IBM WebSphere Application Server Version 6.0.2.3
CSV information ?
Status | archived |
---|---|
Valid from | 22.05.2006 |
Valid until | 06.09.2012 |
Scheme | 🇺🇸 US |
Manufacturer | IBM Corporation |
Category | Other Devices and Systems |
Security level | EAL4+, ALC_FLR.1 |
Heuristics summary ?
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL 4, EAL 1, EAL4+, EAL4, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_SPM, ALC_FLR.1Certificates
CCEVS-VR-06-0024File metadata
Title: | Validation Report |
---|---|
Author: | Santosh Chokhani |
Creation date: | D:20060605135152-04'00' |
Modification date: | D:20060605135214-03'00' |
Pages: | 18 |
Creator: | Acrobat PDFMaker 5.0 for Word |
Producer: | Acrobat Distiller 5.0.5 (Windows) |
Frontpage
Certificate ID: | CCEVS-VR-06-0024 |
---|---|
Certified item: | IBM WebSphere Application Server |
Certification lab: | US NIAP |
References
Security target ?
Extracted keywords
Symmetric Algorithms
AES, TripleDESAsymmetric Algorithms
DSAProtocols
SSL, TLSBlock cipher modes
CBCTLS cipher suites
TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHAVendor
Microsoft, Microsoft CorporationSecurity level
EAL4+, EAL4Claims
O.ACCESS, O.IDENTIFY, O.INVOKE_SSL, O.MANAGE, O.ADMIN, O.APP, O.ATTR, O.AUTH, O.PROTECT, O.RECOVER, O.TRANSFER, T.ACCESS_RES, T.ACCESS_TOE, T.NETWORK, T.APP, A.AUTH, A.APP, A.PROTECT, A.ADMINSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FAU_GEN, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_IFC.1, FIA_OBO, FIA_UID.1.1, FIA_UID.1, FIA_USB, FIA_USB.1.1, FIA_UID, FIA_UID.1.2, FIA_USB.1.2, FIA_USB.1.3, FIA_USB.1, FIA_ATD, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_ATD.1, FIA_UAU.1, FMT_MSA, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.2, FMT_SMR.1.1, FMT_MSA.2.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.2Standards
FIPS 140-2, FIPS 186-2, FIPS 140-1, FIPS 197, FIPS 46-3, FIPS 140, x.509File metadata
Title: | WebSphere Application Server EAL4+ Security Target |
---|---|
Author: | Donna Skibbie |
Creation date: | D:20060605133340-04'00' |
Modification date: | D:20060605133702-03'00' |
Pages: | 121 |
Creator: | Acrobat PDFMaker 5.0 for Word |
Producer: | Acrobat Distiller 5.0.5 (Windows) |
References
Heuristics ?
Extracted SARs
ADV_FSP.2, ALC_DVS.1, AGD_USR.1, ATE_FUN.1, ALC_TAT.1, ATE_DPT.1, AGD_ADM.1, ADV_HLD.2, ALC_LCD.1, ADV_LLD.1, AVA_VLA.2, AVA_MSU.2, AVA_SOF.1, ALC_FLR.1, ADV_SPM.1, ATE_IND.2, ADV_RCR.1, ADV_IMP.1, ATE_COV.2CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2005-0425 | MEDIUM | 5.0 | 2.9 | 02.05.2005 04:00 | ||
