bunkerweb-1.6.6_rc3-1.aarch64.rpm
Install the package
sudo yum install bunkerweb-1.6.6_rc3-1.aarch64
BunkerWeb 1.6.6-rc3 for RHEL 10
Checksums
| MD5 | 6e254a49ffa7b8d9e04087fa3076b501 |
| SHA1 | 80f43ae6b59a444b898a310b24674b1436128b75 |
| SHA256 | be463d5981aa616b0fc5abdd96c00cd09bd765e42f23ce10ac84e25f68ab1767 |
| SHA512 | c1dbe5c8313d83e073aa688cb2cfd257d4a347a9726bdd9bf8d7494b4b0850eae719e445bf1e8d52c39db18f8434b551d6e7315325b1f2bfb7b6394c2e4b403c |
Requires
- /bin/sh
- /bin/sh
- bash
- file-libs
- gd
- libcap
- libcurl-devel
- libmaxminddb
- libpq
- libxml2
- lsof
- net-tools
- nginx = 1.28.0-
- openssl
- pcre2
- procps
- python3
- sqlite
- sudo
- tar
- unzip
Provides
- bunkerweb(aarch-64) = 1.6.6_rc3-1
- bunkerweb = 1.6.6_rc3-1
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-980-CORRELATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-956-DATA-LEAKAGES-RUBY.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-955-WEB-SHELLS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-function-names-933150.data
Uploaded
7 days agoPackage Size
130 MBInstalled Size
169 MBDownloads
2
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/el/10/bunkerweb-1.6.6_rc3-1.aarch64.rpm/download.rpm?distro_version_id=308"