modsecurity-crs 3.3.5-2 source package in Ubuntu

Changelog

modsecurity-crs (3.3.5-2) unstable; urgency=medium

  [ Debian Janitor ]
  * Apply multi-arch hints. + modsecurity-crs: Add Multi-Arch: foreign.
  * Use versioned copyright format URI.
  * Update watch file format version to 4.
  * Bump debhelper from old 12 to 13.
  * Set debhelper-compat version in Build-Depends.
  * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository-Browse.
  * debian/watch: Use GitHub /tags rather than /releases page.
  * Set upstream metadata fields: Repository, Security-Contact.
    Note: see modifications in these PR's:
    https://salsa.debian.org/modsecurity-packaging-team/modsecurity-crs/-/merge_requests/2/
    https://salsa.debian.org/modsecurity-packaging-team/modsecurity-crs/-/merge_requests/4/

 -- Ervin Hegedüs <email address hidden>  Sun, 01 Oct 2023 20:11:31 +0200

Upload details

Uploaded by:
Ervin Hegedüs
Uploaded to:
Sid
Original maintainer:
Ervin Hegedüs
Architectures:
all
Section:
httpd
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe httpd
Noble release universe httpd

Builds

Noble: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
modsecurity-crs_3.3.5-2.dsc 1.9 KiB 11ed34d73b26134c7d808117828e9a1e69e52318144e673f03dd238a34f17ba5
modsecurity-crs_3.3.5.orig.tar.gz 292.4 KiB 56696cf994e79e6d05f4f08635c7237c43c4148b8925ae8e4f5fc93ff3d66086
modsecurity-crs_3.3.5-2.debian.tar.xz 4.5 KiB ac559045475c77664d4f5cf766ab7e2aa9fb7632b5ba204acd84890b4c38a082

Available diffs

No changes file available.

Binary packages built by this source

modsecurity-crs: OWASP ModSecurity Core Rule Set

 modsecurity provides critical protections against attacks across most every
 web architecture. CRS is based on generic rules which focus on attack payload
 identification in order to provide protection from zero day and unknown
 vulnerabilities often found in web applications, which are in most cases
 custom coded.
 .
 Core Rules use the following techniques: HTTP request validation, HTTP
 protocol anomalies, Global constraints, HTTP Usage policy, Malicious client
 software detection, Generic Attack Detection (SQL injection, Cross Site
 Scripting, OS Command Injection, ColdFusion, PHP and ASP injection, etc.),
 Trojans & Backdoors Detection, Error Detection, XML Protection, Search Engine
 Monitoring.