<rule id="920220" level="15">
<if_sid>30401</if_sid>
<description>URL Encoding Abuse Attack Attempt</description>
<group>modsecurity,</group>
</rule>
<rule id="920290" level="15">
<if_sid>30401</if_sid>
<description>Empty Host Header</description>
<group>modsecurity,</group>
</rule>
<rule id="921150" level="15">
<if_sid>30401</if_sid>
<description>HTTP Header Injection Attack via payload (CR/LF deteced)</description>
<group>modsecurity,</group>
</rule>
<rule id="932115" level="15">
<if_sid>30401</if_sid>
<description>Remote Command Execution: Windows Command Injection</description>
<group>modsecurity,</group>
</rule>
<rule id="920280" level="15">
<if_sid>30401</if_sid>
<description>Request Missing a Host Header</description>
<group>modsecurity,</group>
</rule>
<rule id="941140" level="15">
<if_sid>30401</if_sid>
<description>XSS Filter - Category 4: Javascript URI Vector</description>
<group>modsecurity,</group>
</rule>
<rule id="942270" level="15">
<if_sid>30401</if_sid>
<description>Looking for basic sql injection. Common attack string for mysql, oracle and others.</description>
<group>modsecurity,</group>
</rule>
<rule id="920420" level="15">
<if_sid>30401</if_sid>
<description>Request content type is not allowed by policy</description>
<group>modsecurity,</group>
</rule>
<rule id="933150" level="15">
<if_sid>30401</if_sid>
<description>PHP Injection Attack: High-Risk PHP Function Name Found</description>
<group>modsecurity,</group>
</rule>
<rule id="932110" level="15">
<if_sid>30401</if_sid>
<description>Remote Command Execution: Windows Command Injection</description>
<group>modsecurity,</group>
</rule>
<rule id="911100" level="15">
<if_sid>30401</if_sid>
<description>Method is not allowed by policy</description>
<group>modsecurity,</group>
</rule>
<rule id="920100" level="15">
<if_sid>30401</if_sid>
<description>Invalid HTTP Request Line</description>
<group>modsecurity,</group>
</rule>
<rule id="942100" level="15">
<if_sid>30401</if_sid>
<description>SQL Injection Attack Detected via libinjection</description>
<group>modsecurity,</group>
</rule>
<rule id="920430" level="15">
<if_sid>30401</if_sid>
<description>HTTP protocol version is not allowed by policy</description>
<group>modsecurity,</group>
</rule>
<rule id="932100" level="15">
<if_sid>30401</if_sid>
<description>Remote Command Execution: Unix Command Injection</description>
<group>modsecurity,</group>
</rule>
<rule id="932105" level="15">
<if_sid>30401</if_sid>
<description>Remote Command Execution: Unix Command Injection</description>
<group>modsecurity,</group>
</rule>
<rule id="941170" level="15">
<if_sid>30401</if_sid>
<description>NoScript XSS InjectionChecker: Attribute Injection</description>
<group>modsecurity,</group>
</rule>
<rule id="941210" level="15">
<if_sid>30401</if_sid>
<description>IE XSS Filters - Attack Detected.</description>
<group>modsecurity,</group>
</rule>
<rule id="920170" level="15">
<if_sid>30401</if_sid>
<description>GET or HEAD Request with Body Content.</description>
<group>modsecurity,</group>
</rule>
<rule id="932150" level="15">
<if_sid>30401</if_sid>
<description>Remote Command Execution: Direct Unix Command Execution</description>
<group>modsecurity,</group>
</rule>
<rule id="933130" level="15">
<if_sid>30401</if_sid>
<description>PHP Injection Attack: Variables Found</description>
<group>modsecurity,</group>
</rule>
<rule id="933160" level="15">
<if_sid>30401</if_sid>
<description>PHP Injection Attack: High-Risk PHP Function Call Found</description>
<group>modsecurity,</group>
</rule>
<rule id="941180" level="15">
<if_sid>30401</if_sid>
<description>Node-Validator Blacklist Keywords</description>
<group>modsecurity,</group>
</rule>
<rule id="920270" level="15">
<if_sid>30401</if_sid>
<description>Invalid character in request (null character)</description>
<group>modsecurity,</group>
</rule>
<rule id="932160" level="15">
<if_sid>30401</if_sid>
<description>Remote Command Execution: Unix Shell Code Found</description>
<group>modsecurity,</group>
</rule>
<rule id="931110" level="15">
<if_sid>30401</if_sid>
<description>Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name</description>
<group>modsecurity,</group>
</rule>
<rule id="930100" level="15">