403Webshell
Server IP : 15.235.198.142  /  Your IP : 216.73.216.62
Web Server : Apache/2.4.58 (Ubuntu)
System : Linux ballsack 6.8.0-45-generic #45-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 30 12:02:04 UTC 2024 x86_64
User : www-data ( 33)
PHP Version : 8.3.6
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : OFF
Directory :  /var/lib/fwupd/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/lib/fwupd/pending.db
SQLite format 3@  .v�
��
Q����%##�tablehsi_historyhsi_historyCREATE TABLE hsi_history (timestamp TIMESTAMP DEFAULT CURRENT_TIMESTAMP,hsi_details TEXT DEFAULT NULL,hsi_score TEXT DEFAULT NULL)Y--gtableblocked_firmwareblocked_firmwareCREATE TABLE blocked_firmware (checksum TEXT)\//itableapproved_firmwareapproved_firmwareCREATE TABLE approved_firmware (checksum TEXT)�,�/tablehistoryhistoryCREATE TABLE history (device_id TEXT,update_state INTEGER DEFAULT 0,update_error TEXT,filename TEXT,display_name TEXT,plugin TEXT,device_created INTEGER DEFAULT 0,device_modified INTEGER DEFAULT 0,checksum TEXT DEFAULT NULL,flags INTEGER DEFAULT 0,metadata TEXT DEFAULT NULL,guid_default TEXT DEFAULT NULL,version_old TEXT,version_new TEXT,checksum_device TEXT DEFAULT NULL,protocol TEXT DEFAULT NULL,release_id TEXT DEFAULT NULL,appstream_id TEXT DEFAULT NULL,version_format INTEGER DEFAULT 0,install_duration INTEGER DEFAULT 0)~�WtableschemaschemaCREATE TABLE schema (created timestamp TIMESTAMP DEFAULT CURRENT_TIMESTAMP,version INTEGER DEFAULT 0)
��32024-07-30 10:39:09




�
��Y3��GS2024-07-30 10:39:10{
  "SecurityAttributes" : [
    {
      "AppstreamId" : "org.fwupd.hsi.Fwupd.Plugins",
      "HsiLevel" : 0,
      "HsiResult" : "not-tainted",
      "HsiResultSuccess" : "not-tainted",
      "Name" : "fwupd plugins",
      "Summary" : "Firmware Updater Verification",
      "Description" : "Firmware Updater Verification checks that software used for updating has not been tampered with.",
      "Plugin" : "core",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Fwupd.Plugins",
      "Flags" : [
        "success",
        "runtime-issue"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Kernel.Swap",
      "HsiLevel" : 0,
      "HsiResult" : "not-enabled",
      "HsiResultSuccess" : "encrypted",
      "Name" : "Linux swap",
      "Summary" : "Linux Swap",
      "Description" : "Linux Kernel Swap temporarily saves information to disk as you work. If the information is not protected, it could be accessed by someone if they obtained the disk.",
      "Plugin" : "linux_swap",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Swap",
      "Flags" : [
        "success",
        "runtime-issue"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Kernel.Tainted",
      "HsiLevel" : 0,
      "HsiResult" : "not-tainted",
      "HsiResultSuccess" : "not-tainted",
      "Name" : "Linux kernel",
      "Summary" : "Linux Kernel Verification",
      "Description" : "Linux Kernel Verification makes sure that critical system software has not been tampered with. Using device drivers which are not provided with the system can prevent this security feature from working correctly.",
      "Plugin" : "linux_tainted",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Tainted",
      "Flags" : [
        "success",
        "runtime-issue"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Kernel.Lockdown",
      "HsiLevel" : 0,
      "HsiResult" : "not-enabled",
      "HsiResultSuccess" : "enabled",
      "Name" : "Linux kernel lockdown",
      "Summary" : "Linux Kernel Lockdown",
      "Description" : "Linux Kernel Lockdown mode prevents administrator (root) accounts from accessing and changing critical parts of system software.",
      "Plugin" : "linux_lockdown",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Lockdown",
      "Flags" : [
        "runtime-issue",
        "action-config-os"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Uefi.SecureBoot",
      "HsiLevel" : 0,
      "HsiResult" : "not-enabled",
      "HsiResultSuccess" : "enabled",
      "Name" : "UEFI secure boot",
      "Summary" : "UEFI Secure Boot",
      "Description" : "UEFI Secure Boot prevents malicious software from being loaded when the device starts.",
      "Plugin" : "bios",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Uefi.SecureBoot",
      "Flags" : [
        "runtime-issue",
        "action-config-fw"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Uefi.BootserviceVars",
      "HsiLevel" : 1,
      "HsiResult" : "locked",
      "HsiResultSuccess" : "locked",
      "Name" : "UEFI bootservice variables",
      "Summary" : "UEFI Bootservice Variables",
      "Description" : "UEFI boot service variables should not be readable from runtime mode.",
      "Plugin" : "uefi_capsule",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Uefi.BootserviceVars",
      "Flags" : [
        "success"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.SupportedCpu",
      "HsiLevel" : 1,
