Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

apache2-mod_security2-2.9.7-lp160.1.1 RPM for aarch64

From OpenSuSE Leap 16.0 for aarch64

Name: apache2-mod_security2 Distribution: openSUSE Leap 16.0
Version: 2.9.7 Vendor: openSUSE
Release: lp160.1.1 Build date: Tue Jun 4 14:14:51 2024
Group: Productivity/Networking/Web/Servers Build host: reproducible
Size: 3543628 Source RPM: apache2-mod_security2-2.9.7-lp160.1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.modsecurity.org/
Summary: Web Application Firewall for apache httpd
ModSecurity is an intrusion detection and prevention
engine for web applications (or a web application firewall). Operating
as an Apache Web server module or standalone, the purpose of
ModSecurity is to increase web application security, protecting web
applications from known and unknown attacks.

Provides

Requires

License

Apache-2.0

Changelog

* Tue Jun 04 2024 pgajdos@suse.com
  - %autopatch instead of %patchN
  - modified patches
    % apache2-mod_security2-no_rpath.diff (refreshed)
* Tue Jun 04 2024 Dominique Leuenberger <dimstar@opensuse.org>
  - Fix patch application syntax: Use %patch -P N instead of
    deprecated %patchN.
* Tue May 07 2024 pgajdos@suse.com
  - added patches
    fix fix build with gcc14
    + apache2-mod_security2-gcc14.patch
* Tue Feb 20 2024 Dominique Leuenberger <dimstar@opensuse.org>
  - Use %patch -P N instead of deprecated %patchN.
* Sat Jul 15 2023 Dirk Müller <dmueller@suse.com>
  - update to 2.9.7:
    * Fix: FILES_TMP_CONTENT may sometimes lack complete content
    * Support configurable limit on number of arguments processed
    * Silence compiler warning about discarded const
    * Support for JIT option for PCRE2
    * Use uid for user if apr_uid_name_get() fails
    * Fix: handle error with SecConnReadStateLimit configuration
    * Only check for pcre2 install if required
    * Adjustment of previous fix for log messages
    * Mark apache error log messages as from mod_security2
    * Use pkg-config to find libxml2 first
    * Support for PCRE2 in mlogc
    * Support for PCRE2
    * Adjust parser activation rules in modsecurity.conf-
      recommended
    * Multipart parsing fixes and new MULTIPART_PART_HEADERS
      collection
    * Limit rsub null termination to where necessary
    * IIS: Update dependencies for next planned release
    * XML parser cleanup: NULL duplicate pointer
    * Properly cleanup XML parser contexts upon completion
    * Fix memory leak in streams
    * Fix: negative usec on log line when data type long is 32b
    * mlogc log-line parsing fails due to enhanced timestamp
    * Allow no-key, single-value JSON body
    * Set SecStatusEngine Off in modsecurity.conf-recommended
    * Fix memory leak that occurs on JSON parsing error
    * Multipart names/filenames may include single quote if double-
      quote enclosed
    * Add SecRequestBodyJsonDepthLimit to modsecurity.conf-
      recommended
    * IIS: Update dependencies for Windows build as of v2.9.5
    * Support configurable limit on depth of JSON parsing
* Mon Jul 19 2021 Danilo Spinella <danilo.spinella@suse.com>
  - Update to 2.9.4:
    * Add microsec timestamp resolution to the formatted log timestamp
    * Added missing Geo Countries
    * Store temporaries in the request pool for regexes compiled per-request.
    * Fix other usage of the global pool for request temporaries in re_operators.c
    * Adds a sanity check before use ctl:ruleRemoveTargetById and ctl:ruleRemoveTargetByMsg.
    * Fix the order of error_msg validation
    * When the input filter finishes, check whether we returned data
    * fix: care non-null terminated chunk data
    * Fix for apr_global_mutex_create() crashes with mod_security
    * Fix inet addr handling on 64 bit big endian systems
  - Run spec-cleaner
  - Remove if/else for older version of SUSE distribution
* Tue Feb 23 2021 pgajdos@suse.com
  - version update to 2.9.3
    * Enable optimization for large stream input by default on IIS
    [Issue #1299 - @victorhora, @zimmerle]
    * Allow 0 length JSON requests.
    [Issue #1822 - @allanbomsft, @zimmerle, @victorhora, @marcstern]
    * Include unanmed JSON values in unnamed ARGS
    [Issue #1577, #1576 - @marcstern, @victorhora, @zimmerle]
    * Fix buffer size for utf8toUnicode transformation
    [Issue #1208 - @katef, @victorhora]
    * Fix sanitizing JSON request bodies in native audit log format
    [p0pr0ck5, @victorhora]
    * IIS: Update Wix installer to bundle a supported CRS version (3.0)
    [@victorhora, @zimmerle]
    * IIS: Update dependencies for Windows build
    [Issue #1848 - @victorhora, @hsluoyz]
    * IIS: Set SecStreamInBodyInspection by default on IIS builds (#1299)
    [Issue #1299 - @victorhora]
    * IIS: Update modsecurity.conf
    [Issue #788 - @victorhora, @brianclark]
    * Add sanity check for a couple malloc() and make code more resilient
    [Issue #979 - @dogbert2, @victorhora, @zimmerl]
    * Fix NetBSD build by renaming the hmac function to avoid conflicts
    [Issue #1241 - @victorhora, @joerg, @sevan]
    * IIS: Windows build, fix duplicate YAJL dir in script
    [Issue #1612 - @allanbomsft, @victorhora]
    * IIS: Remove body prebuffering due to no locking in modsecProcessRequest
    [Issue #1917 - @allanbomsft, @victorhora]
    * Fix mpm-itk / mod_ruid2 compatibility
    [Issue #712 - @ju5t , @derhansen, @meatlayer, @victorhora]
    * Code cosmetics: checks if actionset is not null before use it
    [Issue #1556 - @marcstern, @zimmerle, @victorhora]
    * Only generate SecHashKey when SecHashEngine is On
    [Issue #1671 - @dmuey, @monkburger, @zimmerle]
    * Docs: Reformat README to Markdown and update dependencies
    [Issue #1857 - @hsluoyz, @victorhora]
    * IIS: no lock on ProcessRequest. No reload of config.
    [Issue #1826 - @allanbomsft]
    * IIS: buffer request body before taking lock
    [Issue #1651 - @allanbomsft]
    * good practices: Initialize variables before use it
    [Issue #1889 - Marc Stern]
    * Let body parsers observe SecRequestBodyNoFilesLimit
    [Issue #1613 - @allanbomsft]
    * potential off by one in parse_arguments
    [Issue #1799 - @tinselcity, @zimmerle]
    * Fix utf-8 character encoding conversion
    [Issue #1794 - @tinselcity, @zimmerle]
    * Fix ip tree lookup on netmask content
    [Issue #1793 - @tinselcity, @zimmerle]
    * IIS: set overrideModeDefault to Allow so that individual websites can
    add <ModSecurity ...> to their web.config file
    [Issue #1781 - @default-kramer]
    * modsecurity.conf-recommended: Fix spelling
    [Issue #1721 - @padraigdoran]
    * build: fix when multiple lines for curl version
    [Issue #1771 - @Artistan]
    * Fix arabic charset in unicode_mapping file
    [Issue #1619 - @alaa-ahmed-a]
    * Optionally preallocates memory when SecStreamInBodyInspection is on
    [Issue #1366 - @allanbomsft, @zimmerle]
    * Fixed typo in build_yajl.bat
    [Issue #1366 - @allanbomsft]
    * Fixes SecConnWriteStateLimit
    [Issue #1545 - @nicjansma]
    * Added "empy chunk" check
    [Issue #1347, #1446 - @gravagli, @bostrt, @zimmerle]
    * Add capture action to @detectXSS operator
    [Issue #1488, #1482 - @victorhora]
    * Fix for wildcard operator when loading conf files on Nginx / IIS
    [Issue #1486, #1285 - @victorhora and @thierry-f-78]
    * Set of fixies to make windows build workable with the buildbots
    [Commit 94fe3 - @zimmerle]
    * Uses LOG_NO_STOPWATCH instead of DLOG_NO_STOPWATCH
    [Issue #1510 - @marcstern]
    * Adds missing headers
    [Issue #1454 - @devnexen]
  - modified patches
    % modsecurity-fixes.patch (fix crash caused by our patch)
      [bsc#1180830]
  - added patches
    + modsecurity-2.9.3-input_filtering_errors.patch
      [bsc#1180830]
* Wed Feb 12 2020 pgajdos@suse.com
  - removing %apache_test_* macros, do not test module just by
    loading the module
* Fri Dec 29 2017 jengelh@inai.de
  - Trim advertisement and filler wording from descriptions.
