We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cloudflare detects the follows rules are violated: 960024 · Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters OWASP Generic Attacks 981231 · SQL Comment Sequence Detected OWASP SQL Injection Attacks 981319 · SQL Injection Attack: SQL Operator Detected OWASP SQL Injection Attacks 981244 · Detects basic SQL authentication bypass attempts 1/3 OWASP SQL Injection Attacks 981257 · Detects MySQL comment-/space-obfuscated injections and backtick termination OWASP SQL Injection Attacks 981245 · Detects basic SQL authentication bypass attempts 2/3 OWASP SQL Injection Attacks 981240 · Detects MySQL comments, conditions and ch(a)r injections OWASP SQL Injection Attacks 981242 · Detects classic SQL injection probings 1/2 OWASP SQL Injection Attacks 981246 · Detects basic SQL authentication bypass attempts 3/3 OWASP SQL Injection Attacks 981243 · Detects classic SQL injection probings 2/2 OWASP SQL Injection Attacks 973338 · XSS Filter - Category 3: Javascript URI Vector OWASP XSS Attacks 973300 · Possible XSS Attack Detected - HTML Tag Handler OWASP XSS Attacks 973304 · XSS Attack Detected OWASP XSS Attacks 973306 · XSS Attack Detected OWASP XSS Attacks 973315 · IE XSS Filters - Attack Detected OWASP XSS Attacks 973333 · IE XSS Filters - Attack Detected OWASP XSS Attacks 973344 · IE XSS Filters - Attack Detected OWASP XSS Attacks 973332 · IE XSS Filters - Attack Detected OWASP XSS Attacks
The text was updated successfully, but these errors were encountered:
Hi @tschirmer. Thank you for your report. To speed up processing of this issue, make sure that you provided sufficient information.
Add a comment to assign the issue: @magento I am working on this
@magento I am working on this
Sorry, something went wrong.
No branches or pull requests
Preconditions (*)
Steps to reproduce (*)
Expected result (*)
Actual result (*)
Cloudflare detects the follows rules are violated:
960024 · Meta-Character Anomaly Detection Alert - Repetative Non-Word Characters OWASP Generic Attacks
981231 · SQL Comment Sequence Detected OWASP SQL Injection Attacks
981319 · SQL Injection Attack: SQL Operator Detected OWASP SQL Injection Attacks
981244 · Detects basic SQL authentication bypass attempts 1/3 OWASP SQL Injection Attacks
981257 · Detects MySQL comment-/space-obfuscated injections and backtick termination OWASP SQL Injection Attacks
981245 · Detects basic SQL authentication bypass attempts 2/3 OWASP SQL Injection Attacks
981240 · Detects MySQL comments, conditions and ch(a)r injections OWASP SQL Injection Attacks
981242 · Detects classic SQL injection probings 1/2 OWASP SQL Injection Attacks
981246 · Detects basic SQL authentication bypass attempts 3/3 OWASP SQL Injection Attacks
981243 · Detects classic SQL injection probings 2/2 OWASP SQL Injection Attacks
973338 · XSS Filter - Category 3: Javascript URI Vector OWASP XSS Attacks
973300 · Possible XSS Attack Detected - HTML Tag Handler OWASP XSS Attacks
973304 · XSS Attack Detected OWASP XSS Attacks
973306 · XSS Attack Detected OWASP XSS Attacks
973315 · IE XSS Filters - Attack Detected OWASP XSS Attacks
973333 · IE XSS Filters - Attack Detected OWASP XSS Attacks
973344 · IE XSS Filters - Attack Detected OWASP XSS Attacks
973332 · IE XSS Filters - Attack Detected OWASP XSS Attacks
The text was updated successfully, but these errors were encountered: