Attack: I/O Stream Found|
243
242
| 933150| PHP Injection Attack: High-Risk PHP Function Name Found|
244
243
| 933151| PHP Injection Attack: Medium-Risk PHP Function Name Found|
245
244
| 933160| PHP Injection Attack: High-Risk PHP Function Call Found|
246
- | 933161| PHP Injection Attack: Low-Value PHP Function Call Found|
247
245
| 933170| PHP Injection Attack: Serialized Object Injection|
248
246
| 933180| PHP Injection Attack: Variable Function Call Found|
249
247
| 933200| PHP Injection Attack: Wrapper scheme detected|
@@ -622,12 +620,10 @@ Front Door.
622
620
| 933110| PHP Injection Attack: PHP Script File Upload Found|
623
621
| 933120| PHP Injection Attack: Configuration Directive Found|
624
622
| 933130| PHP Injection Attack: Variables Found|
625
- | 933131| PHP Injection Attack: Variables Found|
626
623
| 933140| PHP Injection Attack: I/O Stream Found|
627
624
| 933150| PHP Injection Attack: High-Risk PHP Function Name Found|
628
625
| 933151| PHP Injection Attack: Medium-Risk PHP Function Name Found|
629
626
| 933160| PHP Injection Attack: High-Risk PHP Function Call Found|
630
- | 933161| PHP Injection Attack: Low-Value PHP Function Call Found|
631
627
| 933170| PHP Injection Attack: Serialized Object Injection|
632
628
| 933180| PHP Injection Attack: Variable Function Call Found|
633
629
0 commit comments