]> source.dussan.org Git - sonarqube.git/commitdiff
DOCS Add C# rules S5334, S6096 and Java rule S6096 to Security Engine Docs
authorChristophe Zurn <christophe.zurn@sonarsource.com>
Wed, 10 Feb 2021 13:23:46 +0000 (14:23 +0100)
committersonartech <sonartech@sonarsource.com>
Wed, 10 Feb 2021 20:07:17 +0000 (20:07 +0000)
server/sonar-docs/src/pages/analysis/security_configuration.md

index 6af08e11e5d942980ccd29c9b5193060709fc9cc..5a25c237c2d5d7b645085fd241a6437d79a5297e 100644 (file)
@@ -62,6 +62,7 @@ The `RuleKey` value can be one of the following:
   * [S2091](https://rules.sonarsource.com/java/RSPEC-2091): XPath Injection
   * [S5135](https://rules.sonarsource.com/java/RSPEC-5135): Deserialization Injection
   * [S5334](https://rules.sonarsource.com/java/RSPEC-5334): Code Injection
+  * [S6096](https://rules.sonarsource.com/java/RSPEC-6096): Zip Slip
 * For PHP
   * [S3649](https://rules.sonarsource.com/php/RSPEC-3649): SQL Injection
   * [S5131](https://rules.sonarsource.com/php/RSPEC-5131): XSS
@@ -89,6 +90,8 @@ The `RuleKey` value can be one of the following:
   * [S2631](https://rules.sonarsource.com/csharp/RSPEC-2631): RegExp Injection
   * [S5144](https://rules.sonarsource.com/csharp/RSPEC-5144): Server-Side Request Forgery (SSRF)
   * [S2091](https://rules.sonarsource.com/csharp/RSPEC-2091): XPath Injection
+  * [S5334](https://rules.sonarsource.com/csharp/RSPEC-5334): Code Injection
+  * [S6096](https://rules.sonarsource.com/csharp/RSPEC-6096): Zip Slip
 * For Python
   * [S3649](https://rules.sonarsource.com/python/RSPEC-3649): SQL Injection
   * [S5131](https://rules.sonarsource.com/python/RSPEC-5131): XSS