bunkerweb_1.6.2-rc5_arm64.deb
Install the package
sudo apt-get install bunkerweb=1.6.2-rc5
BunkerWeb 1.6.2-rc5 for Debian 12
Checksums
MD5 | b04012b4d2cdf7a50b94eb6953b778df |
SHA1 | 5cf2ffb9ba69d668e02d546b2ad825479b8f3cc9 |
SHA256 | 3ea3b97c7549cc97c6a0b124efd5ea64b9762eb0b08b10f03a31d2ddbbcef63c |
SHA512 | 9cf4c9c1722c8b203d4faae01038e73d444725721800ea832092f2e56d0856af2cebc74234c8fbaa86d5eb3228a7c8493dca0448559f3e35342af1dd7f47d4f4 |
Depends
- bash, python3, procps, python3-pip, nginx (= 1.28.0-1~bookworm), libcurl4, libgeoip-dev, libxml2, libyajl2, libmagic1, net-tools, sudo, lsof, libpq5, libpcre3, libcap2-bin, logrotate, mariadb-client, postgresql-client, sqlite3, unzip, tar
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-912-DOS-PROTECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-910-IP-REPUTATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9006-XENFORO-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9005-CPANEL-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9004-DOKUWIKI-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9003-NEXTCLOUD-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/php-function-names-933151.data
Uploaded
10 days agoPackage Size
110 MBInstalled Size
338 MBDownloads
1
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/debian/bookworm/bunkerweb_1.6.2-rc5_arm64.deb/download.deb?distro_version_id=215"