* Wed Dec 20 2017 pgajdos@suse.com
  - fix build for SLE_11_SP4: BuildRoot and %deffattr have to be
    present
* Mon Oct 02 2017 kstreitova@suse.com
  - update to 2.9.2
    * release notes
      https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.2
    * refresh apache2-mod_security2-no_rpath.diff
    * remove apache2-mod_security2-lua-5.3.patch that was applied
      upstream
  - remove outdated html pages and diagram (they can be accessed
    online at https://github.com/SpiderLabs/ModSecurity/wiki)
    * Reference-Manual.html.bz2
    * ModSecurity-Frequently-Asked-Questions-FAQ.html.bz2
    * modsecurity_diagram_apache_request_cycle.jpg
  - don't pack the whole doc directory as it contains also Makefiles
    or doxygen configuration files
  - disable mlogc as we don't pack it and it also can't be built for
    curl <=7.34
  - add basic and regression test suite (but disabled for now)
    * add apache2-mod_security2_tests_conf.patch for apache2
      configuration file used for tests that was trying to load
      mpm_worker_module (it's static for our apache2 package)
    * add "BuildRequires: perl-libwww-perl" needed for the test suite
* Wed Jun 21 2017 dimstar@opensuse.org
  - Update modsecurity-fixes.patch: additionally include netdb.h in
    order to have gethostbyname defined.
* Thu Mar 23 2017 kstreitova@suse.com
  - cleanup with spec-cleaner
* Wed Jul 29 2015 pgajdos@suse.com
  - fix build for lua 5.3
    + apache2-mod_security2-lua-5.3.patch
* Thu Jul 16 2015 pgajdos@suse.com
  - Requries: %{apache_suse_maintenance_mmn}
    This will pull this module to the update (in released distribution)
    when apache maintainer thinks it is good (due api/abi changes).
* Mon Mar 02 2015 tchvatal@suse.com
  - Remove useless comment lines/whitespace
* Tue Feb 24 2015 crrodriguez@opensuse.org
  - spec, build: Respect optflags
  - spec: buildrequire pkgconfig
  - modsecurity-fixes.patch: mod_security fails at:
    * building with optflags enabled due to undefined behaviour
      and implicit declarations.
    * It abuses it apr_allocator api, creating one allocator
      per request and then destroying it, flooding the system
      with mmap() , munmap requests, this is particularly nasty
      with threaded mpms. it should instead use the allocator
      from the request pool.
* Sat Feb 14 2015 thomas.worm@sicsec.de
  - Raised to version 2.9.0
  - Updated patch: apache2-mod_security2-no_rpath.diff
    (adapted lines)
* Mon Nov 03 2014 pgajdos@suse.com
  - call spec-cleaner
  - use apache rpm macros
* Wed Aug 27 2014 draht@suse.de
  - Portability: provide /etc/apache2/mod_security2.d/empty.conf
    to avoid a non-match of the file-glob in the Include statement
    from /etc/apache2/conf.d/mod_security2.conf . This restores
    the Include back from the IncludeOptional, which is not portable.
