Server IP : 192.168.23.10  /  Your IP : 18.190.219.200
Web Server : Apache
System : Linux echo.premieradvertising.com 5.14.0-362.8.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 7 14:54:22 EST 2023 x86_64
User : rrrallyteam ( 1049)
PHP Version : 8.1.31
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF
Directory (0755) :  /usr/share/licenses/../dbxtool/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : //usr/share/licenses/../dbxtool/DBXUpdate-20200729-aa64.cab
MSCF�!,�=QBy DBXUpdate-20200729.aa64.bin�=�Q$f DBXUpdate-20200729.aa64.metainfo.xml�Q�� � �
��үJ�h�I��4}7Ve�0��10
	`�He0	*�H��
��
�0�0��3!Wo�F�!0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1*0(U!Microsoft Corporation KEK CA 20110
200304184049Z
210303184049Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation100.U'Microsoft Windows UEFI Key Exchange Key0�"0
	*�H��
�0�
��av�d�X�d`�=�J,�"�'͕ئaG�X�O��DP��~=�ڦ��ć%�u1�fY^y?4-+�K�a��Ǫb�������G��S��5i�p�`R�si(m2uІL�]=w&�
���7q��b�V��
�e4,�[�HlW��S�5�����d�t[����	��6���Ϳ$"`���{z�ܦX;��3r
��<��w[�~����d�;%�{�V����?徦FQ�6����q����2X<�]9�)���u0�q0U%
0	+�7O0U��y��׶�,8�*��c�0TUM0K�I0G1-0+U$Microsoft Ireland Operations Limited10U
229961+4583800U#0�b�C͠>��g�[�U�{̶�_0SUL0J0H�F�D�Bhttp://www.microsoft.com/pkiops/crl/MicCorKEKCA2011_2011-06-24.crl0`+T0R0P+0�Dhttp://www.microsoft.com/pkiops/certs/MicCorKEKCA2011_2011-06-24.crt0U�00
	*�H��
�x�JE?�)�bE�Ⱥ������-;ZT'YR/Q�Qb��yru����Y�ބk���>�4�aYh�������\\̬�M5T?c��=�<�~M�+_��9��m��Z�H��7�OaLx0ڋ�U��Pi��0�Հ�M8�d���G�/&�.փ8��u|ypnh��܅��9��$��km�2X�ԻH�GX�M{c��τKZ�����_�0�˔,�D��mW��/G�Ͳ���}O�S<
����;�6�Fe0��0�Р
a
ш0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1;09U2Microsoft Corporation Third Party Marketplace Root0
110624204129Z
260624205129Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1*0(U!Microsoft Corporation KEK CA 20110�"0
	*�H��
�0�
��赊��W&�&���WzD]
�J�t*��m����Zc2|O��8������,���	����0�H�P�d�QȅO� ��/��������Sjb:C��%�������#��p��M��������/��$�����J�C~�G�l����3�*q�<�%	/hvF��O�ܭq*X���y=�e;�)*��rY�뮒�5����_̝v��c���y@�y��R��{i���O0�K0	+�70Ub�C͠>��g�[�U�{̶�_0	+�7
SubCA0U�0U�0�0U#0�EfRC�~X��N�#U;:"j�0\UU0S0Q�O�M�Khttp://crl.microsoft.com/pki/crl/products/MicCorThiParMarRoo_2010-10-05.crl0`+T0R0P+0�Dhttp://www.microsoft.com/pki/certs/MicCorThiParMarRoo_2010-10-05.crt0
	*�H��
�Ԅ����*<�*�נ���Rf�uz��-�vZ�y��7jQ{d��d�g���x��ΈXd�W��_����i�HK2��]�0�����x�+���4V��ʮA%p�k�ז���*�K�(){��|��v��y������o~l{�E�4Q�9�^V����B��w��qV̟�#��˦�X~�ig�~���
��<����νC�-���j+Z|D�R���-��R���=�`��3����e
�|����N8�/
��o��.�9�������'��B�)��FA;�g�CYe�
���O�u;��$�PA@y�-O
j'vnR�i{����E­S��0�76a�Ji4�h���l���l"y����F`���!����y2`�ج�"K��K�}?W5��Ou��`"S��y֛A�Tp��
5|�4r��`;�y뢲]��������%o8���y��i�� �������uk4���`�\��WN6�2���1��0��0��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1*0(U!Microsoft Corporation KEK CA 20113!Wo�F�!0
	`�He0
	*�H��
�/��n<ry�
a2X�<	Gida*>C��
$�@����}T��{Ā#M���烯�!�/�I^]Փ4���{�l%>(BQ3�֡��K*ìEƐU��zz�ibH �1sQ�i�!
