bunkerweb-1.6.6_rc3-1.x86_64.rpm
Install the package
sudo yum install bunkerweb-1.6.6_rc3-1.x86_64
BunkerWeb 1.6.6-rc3 for RHEL 9
Checksums
| MD5 | b0b55a63454cd1beaf00586cbd278b25 |
| SHA1 | 7ccd9bde9fc0f4016b314a77f92561e1367586b0 |
| SHA256 | e31d89572f33826e4ff936fc425aae1fcd72fc098ffaa328ea825b79f544488f |
| SHA512 | 6b2f3c74f2f551f15053698c466891c24525f8dbd0af9db20472aa258716e8fbe5a77bfffcbb0befe121bddbff2b10c18b2b39bea0c63816eea1bcf513147718 |
Requires
- /bin/sh
- /bin/sh
- bash
- file-libs
- gd
- libcap
- libcurl-devel
- libmaxminddb
- libpq
- libxml2
- lsof
- net-tools
- nginx = 1.28.0-
- openssl
- procps
- python3.11
- sqlite
- sudo
- tar
- unzip
- yajl
Provides
- bunkerweb(x86-64) = 1.6.6_rc3-1
- bunkerweb = 1.6.6_rc3-1
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-980-CORRELATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-956-DATA-LEAKAGES-RUBY.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-955-WEB-SHELLS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-function-names-933150.data
Uploaded
7 days agoPackage Size
134 MBInstalled Size
172 MBDownloads
3
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/el/9/bunkerweb-1.6.6_rc3-1.x86_64.rpm/download.rpm?distro_version_id=240"