  - Source URL set to (expanded)
    https://www.modsecurity.org/tarball/2.8.0/modsecurity-2.8.0.tar.gz
* Mon Aug 25 2014 thomas.worm@sicsec.de
  - Fixed spec file to work with older distribution versions.
    Before openSuSE 13.1 aclocal doesn't work, instead autoreconf
    has to be called.
* Mon Jul 07 2014 draht@suse.de
  - last changelog does not say that
    apache2-mod_security2-libtool-fix.diff was obsoleted.
* Mon Jun 16 2014 draht@suse.de
  - BuildRequires: libtool missing
* Mon Jun 16 2014 draht@suse.de
  - apache2-mod_security2-libtool-fix.diff: initialize libtool.
* Mon Jun 16 2014 draht@suse.de
  - apache2-mod_security2-no_rpath.diff: avoid the usage of -rpath
    in autoconf m4 macros. Obsoletes patch
    modsecurity-apache_2.8.0-build_fix_pcre.diff
  - use automake for build, add autoconf and automake to
    BuildRequires:. This fix is combined with [bnc#876878].
  - turn on --enable-htaccess-config
  - use %{?_smp_mflags} for build
* Thu Jun 12 2014 draht@suse.de
  - OWASP rule set. [bnc#876878]
    new in 2.8.0 (more complete changelog to add to last changelog):
    * Connection limits (SecConnReadStateLimit/SecConnWriteStateLimit)
      now support white and suspicious list
    * New variables: FULL_REQUEST and FULL_REQUEST_LENGTH
    * GPLv2 replaced by Apache License v2
    * rules are not part of the source tarball any longer, but
      maintaned upstream externally, and included in this package.
    * documentation was externalized to a wiki. Package contains
      the FAQ and the reference manual in html form.
    * renamed the term "Encryption" in directives that actually refer
      to hashes. See CHANGES file for more details.
    * byte conversion issues on s390x when logging fixed.
    * many small issues fixed that were discovered by a Coverity scanner
    * updated reference manual
    * wrong time calculation when logging for some timezones fixed.
    * replaced time-measuring mechanism with finer granularity for
      measured request/answer phases. (Stopwatch remains for compat.)
    * cookie parser memory leak fix
    * parsing of quoted strings in multipart Content-Disposition
      headers fixed.
* Thu May 01 2014 thomas.worm@sicsec.de
  - Raised to version 2.8.0.
  - updated patches:
    * modsecurity-apache_2.8.0-build_fix_pcre.diff
    - > modsecurity-apache_2.7.7-build_fix_pcre.diff
* Sat Jan 25 2014 thomas.worm@sicsec.de
  - Raised to version 2.7.7.
    - modified patches:
    * modsecurity-apache_2.7.5-build_fix_pcre.diff,
      renamed to modsecurity-apache_2.7.7-build_fix_pcre.diff.
* Thu Jan 23 2014 aj@ajaissle.de
  - Use correct source Url
* Fri Aug 02 2013 draht@suse.de
  - complete overhaul of this package, with update to 2.7.5.
  - ruleset update to 2.2.8-0-g0f07cbb.
  - new configuration framework private to mod_security2:
    /etc/apache2/conf.d/mod_security2.conf loads
    /usr/share/apache2-mod_security2/rules/modsecurity_crs_10_setup.conf,
    then /etc/apache2/mod_security2.d/*.conf , as set up based on
    advice in /etc/apache2/conf.d/mod_security2.conf
    Your configuration starting point is
    /etc/apache2/conf.d/mod_security2.conf
  - !!! Please note that mod_unique_id is needed for mod_security2 to run!
  - modsecurity-apache_2.7.5-build_fix_pcre.diff changes erroneaous
    linker parameter, preventing rpath in shared object.