CVE-2005-1112 | MEDIUM | 5.0 | 2.9 | 02.05.2005 04:00 | ||
CVE-2005-3498 | MEDIUM | 4.3 | 2.9 | 04.11.2005 00:02 | ||
CVE-2005-4413 | MEDIUM | 4.3 | 2.9 | 20.12.2005 11:03 | ||
CVE-2005-4833 | MEDIUM | 4.3 | 2.9 | 31.12.2005 05:00 | ||
CVE-2006-2342 | HIGH | 7.5 | 6.4 | 12.05.2006 17:06 | ||
CVE-2006-2429 | HIGH | 10.0 | 10.0 | 17.05.2006 10:06 | ||
CVE-2006-2430 | HIGH | 10.0 | 10.0 | 17.05.2006 10:06 | ||
CVE-2006-2431 | MEDIUM | 4.3 | 2.9 | 17.05.2006 10:06 | ||
CVE-2006-2433 | HIGH | 10.0 | 10.0 | 17.05.2006 10:06 | ||
CVE-2006-3231 | MEDIUM | 4.3 | 2.9 | 27.06.2006 10:05 | ||
CVE-2006-3232 | HIGH | 10.0 | 10.0 | 27.06.2006 10:05 | ||
CVE-2006-4136 | HIGH | 7.5 | 6.4 | 14.08.2006 23:04 | ||
CVE-2006-4137 | MEDIUM | 5.0 | 2.9 | 14.08.2006 23:04 | ||
CVE-2006-4222 | MEDIUM | 5.0 | 2.9 | 18.08.2006 20:04 | ||
CVE-2006-4223 | MEDIUM | 5.0 | 2.9 | 18.08.2006 20:04 | ||
CVE-2006-5323 | HIGH | 10.0 | 10.0 | 17.10.2006 17:07 | ||
CVE-2006-5324 | HIGH | 7.5 | 6.4 | 17.10.2006 17:07 | ||
CVE-2006-6636 | HIGH | 10.0 | 10.0 | 19.12.2006 20:28 | ||
CVE-2006-6637 | MEDIUM | 5.0 | 2.9 | 19.12.2006 20:28 | ||
CVE-2007-1608 | HIGH | 7.5 | 6.4 | 22.03.2007 23:19 | ||
CVE-2007-1944 | MEDIUM | 5.0 | 2.9 | 11.04.2007 01:19 | ||
CVE-2007-3262 | HIGH | 7.8 | 6.9 | 19.06.2007 18:30 | ||
CVE-2007-3263 | HIGH | 10.0 | 10.0 | 19.06.2007 18:30 | ||
CVE-2007-3264 | HIGH | 10.0 | 10.0 | 19.06.2007 18:30 | ||
CVE-2007-3265 | MEDIUM | 4.3 | 2.9 | 19.06.2007 18:30 | ||
CVE-2007-3397 | MEDIUM | 5.0 | 2.9 | 26.06.2007 17:30 | ||
CVE-2007-3960 | HIGH | 9.3 | 10.0 | 24.07.2007 18:30 | ||
CVE-2007-4833 | MEDIUM | 5.0 | 2.9 | 12.09.2007 19:17 | ||
CVE-2007-5483 | HIGH | 10.0 | 10.0 | 16.10.2007 23:17 | ||
CVE-2007-5798 | MEDIUM | 4.3 | 2.9 | 03.11.2007 00:46 | ||
CVE-2007-5799 | MEDIUM | 4.3 | 2.9 | 03.11.2007 00:46 | ||
CVE-2007-6679 | HIGH | 10.0 | 10.0 | 10.01.2008 02:46 | ||
CVE-2008-0389 | HIGH | 10.0 | 10.0 | 23.01.2008 02:00 | ||
CVE-2008-0740 | LOW | 2.1 | 2.9 | 13.02.2008 01:00 | ||
CVE-2008-0741 | HIGH | 10.0 | 10.0 | 13.02.2008 01:00 | ||
CVE-2008-2550 | MEDIUM | 5.0 | 2.9 | 04.06.2008 20:32 | ||
CVE-2008-4284 | MEDIUM | 5.8 | 4.9 | 10.02.2009 22:30 | ||
CVE-2008-4678 | HIGH | 7.8 | 6.9 | 22.10.2008 18:00 | ||
CVE-2008-4679 | MEDIUM | 6.8 | 6.4 | 22.10.2008 18:00 | ||
CVE-2008-5411 | MEDIUM | 5.0 | 2.9 | 10.12.2008 00:30 | ||
CVE-2008-5413 | MEDIUM | 5.0 | 2.9 | 10.12.2008 00:30 | ||
CVE-2009-0217 | MEDIUM | 5.0 | 2.9 | 14.07.2009 23:30 | ||
CVE-2009-0433 | LOW | 2.6 | 2.9 | 10.02.2009 22:30 | ||
