SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 

owasp-modsecurity-crs-apache2 rpm build for : OpenSuSE. For other distributions click owasp-modsecurity-crs-apache2.

Name : owasp-modsecurity-crs-apache2
Version : 4.3.0 Vendor : obs://build_opensuse_org/home:cabelo:innovators
Release : 3.1 Date : 2024-06-24 06:30:59
Group : Productivity/Networking/Security Source RPM : owasp-modsecurity-crs-4.3.0-3.1.src.rpm
Size : 0.00 MB
Packager : (none)
Summary : OWASP ModSecurity Common Rule Set (CRS)
Description :
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity
or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks,
including the OWASP Top Ten, with a minimum of false alerts.

Includes Apache httpd 2.x rules

RPM found in directory: /packages/linux-pbone/ftp5.gwdg.de/pub/opensuse/repositories/home:/cabelo:/innovators/SLE_15_SP1/noarch

Content of RPM  Changelog  Provides Requires

Download
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
ftp.icm.edu.pl  owasp-modsecurity-crs-apache2-4.3.0-3.1.noarch.rpm
     

Provides :
config(owasp-modsecurity-crs-apache2)
owasp-modsecurity-crs-apache2

Requires :
apache2-mod_security2
config(owasp-modsecurity-crs-apache2) = 4.3.0-3.1
owasp-modsecurity-crs = 4.3.0
rpmlib(CompressedFileNames) <= 3.0.4-1
rpmlib(FileDigests) <= 4.6.0-1
rpmlib(PayloadFilesHavePrefix) <= 4.0-1
rpmlib(PayloadIsXz) <= 5.2-1


Content of RPM :
/etc/apache2/conf.d/owasp-modsecurity-crs.conf
/etc/owasp-modsecurity-crs
/etc/owasp-modsecurity-crs/crs-setup.conf
/etc/owasp-modsecurity-crs/rules
/etc/owasp-modsecurity-crs/rules.conf
/etc/owasp-modsecurity-crs/rules.d
/etc/owasp-modsecurity-crs/rules.d/rules.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-901-INITIALIZATION.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-913-SCANNER-DETECTION.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-921-PROTOCOL-ATTACK.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-922-MULTIPART-ATTACK.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
/etc/owasp-modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf
/etc/owasp-modsecurity-crs/rules/RESPONSE-950-DATA-LEAKAGES.conf
/etc/owasp-modsecurity-crs/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
/etc/owasp-modsecurity-crs/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
/etc/owasp-modsecurity-crs/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
/etc/owasp-modsecurity-crs/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
/etc/owasp-modsecurity-crs/rules/RESPONSE-955-WEB-SHELLS.conf
There is 2 files more in these RPM.

 
ICM