bunkerweb-1.6.9~rc1-1.x86_64.rpm
Install the package
sudo yum install bunkerweb-1.6.9~rc1-1.x86_64
BunkerWeb 1.6.9~rc1 for Fedora 42
Checksums
| MD5 | 79b1340688e15fce4c4b585ecfd1cf50 |
| SHA1 | 766083ab0f21e0a467f5f6e345863b4b7b866073 |
| SHA256 | ef3c14ff91d926e57b3cd3153050fcbedbef02ccf3374e9d1bbdb401647d409e |
| SHA512 | edeb8a72346dba06125568c8ad6095419cf84b916bde0de4cee55b2c264926663eb22c9f8aa649fc0c8d4613be248bff8ac148c6d3975d9a31793223e02b7edc |
Requires
- /bin/sh
- /bin/sh
- bash
- gd
- geoip-devel
- libcap
- libcurl-devel
- libpq
- libxml2
- lmdb-libs
- logrotate
- lsof
- mysql
- nginx = 1.28.2-
- nginx-mod-stream = 1.28.2-
- openssl
- pcre2
- postgresql
- procps
- python3.12
- sqlite3
- ssdeep-libs
- sudo
- tar
- unzip
- yajl
Provides
- bunkerweb(x86-64) = 1.6.9~rc1-1
- bunkerweb = 1.6.9~rc1-1
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-function-names-933150.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/php-errors.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/lfi-os-files.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/java-classes.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/iis-errors.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/rules/asp-dotnet-errors.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/renovate.json
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/toolchain.yaml
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/windows-commands.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/windows-commands-prefix.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/url-schemes.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/unix-shell-upto3.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/unix-shell-pl3.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/unix-shell-noarguments.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/unix-shell-evasion-prefix.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/unix-shell-evasion-prefix-start-of-string.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/unix-shell-4andup.ra
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v4/regex-assembly/include/sql-injection-mysql-postgresql-procedures-functions.ra
Uploaded
about 21 hours agoPackage Size
132 MBInstalled Size
168 MBDownloads
1
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/fedora/42/bunkerweb-1.6.9~rc1-1.x86_64.rpm/download.rpm?distro_version_id=307"