CVE-2009-0434 | LOW | 1.9 | 2.9 | 10.02.2009 22:30 | ||
CVE-2009-0436 | HIGH | 7.2 | 10.0 | 10.02.2009 22:30 | ||
CVE-2009-0439 | HIGH | 7.2 | 10.0 | 24.02.2009 17:30 | ||
CVE-2009-0504 | LOW | 2.1 | 2.9 | 17.02.2009 17:30 | ||
CVE-2009-0508 | HIGH | 7.5 | 6.4 | 16.03.2009 19:30 | ||
CVE-2009-0891 | MEDIUM | 5.5 | 4.9 | 25.03.2009 01:30 | ||
CVE-2009-0896 | HIGH | 10.0 | 10.0 | 03.06.2009 17:00 | ||
CVE-2009-0900 | MEDIUM | 4.1 | 6.4 | 30.10.2011 19:55 | ||
CVE-2009-0905 | LOW | 1.7 | 2.9 | 30.10.2011 19:55 | ||
CVE-2009-1898 | MEDIUM | 5.0 | 2.9 | 03.06.2009 17:00 | ||
CVE-2009-1899 | HIGH | 10.0 | 10.0 | 03.06.2009 17:00 | ||
CVE-2009-1900 | MEDIUM | 5.0 | 2.9 | 03.06.2009 17:00 | ||
CVE-2009-1901 | HIGH | 10.0 | 10.0 | 03.06.2009 17:00 | ||
CVE-2009-2746 | MEDIUM | 6.8 | 6.4 | 16.11.2009 19:30 | ||
CVE-2009-2747 | MEDIUM | 5.0 | 2.9 | 30.10.2011 10:55 | ||
CVE-2009-3106 | MEDIUM | 5.0 | 2.9 | 08.09.2009 22:30 | ||
CVE-2009-3160 | HIGH | 8.8 | 9.2 | 10.09.2009 18:30 | ||
CVE-2010-0768 | MEDIUM | 4.3 | 2.9 | 01.04.2010 19:30 | ||
CVE-2010-0769 | LOW | 1.9 | 2.9 | 01.04.2010 19:30 | ||
CVE-2010-0770 | MEDIUM | 4.0 | 2.9 | 01.04.2010 19:30 | ||
CVE-2010-0774 | MEDIUM | 4.3 | 2.9 | 17.05.2010 22:30 | ||
CVE-2010-0775 | MEDIUM | 5.0 | 2.9 | 17.05.2010 22:30 | ||
CVE-2010-0776 | MEDIUM | 5.0 | 2.9 | 17.05.2010 22:30 | ||
CVE-2010-0777 | LOW | 2.6 | 2.9 | 17.05.2010 22:30 | ||
CVE-2010-0779 | MEDIUM | 4.3 | 2.9 | 24.06.2010 17:30 | ||
CVE-2010-0782 | MEDIUM | 4.3 | 2.9 | 20.10.2010 18:00 | ||
CVE-2010-1650 | LOW | 1.9 | 2.9 | 03.05.2010 13:51 | ||
CVE-2010-2637 | MEDIUM | 4.3 | 2.9 | 12.11.2010 21:00 | ||
CVE-2010-3271 | MEDIUM | 6.8 | 6.4 | 18.07.2011 22:55 | ||
CVE-2011-0314 | MEDIUM | 6.5 | 6.4 | 12.01.2011 01:00 | ||
CVE-2011-1224 | MEDIUM | 4.3 | 2.9 | 07.07.2011 21:55 | ||
CVE-2011-1307 | LOW | 2.1 | 2.9 | 08.03.2011 21:59 | ||
CVE-2011-1308 | MEDIUM | 4.3 | 2.9 | 08.03.2011 21:59 | ||
CVE-2011-1309 | HIGH | 7.5 | 6.4 | 08.03.2011 21:59 | ||
CVE-2011-1311 | MEDIUM | 6.0 | 6.4 | 08.03.2011 21:59 | ||
CVE-2011-1314 | MEDIUM | 5.0 | 2.9 | 08.03.2011 21:59 | ||
CVE-2011-1315 | MEDIUM | 5.0 | 2.9 | 08.03.2011 21:59 | ||
CVE-2011-1316 | MEDIUM | 5.0 | 2.9 | 08.03.2011 21:59 | ||
CVE-2011-1318 | MEDIUM | 5.0 | 2.9 | 08.03.2011 21:59 | ||
CVE-2012-0193 | MEDIUM | 5.0 | 2.9 | 20.01.2012 04:04 | ||
CVE-2012-2162 | MEDIUM | 6.8 | 6.4 | 01.05.2012 19:55 | ||
CVE-2013-0542 | MEDIUM | 4.3 | 2.9 | 24.04.2013 10:28 | ||
CVE-2014-0964 | HIGH | 7.1 | 6.9 | 16.05.2014 11:12 | ||
