Server IP : 192.168.23.10 / Your IP : 18.190.219.200 Web Server : Apache System : Linux echo.premieradvertising.com 5.14.0-362.8.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 7 14:54:22 EST 2023 x86_64 User : rrrallyteam ( 1049) PHP Version : 8.1.31 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF Directory (0755) : /usr/share/licenses/../dbxtool/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
MSCF �! , � = QBy DBXUpdate-20200729.aa64.bin � = �Q$f DBXUpdate-20200729.aa64.metainfo.xml �Q�� � � ��үJ�h�I��4}7Ve�0��10 `�He 0 *�H�� �� �0�0��3 !Wo�F� !0 *�H�� 0��10 UUS10U Washington10URedmond10U Microsoft Corporation1*0(U!Microsoft Corporation KEK CA 20110 200304184049Z 210303184049Z0��10 UUS10U Washington10URedmond10U Microsoft Corporation100.U'Microsoft Windows UEFI Key Exchange Key0�"0 *�H�� � 0� � �av�d�X�d`�=�J,�"�'͕ئaG�X�O��DP��~=�ڦ��ć%�u1�fY^y?4-+�K�a��Ǫb�������G��S��5i�p�`R�si(m2uІL�]=w&� ���7q��b�V�� �e4,�[�HlW��S�5�����d�t[���� ��6���Ϳ$"`���{z�ܦX;��3r ��<��w[�~����d�;%�{�V����?徦FQ�6����q����2X<�]9�)� ��u0�q0U% 0 +�7O0U��y���,8�*��c�0TUM0K�I0G1-0+U$Microsoft Ireland Operations Limited10U 229961+4583800U#0�b�C͠>��g�[�U�{̶�_0SUL0J0H�F�D�Bhttp://www.microsoft.com/pkiops/crl/MicCorKEKCA2011_2011-06-24.crl0`+T0R0P+0�Dhttp://www.microsoft.com/pkiops/certs/MicCorKEKCA2011_2011-06-24.crt0U�0 0 *�H�� � x�JE?�)�bE�Ⱥ������-;ZT'YR /Q�Qb��yru����Y�ބk���>�4�aYh�������\\̬�M5T?c��=�<�~M�+_��9��m��Z�H��7�OaLx0ڋ�U��Pi��0�Հ�M8�d���G�/&�.փ8��u|ypnh��܅��9��$��km�2X�ԻH�GX�M{c��τKZ�����_�0�˔,�D��mW��/G�Ͳ���}O�S< ����;�6�Fe0��0�Р a ш 0 *�H�� 0��10 UUS10U Washington10URedmond10U Microsoft Corporation1;09U2Microsoft Corporation Third Party Marketplace Root0 110624204129Z 260624205129Z0��10 UUS10U Washington10URedmond10U Microsoft Corporation1*0(U!Microsoft Corporation KEK CA 20110�"0 *�H�� � 0� � �赊��W&�&���WzD] �J�t*��m����Zc2|O��8������,��� ����0�H�P�d�QȅO� ��/��������Sjb:C��%�������#��p��M��������/��$�����J�C~�G�l����3�*q�<�% /hvF��O�ܭq*X���y=�e;�)*��rY�뮒�5����_̝v��c���y@�y��R��{i� ��O0�K0 +�7 0Ub�C͠>��g�[�U�{̶�_0 +�7 S u b C A0U�0U�0�0U#0�EfRC�~X��N�#U;:"j�0\UU0S0Q�O�M�Khttp://crl.microsoft.com/pki/crl/products/MicCorThiParMarRoo_2010-10-05.crl0`+T0R0P+0�Dhttp://www.microsoft.com/pki/certs/MicCorThiParMarRoo_2010-10-05.crt0 *�H�� � Ԅ����*<�*�נ���Rf�uz� �-�vZ�y��7jQ{d��d�g���x��ΈXd�W��_����i�HK2��]�0�����x�+���4V��ʮA%p�k�ז���*�K�(){��|��v��y������o~l{�E�4Q�9�^V����B��w��qV̟�#��˦�X~�ig�~��� ��<����νC�-���j+Z|D�R���-��R� ��=�`��3����e �|����N8�/ ��o��.