  - fixes contained for the following bugs:
    * CVE-2009-5031, CVE-2012-2751 [bnc#768293] request parameter handling
    * [bnc#768293] multi-part bypass, minor threat
    * CVE-2013-1915 [bnc#813190] XML external entity vulnerability
    * CVE-2012-4528 [bnc#789393] rule bypass
    * CVE-2013-2765 [bnc#822664] null pointer dereference crash
  - new from 2.5.9 to 2.7.5, only major changes:
    * GPLv2 replaced by Apache License v2
    * rules are not part of the source tarball any longer, but
      maintaned upstream externally, and included in this package.
    * documentation was externalized to a wiki. Package contains
      the FAQ and the reference manual in html form.
    * renamed the term "Encryption" in directives that actually refer
      to hashes. See CHANGES file for more details.
    * new directive SecXmlExternalEntity, default off
    * byte conversion issues on s390x when logging fixed.
    * many small issues fixed that were discovered by a Coverity scanner
    * updated reference manual
    * wrong time calculation when logging for some timezones fixed.
    * replaced time-measuring mechanism with finer granularity for
      measured request/answer phases. (Stopwatch remains for compat.)
    * cookie parser memory leak fix
    * parsing of quoted strings in multipart Content-Disposition
      headers fixed.
    * SDBM deadlock fix
    * @rsub memory leak fix
    * cookie separator code improvements
    * build failure fixes
    * compile time option --enable-htaccess-config (set)
* Mon Aug 27 2012 cfarrell@suse.com
  - license update: Apache-2.0 and GPL-2.0
    Many of the files in the rules/ subdirectory are GPL-2.0 licensed
* Mon Aug 06 2012 crrodriguez@opensuse.org
  - Update to version 2.6.7, fixes build in apache 2.4
  - Update spec file macros.
* Sat Sep 17 2011 jengelh@medozas.de
  - Remove redundant tags/sections from specfile
  - Use %_smp_mflags for parallel build
* Wed Jul 06 2011 draht@suse.de
  - update to version 2.6.1-rc1 for submission to SLE11-SP2 (fate#309433):
    - SecUnicodeCodePage and SecUnicodeMapFile directives added
    - fixed bug: SecRequestBodyLimit was truncating the real request
      body
    additional fixes from 2.6.0:
    - buffering filter problems fixed
    - memory leak fix when using MATCHED_VAR_NAMES
    - SecWriteStateLimit added against slow DoS
    additional fixes from 2.6.0 release candidates:
    - optimizations
    - bug in logging code fixed
    - cleanup
    - google safe browsing support
* Thu May 14 2009 mrueckert@suse.de
  - update to version 2.5.9
    - Fixed parsing multipart content with a missing part header name
      which would crash Apache.  Discovered by "Internet Security
      Auditors" (isecauditors.com).
    - Added ability to specify the config script directly using
    - -with-apr and --with-apu.
    - Added macro expansion for append/prepend action.
    - Fixed race condition in concurrent updates of persistent
      counters.  Updates are now atomic.
    - Cleaned up build, adding an option for verbose configure output
      and making the mlogc build more portable.
  - additional changes from 2.5.8
    - Fixed PDF XSS issue where a non-GET request for a PDF file
      would crash the Apache httpd process.  Discovered by Steve
      Grubb at Red Hat.
    - Removed an invalid "Internal error: Issuing "%s" for
      unspecified error." message that was logged when denying with
      nolog/noauditlog set and causing the request to be audited.
  - additional changes from 2.5.7
    - Fixed XML DTD/Schema validation which will now fail after
      request body processing errors, even if the XML parser returns
      a document tree.
    - Added ctl:forceRequestBodyVariable=on|off which, when enabled,
      will force the REQUEST_BODY variable to be set when a request
      body processor is not set.  Previously the REQUEST_BODY target
      was only populated by the URLENCODED request body processor.
