Skip to content

Commit c783f0e

Browse files
committed
update legacy tabs
1 parent 401a1c0 commit c783f0e

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-web-application-firewall
88
ms.topic: concept-article
9-
ms.date: 02/16/2026
9+
ms.date: 02/26/2026
1010
ms.custom: build-2025
1111

1212
# Customer intent: "As a web application security administrator, I want to manage DRS and CRS rule sets in the web application firewall, so that I can customize security settings and protect against a broad range of vulnerabilities effectively."
@@ -1177,7 +1177,7 @@ Below are previous Core Rule Set versions. If you're using CRS 3.2, CRS 3.1, CRS
11771177
|942460|Warning - 3|PL3|(Inactive rule, should be ignored) Meta-Character Anomaly Detection Alert - Repetitive Non-Word Characters|
11781178
|942490|Critical - 5|PL3|(Inactive rule, should be ignored) Detects classic SQL injection probings 3/3|
11791179

1180-
# [OWASP 3.1 (legacy)](#tab/owasp31)
1180+
# [OWASP 3.1 (support end date set)](#tab/owasp31)
11811181

11821182
## <a name="owasp31"></a> 3.1 rule sets
11831183

@@ -1437,7 +1437,7 @@ Below are previous Core Rule Set versions. If you're using CRS 3.2, CRS 3.1, CRS
14371437
|944240|Remote Command Execution: Java serialization and Log4j vulnerability ([CVE-2021-44228](https://www.cve.org/CVERecord?id=CVE-2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))|
14381438
|944250|Remote Command Execution: Suspicious Java method detected|
14391439

1440-
# [OWASP 3.0 - no longer supported](#tab/owasp30)
1440+
# [OWASP 3.0 (support end date set)](#tab/owasp30)
14411441

14421442
## <a name="owasp30"></a> 3.0 rule sets
14431443

0 commit comments

Comments
 (0)