CVE-2014-4770 | LOW | 3.5 | 2.9 | 23.09.2014 22:55 | ||
CVE-2014-4816 | MEDIUM | 6.0 | 6.4 | 23.09.2014 22:55 | ||
CVE-2015-0176 | MEDIUM | 4.3 | 2.9 | 27.04.2015 11:59 | ||
CVE-2016-3013 | MEDIUM | 6.5 | 3.6 | 22.02.2017 19:59 | ||
CVE-2016-3052 | MEDIUM | 5.9 | 3.6 | 22.02.2017 19:59 |
References ?
No references are available for this certificate.
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2007-3265', 'CVE-2007-1608', 'CVE-2016-3052', 'CVE-2015-0176', 'CVE-2005-3498', 'CVE-2008-0740', 'CVE-2008-0741', 'CVE-2007-3960', 'CVE-2006-5323', 'CVE-2006-5324', 'CVE-2007-4833', 'CVE-2007-5798', 'CVE-2007-1944', 'CVE-2008-5411', 'CVE-2007-5799', 'CVE-2008-5413', 'CVE-2007-3264', 'CVE-2007-3263', 'CVE-2007-3262', 'CVE-2016-3013', 'CVE-2009-0504']}
values added.
- The following values were inserted:
-
24.03.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2007-3265', 'CVE-2007-1608', 'CVE-2016-3052', 'CVE-2015-0176', 'CVE-2005-3498', 'CVE-2008-0740', 'CVE-2008-0741', 'CVE-2007-3960', 'CVE-2006-5323', 'CVE-2006-5324', 'CVE-2007-4833', 'CVE-2007-5798', 'CVE-2007-1944', 'CVE-2008-5411', 'CVE-2007-5799', 'CVE-2008-5413', 'CVE-2007-3264', 'CVE-2007-3263', 'CVE-2007-3262', 'CVE-2016-3013', 'CVE-2009-0504']}
values discarded.
- The related_cves property was updated, with the
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2016-3013', 'CVE-2016-3052', 'CVE-2013-0542']}
values added.
- The errors property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
True
. - The report_convert_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was updated.
- The report_pdf_hash property was set to
e0a94363a3a69502dd53a983f764943d01ccc32eaf94321e7bc351ad673dee1d
. - The report_txt_hash property was set to
f883690f8aa0bf4dd2bf89c5e25dac95bd07de881ec1d56b38a2dc2d50fe4d9f
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 489763, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Santosh Chokhani', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20060605135214-03'00'", '/Title': 'Validation Report', '/CreationDate': "D:20060605135152-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-06-0024', 'cert_item': 'IBM WebSphere Application Server', 'cert_lab': 'US NIAP'}, 'canada': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-06-0024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 1': 1, 'EAL4+': 2, 'EAL4': 21, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM': 1}, 'ALC': {'ALC_FLR.1': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10075-vr.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-06-0024
.