    - Integrated mlogc source.
    - Fixed logging the hostname in the error_log which was logging
      the request hostname instead of the Apache resolved hostname.
    - Allow for disabling request body limit checks in phase:1.
    - Added transformations for processing parity for legacy
      protocols ported to HTTP(S): t:parityEven7bit, t:parityOdd7bit,
      t:parityZero7bit
    - Added t:cssDecode transformation to decode CSS escapes.
    - Now log XML parsing/validation warnings and errors to be in the
      debug log at levels 3 and 4, respectivly.
  - build and package mlogc
  - remove --with-apxs from the configure args as it breaks the build
    configure now finds our apxs2
* Fri Jan 23 2009 skh@suse.de
  - fix broken config [bnc#457200]
* Mon Sep 15 2008 skh@suse.de
  - update to version 2.5.6
  - initial submit to FACTORY
* Mon May 12 2008 jg@internetx.de
  -update to 2.1.7
* Sun Feb 03 2008 jg@internetx.de
  -update to 2.1.6
* Wed Aug 08 2007 mrueckert@suse.de
  - update to 2.1.2
* Mon Apr 16 2007 mrueckert@suse.de
  - update to 2.1.1
  - switched to perl based patching instead of cmdline params for make
* Fri Sep 22 2006 poeml@suse.de
  - fix build (./install was vanished)

Files

/etc/apache2/conf.d/mod_security2.conf
/etc/apache2/mod_security2.d
/etc/apache2/mod_security2.d/README-SUSE-mod_security2.txt
/etc/apache2/mod_security2.d/empty.conf
/usr/lib64/apache2/mod_security2.so
/usr/share/apache2-mod_security2
/usr/share/apache2-mod_security2/rules
/usr/share/apache2-mod_security2/rules/.github
/usr/share/apache2-mod_security2/rules/.github/ISSUE_TEMPLATE
/usr/share/apache2-mod_security2/rules/.github/ISSUE_TEMPLATE/01_false-positive.md
/usr/share/apache2-mod_security2/rules/.github/ISSUE_TEMPLATE/02_false-negative.md
/usr/share/apache2-mod_security2/rules/.github/ISSUE_TEMPLATE/03_bug-report.md
/usr/share/apache2-mod_security2/rules/.github/ISSUE_TEMPLATE/04_feature.md
/usr/share/apache2-mod_security2/rules/.github/ISSUE_TEMPLATE/config.yml
/usr/share/apache2-mod_security2/rules/.github/workflows
/usr/share/apache2-mod_security2/rules/.github/workflows/stale.yml
/usr/share/apache2-mod_security2/rules/.gitmodules
/usr/share/apache2-mod_security2/rules/.travis.yml
/usr/share/apache2-mod_security2/rules/CHANGES
/usr/share/apache2-mod_security2/rules/CONTRIBUTING.md
/usr/share/apache2-mod_security2/rules/CONTRIBUTORS.md
/usr/share/apache2-mod_security2/rules/KNOWN_BUGS
/usr/share/apache2-mod_security2/rules/SECURITY.md
/usr/share/apache2-mod_security2/rules/crs-setup.conf.example
/usr/share/apache2-mod_security2/rules/docs
/usr/share/apache2-mod_security2/rules/docs/OWASP-CRS-Documentation
/usr/share/apache2-mod_security2/rules/docs/README
/usr/share/apache2-mod_security2/rules/rules
/usr/share/apache2-mod_security2/rules/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
/usr/share/apache2-mod_security2/rules/rules/REQUEST-901-INITIALIZATION.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-903.9003-NEXTCLOUD-EXCLUSION-RULES.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-903.9004-DOKUWIKI-EXCLUSION-RULES.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-903.9005-CPANEL-EXCLUSION-RULES.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-903.9006-XENFORO-EXCLUSION-RULES.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-910-IP-REPUTATION.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-912-DOS-PROTECTION.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-913-SCANNER-DETECTION.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-921-PROTOCOL-ATTACK.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
/usr/share/apache2-mod_security2/rules/rules/REQUEST-949-BLOCKING-EVALUATION.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-950-DATA-LEAKAGES.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-980-CORRELATION.conf
/usr/share/apache2-mod_security2/rules/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example
/usr/share/apache2-mod_security2/rules/rules/crawlers-user-agents.data
/usr/share/apache2-mod_security2/rules/rules/iis-errors.data
/usr/share/apache2-mod_security2/rules/rules/java-classes.data
/usr/share/apache2-mod_security2/rules/rules/java-code-leakages.data
/usr/share/apache2-mod_security2/rules/rules/java-errors.data
/usr/share/apache2-mod_security2/rules/rules/lfi-os-files.data
/usr/share/apache2-mod_security2/rules/rules/php-config-directives.data
/usr/share/apache2-mod_security2/rules/rules/php-errors.data
/usr/share/apache2-mod_security2/rules/rules/php-function-names-933150.data
/usr/share/apache2-mod_security2/rules/rules/php-function-names-933151.data
/usr/share/apache2-mod_security2/rules/rules/php-variables.data
/usr/share/apache2-mod_security2/rules/rules/restricted-files.data
/usr/share/apache2-mod_security2/rules/rules/restricted-upload.data
/usr/share/apache2-mod_security2/rules/rules/scanners-headers.data
/usr/share/apache2-mod_security2/rules/rules/scanners-urls.data
/usr/share/apache2-mod_security2/rules/rules/scanners-user-agents.data
/usr/share/apache2-mod_security2/rules/rules/scripting-user-agents.data
/usr/share/apache2-mod_security2/rules/rules/sql-errors.data
/usr/share/apache2-mod_security2/rules/rules/unix-shell.data
/usr/share/apache2-mod_security2/rules/rules/windows-powershell-commands.data
/usr/share/apache2-mod_security2/rules/tests
/usr/share/apache2-mod_security2/rules/tests/integration
/usr/share/apache2-mod_security2/rules/tests/integration/format_tests.py
/usr/share/apache2-mod_security2/rules/tests/integration/requirements.txt
/usr/share/apache2-mod_security2/rules/tests/regression
/usr/share/apache2-mod_security2/rules/tests/regression/CRS_Tests.py
/usr/share/apache2-mod_security2/rules/tests/regression/CRS_Tests_Journal.py
/usr/share/apache2-mod_security2/rules/tests/regression/README.md
/usr/share/apache2-mod_security2/rules/tests/regression/__init__.py
/usr/share/apache2-mod_security2/rules/tests/regression/config.ini
/usr/share/apache2-mod_security2/rules/tests/regression/conftest.py
/usr/share/apache2-mod_security2/rules/tests/regression/requirements.txt