�9�������'��B�)��FA;�g�CYe� �� �O�u;��$�PA@y�-O j'vnR�i{����ES��0�76a�Ji4�h���l���l"y����F`���!����y2`�ج�"K��K�}?W5��Ou��`"S��y֛A�Tp�� 5|�4r��`;�y뢲]��������%o8���y��i�� ���� ���uk4���`�\��WN6�2���1��0��0��0��10 UUS10U Washington10URedmond10U Microsoft Corporation1*0(U!Microsoft Corporation KEK CA 20113 !Wo�F� !0 `�He 0 *�H�� � /��n<ry� a2X�< Gida*>C�� $�@����}T��{Ā#M���烯�!�/�I^]Փ4���{�l%>(BQ3�֡��K*ìEƐU��zz�ibH �1sQ�i�! kN��ϙ��'{���L'<H�v��6���.]R� {��t{=�$�L�뎻b��M��L��K>zU�w�D�gx.�[���"/��^ؿϻ��w�wVMB��o<����]Vc�N֜�v�r����5���6�5m�"#_��Y*���Y��䔧J���\+�rP 4 ���wY2M�`(��xK0� 0��0 *�H�� 0��10 UGB10UIsle of Man10UDouglas10U Canonical Ltd.1402U+Canonical Ltd. Master Certificate Authority0 120412113908Z 420411113908Z010 UGB10UIsle of Man10U Canonical Ltd.10USecure Boot1+0)U"Canonical Ltd. Secure Boot Signing0�"0 *�H�� � 0� � �_�b��d�����b�Kҟ��a+]8�ι��C�C�w�OpF�m�m�^ҷf�� m�A����cO�|�R̠1���]�FoUs�vi���!���O�"��[-ە4��(K!Lʻy�Z�g�\xE=m�Y&�W�N���,N�7M���G��;|����o�鍣ξ���<�X,��`"79�A�)�eQ�34�B��x�-�ڊ�|���7,k���|U�.<�c��8H������h>�ݔ ���0��0U�0 0U%0+ +�7 0, `�H��B OpenSSL Generated Certificate0UaH*�� ��Z�rPڐ3���0U#0�����*���#�eZ&�4Zc0 *�H�� � ���)� J����%�}�j��y�g�%%�Z������^�Z\ˍ#se��"k�Igɣ��bN\���@�܇�<? Q��e �Hg��J���ͽ�� �]-�D�>aB"�*\N����R���+�89]���Ve_+O&�x�]2��E�%�����G ��7��iv~4;�gN�%�^_����@���1#�%�U��G^�[�3����ݳ��1�Z\]}>� ���Y};���� ��>�o�! �9�Y��䔧J���\+�r, ���wY2M�`(��xK0��0�� �F��0 *�H�� 0 10UDebian Secure Boot CA0 160816182250Z 260816182250Z0$1"0 UDebian Secure Boot Signer0�"0 *�H�� � 0� � �у��e�/Z`��dž| ��e���[;��?�rK��P�3�+_�A �ϕH튲���7N`ͲJ8�D����nTۨ<�K0�!�o �f�j+�֚aw��<�q����"\>%�m".a����.MX�~x����['�}���s연^���u?x�q�/�S10�N�����#| �T:��^y^�N�ͪނ���qNII��鰫�*G�S0'|�f� o�~�=>Ԣj�Y//=��(�B��R=$�@��v���e �9070 `�H��B0U%0 +�7 0U�0 *�H�� � W�`L)��}k\���l�?iH�u�d�J �&!��V]�>�u���M��=~B�@���qy� l�qbǘ��'/���������ɟ�%���ͻ���U��uA1�N]�¬��F���՝�G���2�D�t�0�W�V�~����)�ۛSҽ/�ju&Ed��(�����yW�z<J8�����(�ؘ^9��e����?Pvg)�� ��\r��tJ��v�j��"�Fׯ ���+�ۍ�o����MJG��V��&�LP�@��A�6�C(� 0 ���wY2M�`(��xK^��T��`����< ���k�覃�R8���wY2M�`(��xK �_NQ�x�mЁ%�����or�xRY�e�&���wY2M�`(��xK ��o)�o3}r�K �H�:*��?O���wY2M�`(��xK ��!H�ʃ62u�>�� �[1�R�*�[����wY2M�`(��xK34)�bퟗ>H���-�.ImT����d�����wY2M�`(��xK6��A��wz�/�^g4g^Ù^i5���ҽ��wY2M�`(��xKl�TG��Y�Q�&�l���+��585�rѓ�.�����wY2M�`(��xK��4�� ��͐e��;=�<5�P_�{�c�!