kN��ϙ��'{���L'<H�v��6���.]R� 
{��t{=�$�L�뎻b��M��L��K>zU�w�D�gx.�[���"/��^ؿϻ��w�wVMB��o<����]Vc�N֜�v�r����5���6�5m�"#_��Y*���Y��䔧J���\+�rP4���wY2M�`(��xK0� 0��0
	*�H��
0��10	UGB10UIsle of Man10UDouglas10U
Canonical Ltd.1402U+Canonical Ltd. Master Certificate Authority0
120412113908Z
420411113908Z010	UGB10UIsle of Man10U
Canonical Ltd.10USecure Boot1+0)U"Canonical Ltd. Secure Boot Signing0�"0
	*�H��
�0�
��_�b��d�����b�Kҟ��a+]8�ι��C�C�w�OpF�m�m�^ҷf��
m�A����cO�|�R̠1���]�FoUs�vi���!���O�"��[-ە4��(K!Lʻy�Z�g�\xE=m�Y&�W�N���,N�7M���G��;|����o�鍣ξ���<�X,��`"79�A�)�eQ�34�B��x�-�ڊ�|���7,k���|U�.<�c��8H������h>�ݔ���0��0U�00U%0+
+�7
0,	`�H��B
OpenSSL Generated Certificate0UaH*��
��Z�rPڐ3���0U#0�����*���#�eZ&�4Zc0
	*�H��
����)�
J����%�}�j��y�g�%%�Z������^�Z\ˍ#se��"k�Igɣ��bN\���@�܇�<?
Q��e
�Hg��J���ͽ��	�]-�D�>aB"�*\N����R���+�89]���Ve_+O&�x�]2��E�%�����G	��7��iv~4;�gN�%�^_����@���1#�%�U��G^�[�3����ݳ��1�Z\]}>�
���Y};���� ��>�o�!�9�Y��䔧J���\+�r,���wY2M�`(��xK0��0���F��0
	*�H��
0 10UDebian Secure Boot CA0
160816182250Z
260816182250Z0$1"0 UDebian Secure Boot Signer0�"0
	*�H��
�0�
��у��e�/Z`��dž| ��e���[;��?�rK��P�3�+_�A
�ϕH튲���7N`ͲJ8�D����nTۨ<�K0�!�o	�f�j+�֚aw��<�q����"\>%�m".a����.MX�~x����['�}���s연^���u?x�q�/΃�S10�N�����#|
�T:��^y^�N�ͪނ���qNII��鰫�*G�S0'|�f�	o�~�=>Ԣj�Y//=��(�B��R=$�@��v���e�9070	`�H��B0U%0
+�7
0U�0
	*�H��
�W�`L)��}k\���l�?iH�u�d�J	�&!��V]�>�u���M��=~B�@���qy�l�qbǘ��'/���������ɟ�%���ͻ���U��uA1�N]�¬��F���՝�G���2�D�t�0�W�V�~����)�ۛSҽ/�ju&Ed��(�����yW�z<J8�����(�ؘ^9��e����?Pvg)��
��\r��tJ��v�j��"�Fׯ
���+�ۍ�o����MJG��V��&�LP�@��A�6�C(�0���wY2M�`(��xK^��T��`����< ���k�覃�R8���wY2M�`(��xK	�_NQ�x�mЁ%�����or�xRY�e�&���wY2M�`(��xK

��o)�o3}r�K	�H�:*��?O���wY2M�`(��xK
��!H�ʃ62u�>���[1�R�*�[����wY2M�`(��xK34)�bퟗ>H���-�.ImT����d�����wY2M�`(��xK6��A��wz�/�^g4g^Ù^i5���ҽ��wY2M�`(��xKl�TG��Y�Q�&�l���+��585�rѓ�.�����wY2M�`(��xK��4����͐e��;=�<5�P_�{�c�!���wY2M�`(��xK��6UӢ�
G'Yyk� T���iuLHH�t����wY2M�`(��xK��
�},���3:�OgQ�����D�L@����wY2M�`(��xK��xك�J�3!c��5͓,3���p�L�5�'W6���wY2M�`(��xK���h�fH���Q���j�$�y��b�������wY2M�`(��xK�k��@Ӡ�vX���QJI`O��ڈקn�x�����wY2M�`(��xK�;��Y�|謍�J��>��$Q?�eYW�5�)�@ν��wY2M�`(��xKw��
��^;
�b	xS^ˇ��k/���wY2M�`(��xK�<�9"���`tFu�7̔ܭZ˦G/�4q�9脽��wY2M�`(��xK34�O�|?���T��S�d%j|�����P'������wY2M�`(��xKll���MR�5cq��.�Nʼ�#�/	#�YN�wY2M�`(��xK�������<t�ۀ�F�'�B�����.7�}�<?xml version="1.0" encoding="UTF-8"?>
