Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

owasp-modsecurity-crs-base_rules-2.2.9-bp155.3.10 RPM for noarch

From OpenSuSE Leap 15.5 for noarch

Name: owasp-modsecurity-crs-base_rules Distribution: SUSE Linux Enterprise 15 SP5
Version: 2.2.9 Vendor: openSUSE
Release: bp155.3.10 Build date: Mon May 22 13:04:19 2023
Group: Productivity/Networking/Security Build host: old-cirrus2
Size: 313511 Source RPM: owasp-modsecurity-crs-2.2.9-bp155.3.10.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project
Summary: Base rules for OWASP ModSecurity CRS
Base rules for HTTP Protocol Validation, Common Web Attacks Protection, Trojan Protection, InfoLeakages, ...

Provides

Requires

License

Apache-2.0

Changelog

* Tue Dec 01 2020 pgajdos@suse.com
  - use system apache rpm macros
* Mon Jul 24 2017 bwiedemann@suse.com
  - sort conf file entries to fix build-compare (boo#1041090)
* Sun Mar 08 2015 p.drouand@gmail.com
  - Update to version 2.2.9
    * Updated the /util directory structure
    * fix 950901 - word boundary added
    * modsecurity_35_bad_robots.data - gecko/25 blocks Firefox Android
    https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/157
  - Fix SuSE > SUSE spelling
  - Use download Url as source
  - Do not explicitely depend on apache2; apache2-mod_security2
    depends on it
  - Remove redundant %clean section
  - Do not copy INSTALL file into the package
  - ChangeLog has been replaced with CHANGES in upstream
* Wed Sep 19 2012 Thomas.Worm@DATEV.de
  - Raised version to 2.2.6.
    * Resolves bnc#779076
    * Resolves CORERULES-87
* Thu Sep 06 2012 Thomas.Worm@DATEV.de
  - Package modification for factory submission:
    * Changed services to localonly mode
    * Added copyright information to spec file
* Thu Sep 06 2012 Thomas.Worm@DATEV.de
  - Added README.SuSE
* Thu Aug 30 2012 Thomas.Worm@DATEV.de
  - Initial package version 2.2.5

Files

/etc/owasp-modsecurity-crs/base_rules
/etc/owasp-modsecurity-crs/base_rules.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_20_protocol_violations.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_21_protocol_anomalies.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_23_request_limits.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_30_http_policy.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_35_bad_robots.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_40_generic_attacks.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_41_sql_injection_attacks.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_41_xss_attacks.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_42_tight_security.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_45_trojans.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_47_common_exceptions.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_49_inbound_blocking.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_50_outbound.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_59_outbound_blocking.conf
/etc/owasp-modsecurity-crs/base_rules/modsecurity_crs_60_correlation.conf
/etc/owasp-modsecurity-crs/rules.d/base_rules.conf
/usr/share/owasp-modsecurity-crs/base_rules
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_35_bad_robots.data
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_35_scanners.data
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_40_generic_attacks.data
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_50_outbound.data
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_50_outbound_malware.data
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_20_protocol_violations.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_21_protocol_anomalies.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_23_request_limits.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_30_http_policy.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_35_bad_robots.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_40_generic_attacks.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_41_sql_injection_attacks.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_41_xss_attacks.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_42_tight_security.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_45_trojans.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_47_common_exceptions.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_48_local_exceptions.conf.example
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_49_inbound_blocking.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_50_outbound.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_59_outbound_blocking.conf
/usr/share/owasp-modsecurity-crs/base_rules/modsecurity_crs_60_correlation.conf


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Apr 9 19:57:54 2024