From 102df261bb00872e70eb33dfe11d242688172ff9 Mon Sep 17 00:00:00 2001 From: Christophe Zurn Date: Wed, 10 Feb 2021 14:23:46 +0100 Subject: [PATCH] DOCS Add C# rules S5334, S6096 and Java rule S6096 to Security Engine Docs --- server/sonar-docs/src/pages/analysis/security_configuration.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/server/sonar-docs/src/pages/analysis/security_configuration.md b/server/sonar-docs/src/pages/analysis/security_configuration.md index 6af08e11e5d..5a25c237c2d 100644 --- a/server/sonar-docs/src/pages/analysis/security_configuration.md +++ b/server/sonar-docs/src/pages/analysis/security_configuration.md @@ -62,6 +62,7 @@ The `RuleKey` value can be one of the following: * [S2091](https://rules.sonarsource.com/java/RSPEC-2091): XPath Injection * [S5135](https://rules.sonarsource.com/java/RSPEC-5135): Deserialization Injection * [S5334](https://rules.sonarsource.com/java/RSPEC-5334): Code Injection + * [S6096](https://rules.sonarsource.com/java/RSPEC-6096): Zip Slip * For PHP * [S3649](https://rules.sonarsource.com/php/RSPEC-3649): SQL Injection * [S5131](https://rules.sonarsource.com/php/RSPEC-5131): XSS @@ -89,6 +90,8 @@ The `RuleKey` value can be one of the following: * [S2631](https://rules.sonarsource.com/csharp/RSPEC-2631): RegExp Injection * [S5144](https://rules.sonarsource.com/csharp/RSPEC-5144): Server-Side Request Forgery (SSRF) * [S2091](https://rules.sonarsource.com/csharp/RSPEC-2091): XPath Injection + * [S5334](https://rules.sonarsource.com/csharp/RSPEC-5334): Code Injection + * [S6096](https://rules.sonarsource.com/csharp/RSPEC-6096): Zip Slip * For Python * [S3649](https://rules.sonarsource.com/python/RSPEC-3649): SQL Injection * [S5131](https://rules.sonarsource.com/python/RSPEC-5131): XSS -- 2.39.5