https://wiki.atomicorp.com/wiki/index.php?title=WAF_340112&feed=atom&action=historyWAF 340112 - Revision history2024-03-29T08:05:39ZRevision history for this page on the wikiMediaWiki 1.20.2https://wiki.atomicorp.com/wiki/index.php?title=WAF_340112&diff=6064&oldid=prevMshinn: Created page with "{{Infobox |header1 = Rule 340112 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: cross site scripting attempt to execute Javascript ..."2020-08-24T18:46:27Z<p>Created page with "{{Infobox |header1 = Rule 340112 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: cross site scripting attempt to execute Javascript ..."</p>
<p><b>New page</b></p><div>{{Infobox<br />
|header1 = Rule 340112<br />
|label2 = Status<br />
|data2 = Active<br />
|label3 = Alert Message<br />
|data3 = Atomicorp.com WAF Rules: cross site scripting attempt to execute Javascript code<br />
}}<br />
<br />
= Description =<br />
<br />
This rule detects when a client is attempting to inject javascript via either an untrusted argument, untrusted application or both. This may be a cross site scripting attack.<br />
<br />
= Troubleshooting =<br />
<br />
== False Positives ==<br />
<br />
If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. '''Do not disable this rule.'''<br />
<br />
Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.<br />
<br />
<br />
= Additional Information =<br />
<br />
== Similar Rules ==<br />
<br />
None.<br />
<br />
== Knowledge Base Articles== <br />
<br />
None.<br />
<br />
== Outside References == <br />
<br />
None.<br />
<br />
== Notes == <br />
<br />
None.</div>Mshinn