      "HsiResultSuccess" : "valid",
      "Name" : "Supported CPU",
      "Summary" : "Processor Security Checks",
      "Description" : "Each system should have tests to ensure firmware security.",
      "Plugin" : "core",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.SupportedCpu",
      "Flags" : [
        "missing-data",
        "action-contact-oem"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Tpm.Version20",
      "HsiLevel" : 1,
      "HsiResult" : "not-found",
      "HsiResultSuccess" : "found",
      "Name" : "TPM v2.0",
      "Summary" : "TPM v2.0",
      "Description" : "TPM (Trusted Platform Module) is a computer chip that detects when hardware components have been tampered with.",
      "Plugin" : "tpm",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Tpm.Version20"
    },
    {
      "AppstreamId" : "org.fwupd.hsi.Iommu",
      "HsiLevel" : 2,
      "HsiResult" : "not-found",
      "HsiResultSuccess" : "enabled",
      "Name" : "IOMMU",
      "Summary" : "IOMMU Protection",
      "Description" : "IOMMU Protection prevents connected devices from accessing unauthorized parts of system memory.",
      "Plugin" : "iommu",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Iommu",
      "Flags" : [
        "action-contact-oem",
        "action-config-fw",
        "action-config-os"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.SuspendToRam",
      "HsiLevel" : 3,
      "HsiResult" : "not-enabled",
      "HsiResultSuccess" : "not-enabled",
      "Name" : "Suspend-to-ram",
      "Summary" : "Suspend To RAM",
      "Description" : "Suspend to RAM allows the device to quickly go to sleep in order to save power. While the device has been suspended, its memory could be physically removed and its information accessed.",
      "Plugin" : "linux_sleep",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.SuspendToRam",
      "Flags" : [
        "success"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.IntelCet.Enabled",
      "HsiLevel" : 3,
      "HsiResult" : "not-supported",
      "HsiResultSuccess" : "supported",
      "Name" : "CET Platform",
      "Summary" : "Control-flow Enforcement Technology",
      "Description" : "Control-Flow Enforcement Technology detects and prevents certain methods for running malicious software on the device.",
      "Plugin" : "cpu",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.IntelCet.Enabled",
      "Guid" : [
        "94dafde8-adf3-5325-8317-75df3d0f403a",
        "16f4eef0-25ba-5cc5-87bc-8b462af82d14"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.PrebootDma",
      "HsiLevel" : 3,
      "HsiResult" : "not-valid",
      "HsiResultSuccess" : "enabled",
      "Name" : "Pre-boot DMA protection",
      "Summary" : "Pre-boot DMA Protection",
      "Description" : "Pre-boot DMA protection prevents devices from accessing system memory after being connected to the computer.",
      "Plugin" : "acpi_ivrs",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.PrebootDma"
    },
    {
      "AppstreamId" : "org.fwupd.hsi.SuspendToIdle",
      "HsiLevel" : 3,
      "HsiResult" : "not-enabled",
      "HsiResultSuccess" : "enabled",
      "Name" : "Suspend-to-idle",
      "Summary" : "Suspend To Idle",
      "Description" : "Suspend to Idle allows the device to quickly go to sleep in order to save power. While the device has been suspended, its memory could be physically removed and its information accessed.",
      "Plugin" : "acpi_facp",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.SuspendToIdle",
      "Flags" : [
        "action-config-fw",
        "action-config-os"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.IntelSmap",
      "HsiLevel" : 4,
      "HsiResult" : "enabled",
      "HsiResultSuccess" : "enabled",
      "Name" : "SMAP",
      "Summary" : "Supervisor Mode Access Prevention",
      "Description" : "Supervisor Mode Access Prevention ensures critical parts of device memory are not accessed by less secure programs.",
      "Plugin" : "cpu",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.IntelSmap",
      "Flags" : [
        "success"
      ],
      "Guid" : [
        "94dafde8-adf3-5325-8317-75df3d0f403a",
        "16f4eef0-25ba-5cc5-87bc-8b462af82d14"
      ]
    },
    {
      "AppstreamId" : "org.fwupd.hsi.EncryptedRam",
      "HsiLevel" : 4,
      "HsiResult" : "not-supported",
      "HsiResultSuccess" : "encrypted",
      "Name" : "Encrypted RAM",
      "Summary" : "Encrypted RAM",
      "Description" : "Encrypted RAM makes it impossible for information that is stored in device memory to be read if the memory chip is removed and accessed.",
      "Plugin" : "msr",
      "Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.EncryptedRam",
      "Guid" : [
        "94dafde8-adf3-5325-8317-75df3d0f403a",
        "16f4eef0-25ba-5cc5-87bc-8b462af82d14"
      ]
    }
  ]
}HSI:INVALID:chassis[0x01] (v1.9.16)

Youez - 2016 - github.com/yon3zu
LinuXploit