<!-- Copyright 2020 Microsoft Corporation <richard@hughsie.com> -->
<component type="firmware">
  <id>org.linuxfoundation.aa64.firmware</id>
  <name>Secure Boot dbx</name>
  <name_variant_suffix>aa64</name_variant_suffix>
  <summary>UEFI Security Blocklist</summary>
  <description>
    <p>
      Updating the UEFI Secure Boot dbx prevents starting EFI binaries with known security issues.
    </p>
  </description>
  <provides>
    <!-- Microsoft Corporation KEK CA 2011 -
    UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503&ARCH_AA64 -->
    <firmware type="flashed">67d35028-ca5b-5834-834a-f97380381082</firmware>
  </provides>
  <url type="homepage">https://uefi.org/revocationlistfile</url>
  <metadata_license>CC0-1.0</metadata_license>
  <project_license>proprietary</project_license>
  <releases>
    <!-- for the version use `dbxtool -l -d foo.bin` and count the {microsoft} owner GUIDs -->
    <release urgency="high" version="19" date="2020-07-29">
      <checksum filename="DBXUpdate-20200729.aa64.bin" target="content"/>
      <description>
        <p>
          This updates the dbx to the latest release from Microsoft.
        </p>
      </description>
      <issues>
        <issue type="cve">CVE-2020-10713</issue>
        <issue type="cve">CVE-2020-14308</issue>
        <issue type="cve">CVE-2020-14309</issue>
        <issue type="cve">CVE-2020-14310</issue>
        <issue type="cve">CVE-2020-14311</issue>
        <issue type="cve">CVE-2020-15705</issue>
        <issue type="cve">CVE-2020-15706</issue>
        <issue type="cve">CVE-2020-15707</issue>
        <issue type="cve">CVE-2020-7205</issue>
      </issues>
    </release>
  </releases>
  <!-- only very recent versions of fwupd can apply this -->
  <requires>
    <id compare="ge" version="1.4.6">org.freedesktop.fwupd</id>
  </requires>
  <!-- these keywords are optional and are used for searching -->
  <keywords>
    <keyword>boothole</keyword>
  </keywords>
  <custom>
    <value key="LVFS::UpdateProtocol">org.uefi.dbx</value>
    <value key="LVFS::VersionFormat">number</value>
  </custom>
  <categories>
    <category>X-Device</category>
  </categories>
</component>