bunkerweb-1.6.1_rc2-1.aarch64.rpm
Install the package
sudo yum install bunkerweb-1.6.1_rc2-1.aarch64
BunkerWeb 1.6.1-rc2 for RHEL 9
Checksums
MD5 | 522124b43e668688c1e19dd81556079a |
SHA1 | 37385b453740565e593f708ab00b09782b251c10 |
SHA256 | 7551ed80cc42c6fe88c09758a6e5f1b7c2ad5b0aff0fea2a1b0aa5ba779d136a |
SHA512 | fab55c085ee0f420fe398173e334fae10833e832d889ad1bb8c79b320043e3b4a8bec99c88d5afada787b9873612927f1cacd5af73ffed6e139b848edd66c7ca |
Requires
- /bin/sh
- /bin/sh
- bash
- file-libs
- gd
- libcap
- libcurl-devel
- libmaxminddb
- libpq
- libxml2
- lsof
- mysql
- net-tools
- nginx = 1.26.3-
- openssl
- postgresql
- procps
- python39
- sqlite
- sudo
- tar
- unzip
- yajl
Provides
- bunkerweb(aarch-64) = 1.6.1_rc2-1
- bunkerweb = 1.6.1_rc2-1
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/restricted-upload.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/restricted-files.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-980-CORRELATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-955-WEB-SHELLS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-variables.data
Uploaded
5 days agoPackage Size
94.1 MBInstalled Size
291 MBDownloads
4
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/el/9/bunkerweb-1.6.1_rc2-1.aarch64.rpm/download.rpm?distro_version_id=240"