SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 

apache-mod_security-crs rpm build for : Mageia Cauldron. For other distributions click apache-mod_security-crs.

Name : apache-mod_security-crs
Version : 3.3.5 Vendor : Mageia_Org
Release : 1.mga10 Date : 2024-03-15 11:42:13
Group : System/Servers Source RPM : apache-mod_security-crs-3.3.5-1.mga10.src.rpm
Size : 0.71 MB
Packager : ns80 < ns80>
Summary : Core Rules for mod_security
Description :
This package provides the rules for mod_security.

RPM found in directory: /vol/rzm3/linux-mageia/distrib/cauldron/x86_64/media/core/release

Content of RPM  Changelog  Provides Requires

Download
ftp.icm.edu.pl  apache-mod_security-crs-3.3.5-1.mga10.noarch.rpm
ftp.icm.edu.pl  apache-mod_security-crs-3.3.5-1.mga10.noarch.rpm
ftp.icm.edu.pl  apache-mod_security-crs-3.3.5-1.mga10.noarch.rpm
ftp.icm.edu.pl  apache-mod_security-crs-3.3.5-1.mga10.noarch.rpm
     

Provides :
apache-mod_security-crs
config(apache-mod_security-crs)

Requires :
apache-mod_security >= 2.9.6
config(apache-mod_security-crs) = 3.3.5-1.mga10
rpmlib(CompressedFileNames) <= 3.0.4-1
rpmlib(FileDigests) <= 4.6.0-1
rpmlib(PayloadFilesHavePrefix) <= 4.0-1
rpmlib(PayloadIsZstd) <= 5.4.18-1


Content of RPM :
/etc/httpd/conf/modsecurity.d/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
/etc/httpd/conf/modsecurity.d/REQUEST-901-INITIALIZATION.conf
/etc/httpd/conf/modsecurity.d/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
/etc/httpd/conf/modsecurity.d/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
/etc/httpd/conf/modsecurity.d/REQUEST-903.9003-NEXTCLOUD-EXCLUSION-RULES.conf
/etc/httpd/conf/modsecurity.d/REQUEST-903.9004-DOKUWIKI-EXCLUSION-RULES.conf
/etc/httpd/conf/modsecurity.d/REQUEST-903.9005-CPANEL-EXCLUSION-RULES.conf
/etc/httpd/conf/modsecurity.d/REQUEST-903.9006-XENFORO-EXCLUSION-RULES.conf
/etc/httpd/conf/modsecurity.d/REQUEST-905-COMMON-EXCEPTIONS.conf
/etc/httpd/conf/modsecurity.d/REQUEST-910-IP-REPUTATION.conf
/etc/httpd/conf/modsecurity.d/REQUEST-911-METHOD-ENFORCEMENT.conf
/etc/httpd/conf/modsecurity.d/REQUEST-912-DOS-PROTECTION.conf
/etc/httpd/conf/modsecurity.d/REQUEST-913-SCANNER-DETECTION.conf
/etc/httpd/conf/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
/etc/httpd/conf/modsecurity.d/REQUEST-921-PROTOCOL-ATTACK.conf
/etc/httpd/conf/modsecurity.d/REQUEST-922-MULTIPART-ATTACK.conf
/etc/httpd/conf/modsecurity.d/REQUEST-930-APPLICATION-ATTACK-LFI.conf
/etc/httpd/conf/modsecurity.d/REQUEST-931-APPLICATION-ATTACK-RFI.conf
/etc/httpd/conf/modsecurity.d/REQUEST-932-APPLICATION-ATTACK-RCE.conf
/etc/httpd/conf/modsecurity.d/REQUEST-933-APPLICATION-ATTACK-PHP.conf
/etc/httpd/conf/modsecurity.d/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf
/etc/httpd/conf/modsecurity.d/REQUEST-941-APPLICATION-ATTACK-XSS.conf
/etc/httpd/conf/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
/etc/httpd/conf/modsecurity.d/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
/etc/httpd/conf/modsecurity.d/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
/etc/httpd/conf/modsecurity.d/REQUEST-949-BLOCKING-EVALUATION.conf
/etc/httpd/conf/modsecurity.d/RESPONSE-950-DATA-LEAKAGES.conf
/etc/httpd/conf/modsecurity.d/RESPONSE-951-DATA-LEAKAGES-SQL.conf
/etc/httpd/conf/modsecurity.d/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
/etc/httpd/conf/modsecurity.d/RESPONSE-953-DATA-LEAKAGES-PHP.conf
There is 90 files more in these RPM.

 
ICM