bunkerweb-1.6.1-1.x86_64.rpm
Install the package
sudo yum install bunkerweb-1.6.1-1.x86_64
BunkerWeb 1.6.1 for Fedora 40
Checksums
MD5 | 85cdf1f2173781b583c0e04bc2c9cc6b |
SHA1 | 2d1664437d195493a3d8563ae15bbf38514aef27 |
SHA256 | c7011c4176aed12d9f59062c2932a37826ad7684b91e42ec81541c655488dc8d |
SHA512 | 7284723725d0413b5a68b6922fd04b933baa568f031ce3ae1ce48fea109cbad6365dd3d9b4009d2253b485fff8d4c408c43bbedbf6a8f1bbee9468d5a0a0566d |
Requires
- /bin/sh
- /bin/sh
- bash
- gd
- geoip-devel
- libcap
- libcurl-devel
- libpq
- libxml2
- lmdb-libs
- logrotate
- lsof
- mysql
- nginx = 1.26.3-
- nginx-mod-stream = 1.26.3-
- openssl
- pcre
- postgresql
- procps
- python3
- sqlite3
- sudo
- tar
- unzip
- yajl
Provides
- bunkerweb(x86-64) = 1.6.1-1
- bunkerweb = 1.6.1-1
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/restricted-files.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-980-CORRELATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-955-WEB-SHELLS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-function-names-933151.data
Uploaded
20 days agoPackage Size
99.4 MBInstalled Size
305 MBDownloads
3
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/fedora/41/bunkerweb-1.6.1-1.x86_64.rpm/download.rpm?distro_version_id=302"