/usr/share/apache2-mod_security2/rules/tests/regression/tests
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-911-METHOD-ENFORCEMENT
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-911-METHOD-ENFORCEMENT/911100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-913-SCANNER-DETECTION
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-913-SCANNER-DETECTION/913100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-913-SCANNER-DETECTION/913110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-913-SCANNER-DETECTION/913120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920160.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920170.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920180.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920190.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920200.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920201.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920202.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920210.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920220.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920230.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920240.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920250.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920260.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920270.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920271.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920272.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920273.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920274.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920280.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920290.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920300.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920310.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920311.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920320.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920330.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920340.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920350.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920360.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920370.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920380.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920390.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920400.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920420.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920430.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920440.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920450.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920460.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920470.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920480.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920490.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920500.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921130.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921140.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921150.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921160.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921190.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-921-PROTOCOL-ATTACK/921200.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-930-APPLICATION-ATTACK-LFI
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-930-APPLICATION-ATTACK-LFI/930100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-930-APPLICATION-ATTACK-LFI/930110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-930-APPLICATION-ATTACK-LFI/930120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-931-APPLICATION-ATTACK-RFI
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-931-APPLICATION-ATTACK-RFI/931100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-931-APPLICATION-ATTACK-RFI/931110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-931-APPLICATION-ATTACK-RFI/931120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-931-APPLICATION-ATTACK-RFI/931130.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-932-APPLICATION-ATTACK-RCE
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-932-APPLICATION-ATTACK-RCE/932100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-932-APPLICATION-ATTACK-RCE/932140.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933130.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933131.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933140.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933150.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933151.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933160.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933161.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933170.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933180.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-933-APPLICATION-ATTACK-PHP/933210.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-934-APPLICATION-ATTACK-NODEJS
