bunkerweb-1.6.9-1.x86_64.rpm
Install the package
sudo yum install bunkerweb-1.6.9-1.x86_64
BunkerWeb 1.6.9 for RHEL 8
Checksums
| MD5 | 885cb6e4bb3da6e387f6492c2c14c48d |
| SHA1 | 165f8432c3f4df52bd46ad71e112b25732582cff |
| SHA256 | cc7c352a92398702818ac4d07faab6f74fde578324517ccf622be02d612b3aee |
| SHA512 | b18d01fc89f453ca8cf39baab8e9e2b5692422ea7d56673bdac440f2999ae4bce4d17ebaa8325d3a48894c97370ed37cebe5f12a75fd751fe2b0cc8da5a5c3f2 |
Requires
- /bin/sh
- /bin/sh
- bash
- curl
- file-libs
- gd
- geoip
- libcap
- libcurl-devel
- libpq
- libxml2
- lmdb-libs
- lsof
- net-tools
- nginx = 1.28.2-
- openssl
- pcre2
- procps
- python3.11
- sqlite
- ssdeep-libs
- sudo
- tar
- unzip
- yajl
Provides
- bunkerweb(x86-64) = 1.6.9-1
- bunkerweb = 1.6.9-1
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-980-CORRELATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-956-DATA-LEAKAGES-RUBY.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-955-WEB-SHELLS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-999-COMMON-EXCEPTIONS-AFTER.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-function-names-933150.data
Uploaded
about 19 hours agoPackage Size
138 MBInstalled Size
178 MBDownloads
2
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/el/8/bunkerweb-1.6.9-1.x86_64.rpm/download.rpm?distro_version_id=205"