- The report_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
False
. - The report_convert_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf, code: 408']
. - The report_pdf_hash property was set to
None
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The report_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf, code: 408']
.
- The errors property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
True
. - The report_convert_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was updated.
- The report_pdf_hash property was set to
e0a94363a3a69502dd53a983f764943d01ccc32eaf94321e7bc351ad673dee1d
. - The report_txt_hash property was set to
f883690f8aa0bf4dd2bf89c5e25dac95bd07de881ec1d56b38a2dc2d50fe4d9f
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 489763, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Santosh Chokhani', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20060605135214-03'00'", '/Title': 'Validation Report', '/CreationDate': "D:20060605135152-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-06-0024', 'cert_item': 'IBM WebSphere Application Server', 'cert_lab': 'US NIAP'}, 'canada': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-06-0024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 1': 1, 'EAL4+': 2, 'EAL4': 21, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM': 1}, 'ALC': {'ALC_FLR.1': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10075-vr.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-06-0024
.
- The report_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
False
. - The report_convert_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-st.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf, code: 408']
. - The report_pdf_hash property was set to
None
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2005-1112', 'CVE-2006-4137', 'CVE-2011-1308', 'CVE-2005-4833', 'CVE-2007-3265', 'CVE-2007-1608', 'CVE-2007-3397', 'CVE-2007-5483', 'CVE-2011-1318', 'CVE-2006-4136', 'CVE-2006-6637', 'CVE-2011-1316', 'CVE-2005-3498', 'CVE-2006-4223', 'CVE-2008-0740', 'CVE-2008-0741', 'CVE-2011-1309', 'CVE-2006-3231', 'CVE-2006-2430', 'CVE-2007-3960', 'CVE-2012-2162', 'CVE-2006-2429', 'CVE-2006-2431', 'CVE-2008-4679', 'CVE-2006-5323', 'CVE-2006-6636', 'CVE-2006-5324', 'CVE-2011-1315', 'CVE-2007-4833', 'CVE-2011-1307', 'CVE-2011-1311', 'CVE-2006-4222', 'CVE-2007-5798', 'CVE-2006-2433', 'CVE-2008-2550', 'CVE-2007-1944', 'CVE-2006-2342', 'CVE-2007-6679', 'CVE-2008-4284', 'CVE-2008-5411', 'CVE-2008-4678', 'CVE-2007-5799', 'CVE-2008-5413', 'CVE-2005-0425', 'CVE-2007-3264', 'CVE-2005-4413', 'CVE-2011-1314', 'CVE-2007-3263', 'CVE-2007-3262', 'CVE-2006-3232', 'CVE-2008-0389', 'CVE-2012-0193', 'CVE-2011-1224', 'CVE-2011-0314']}
values added. - The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The report_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2005-1112', 'CVE-2006-4137', 'CVE-2011-1308', 'CVE-2005-4833', 'CVE-2007-3265', 'CVE-2007-1608', 'CVE-2007-3397', 'CVE-2007-5483', 'CVE-2011-1318', 'CVE-2006-4136', 'CVE-2006-6637', 'CVE-2011-1316', 'CVE-2005-3498', 'CVE-2006-4223', 'CVE-2011-1309', 'CVE-2006-3231', 'CVE-2006-2430', 'CVE-2007-3960', 'CVE-2012-2162', 'CVE-2006-2429', 'CVE-2006-2431', 'CVE-2006-5323', 'CVE-2006-6636', 'CVE-2006-5324', 'CVE-2011-1315', 'CVE-2007-4833', 'CVE-2011-1307', 'CVE-2011-1311', 'CVE-2006-4222', 'CVE-2007-5798', 'CVE-2006-2433', 'CVE-2007-1944', 'CVE-2006-2342', 'CVE-2007-6679', 'CVE-2007-5799', 'CVE-2005-0425', 'CVE-2007-3264', 'CVE-2005-4413', 'CVE-2011-1314', 'CVE-2007-3263', 'CVE-2007-3262', 'CVE-2006-3232', 'CVE-2012-0193', 'CVE-2011-1224', 'CVE-2011-0314']}
values discarded.