���wY2M�`(��xK��6UӢ� G'Yyk� T���iuLHH�t����wY2M�`(��xK�� �},���3:�OgQ�����D�L@����wY2M�`(��xK��xك�J�3!c��5͓,3���p�L�5�'W6���wY2M�`(��xK���h�fH���Q���j�$�y��b�������wY2M�`(��xK�k��@Ӡ�vX���QJI`O��ڈקn�x�����wY2M�`(��xK�;��Y�|謍�J��>��$Q?�eYW�5�)�@ν��wY2M�`(��xKw�� ��^; �b xS^ˇ��k/���wY2M�`(��xK�<�9"���`tFu�7̔ܭZ˦G/�4q�9脽��wY2M�`(��xK34�O�|?���T��S�d%j|�����P'������wY2M�`(��xKll���MR�5cq��.�Nʼ�#�/ #�YN�wY2M�`(��xK�������<t�ۀ�F�'�B�����.7�}�<?xml version="1.0" encoding="UTF-8"?> <!-- Copyright 2020 Microsoft Corporation <richard@hughsie.com> --> <component type="firmware"> <id>org.linuxfoundation.aa64.firmware</id> <name>Secure Boot dbx</name> <name_variant_suffix>aa64</name_variant_suffix> <summary>UEFI Security Blocklist</summary> <description> <p> Updating the UEFI Secure Boot dbx prevents starting EFI binaries with known security issues. </p> </description> <provides> <!-- Microsoft Corporation KEK CA 2011 - UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503&ARCH_AA64 --> <firmware type="flashed">67d35028-ca5b-5834-834a-f97380381082</firmware> </provides> <url type="homepage">https://uefi.org/revocationlistfile</url> <metadata_license>CC0-1.0</metadata_license> <project_license>proprietary</project_license> <releases> <!-- for the version use `dbxtool -l -d foo.bin` and count the {microsoft} owner GUIDs --> <release urgency="high" version="19" date="2020-07-29"> <checksum filename="DBXUpdate-20200729.aa64.bin" target="content"/> <description> <p> This updates the dbx to the latest release from Microsoft. </p> </description> <issues> <issue type="cve">CVE-2020-10713</issue> <issue type="cve">CVE-2020-14308</issue> <issue type="cve">CVE-2020-14309</issue> <issue type="cve">CVE-2020-14310</issue> <issue type="cve">CVE-2020-14311</issue> <issue type="cve">CVE-2020-15705</issue> <issue type="cve">CVE-2020-15706</issue> <issue type="cve">CVE-2020-15707</issue> <issue type="cve">CVE-2020-7205</issue> </issues> </release> </releases> <!-- only very recent versions of fwupd can apply this --> <requires> <id compare="ge" version="1.4.6">org.freedesktop.fwupd</id> </requires> <!-- these keywords are optional and are used for searching --> <keywords> <keyword>boothole</keyword> </keywords> <custom> <value key="LVFS::UpdateProtocol">org.uefi.dbx</value> <value key="LVFS::VersionFormat">number</value> </custom> <categories> <category>X-Device</category> </categories> </component>