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-934-APPLICATION-ATTACK-NODEJS/934100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941101.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941130.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941140.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941150.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941160.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941170.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941180.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941190.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941200.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941210.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941220.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941230.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941240.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941250.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941260.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941270.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941280.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941290.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941300.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941310.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941320.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941330.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941340.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941350.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941360.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941370.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-941-APPLICATION-ATTACK-XSS/941380.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942101.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942130.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942140.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942150.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942160.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942180.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942190.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942200.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942210.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942220.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942230.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942240.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942250.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942260.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942270.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942280.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942290.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942300.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942310.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942320.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942330.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942340.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942350.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942360.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942361.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942370.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942380.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942390.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942400.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942410.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942420.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942421.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942430.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942431.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942432.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942440.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942450.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942470.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942480.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942490.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942500.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942510.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-942-APPLICATION-ATTACK-SQLI/942511.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION/943100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION/943110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION/943120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944000.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944100.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944110.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944120.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944130.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944200.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944210.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944240.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944250.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/REQUEST-944-APPLICATION-ATTACK-JAVA/944300.yaml
/usr/share/apache2-mod_security2/rules/tests/regression/tests/base_positive_rules.py
/usr/share/apache2-mod_security2/rules/tests/regression/tests/positivetest-light.yaml.skeleton
/usr/share/apache2-mod_security2/rules/tests/regression/tests/positivetest.yaml.skeleton
/usr/share/apache2-mod_security2/rules/tests/regression/utils
/usr/share/apache2-mod_security2/rules/tests/regression/utils/data
/usr/share/apache2-mod_security2/rules/tests/regression/utils/data/popularUAs.data
/usr/share/apache2-mod_security2/rules/tests/regression/utils/testSampling.py
/usr/share/apache2-mod_security2/rules/tests/regression/utils/testUserAgents.py
/usr/share/apache2-mod_security2/tools
/usr/share/apache2-mod_security2/tools/README-rules-updater.txt
/usr/share/apache2-mod_security2/tools/rules-updater-example.conf
/usr/share/apache2-mod_security2/tools/rules-updater.pl
/usr/share/doc/packages/apache2-mod_security2
/usr/share/doc/packages/apache2-mod_security2/CHANGES
/usr/share/doc/packages/apache2-mod_security2/NOTICE
/usr/share/doc/packages/apache2-mod_security2/README-SUSE-mod_security2.txt
/usr/share/doc/packages/apache2-mod_security2/README.md
/usr/share/doc/packages/apache2-mod_security2/README.txt
/usr/share/doc/packages/apache2-mod_security2/authors.txt
/usr/share/doc/packages/apache2-mod_security2/regression-tests
/usr/share/doc/packages/apache2-mod_security2/regression-tests/tests
/usr/share/doc/packages/apache2-mod_security2/regression-tests/tests/REQUEST-920-PROTOCOL-ENFORCEMENT
/usr/share/doc/packages/apache2-mod_security2/regression-tests/tests/REQUEST-920-PROTOCOL-ENFORCEMENT/920181.yaml
/usr/share/licenses/apache2-mod_security2
/usr/share/licenses/apache2-mod_security2/LICENSE


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 12 00:13:41 2024