- The errors property was set to
-
21.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf, code: nok']
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2008-4678', 'CVE-2008-0740', 'CVE-2008-5413', 'CVE-2008-2550', 'CVE-2008-0741', 'CVE-2008-0389', 'CVE-2008-4284', 'CVE-2008-4679', 'CVE-2008-5411']}
values discarded.
- The errors property was set to
-
10.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere_mq:6.0.2.3:*:*:*:*:*:*:*']}
values added. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2010-0782', 'CVE-2009-0439', 'CVE-2009-0896', 'CVE-2009-0905', 'CVE-2016-3013', 'CVE-2010-2637', 'CVE-2016-3052', 'CVE-2009-3160', 'CVE-2015-0176', 'CVE-2011-1224', 'CVE-2011-0314', 'CVE-2009-0900']}
values added.
- The cpe_matches property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
04.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere_mq:6.0.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_mq:6.0:*:*:*:*:*:*:*']}
values discarded. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2010-0782', 'CVE-2009-0439', 'CVE-2009-0896', 'CVE-2009-0905', 'CVE-2007-6044', 'CVE-2010-2637', 'CVE-2007-6705', 'CVE-2016-3013', 'CVE-2016-3052', 'CVE-2009-3160', 'CVE-2015-0176', 'CVE-2011-1224', 'CVE-2011-0314', 'CVE-2009-0900']}
values discarded.
- The cpe_matches property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'st_vid10075-vr.pdf', 'st_filename': 'st_vid10075-st.pdf'}
. - The report_keywords property was updated, with the
{'tee_name': {}}
data. - The st_keywords property was updated, with the
{'cc_sfr': {'__insert__': {'FAU': {'FAU_GEN': 2}}, '__update__': {'FCS': {'__insert__': {'FCS_CKM': 2}, '__update__': {'FCS_COP': 14, 'FCS_CKM.4': 2}}, 'FDP': {'__update__': {'FDP_ACC': 104, 'FDP_ACF': 145}}, 'FIA': {'__insert__': {'FIA_OBO': 15, 'FIA_ATD': 1, 'FIA_UAU': 1}, '__update__': {'FIA_UID.1': 12, 'FIA_UID.1.2': 1, 'FIA_USB': 2, 'FIA_USB.1': 11, 'FIA_UAU.1': 2}}, 'FMT': {'__update__': {'FMT_MSA': 75, 'FMT_SMF': 2, 'FMT_SMF.1': 8, 'FMT_SMR.1.1': 1, 'FMT_SMR': 2, 'FMT_SMR.1': 10}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.IDENTIFY': 5, 'O.MANAGE': 6, 'O.APP': 6, 'O.AUTH': 4, 'O.RECOVER': 4}, '__delete__': ['O.EXP']}, 'T': {'__delete__': ['T']}}, '__delete__': ['OE']}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 25}}}}}}, 'tee_name': {}}
data.
- The following values were inserted:
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 489763, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Santosh Chokhani', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20060605135214-03'00'", '/Title': 'Validation Report', '/CreationDate': "D:20060605135152-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2458843, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 121, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Donna Skibbie', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20060605133702-03'00'", '/Title': 'WebSphere Application Server EAL4+ Security Target', '/CreationDate': "D:20060605133340-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.omg.org/docs/formal/99-10-07.pdf', 'http://www1.ibm.com/support/docview.wss?rs=180&uid=swg24011697', 'http://www.w3.org/XML/', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/welc6tech_ejb.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_trust.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_corba.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/crun_ha_hamanager.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/rorb_r4lno.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/cwsu_over.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_jaccauthorization.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.etools.j2eeapp.doc/topics/cjarch.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tnam_ovr2.html', 'http://www.omg.org/cgi-bin/doc?formal/01-12-01', 'http://java.sun.com/webservices/saaj/', 'http://www.w3.org/TR/soap/', 'http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24011697', 'http://csrc.nist.gov/cryptval/140-1/1401val2004.htm', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/rovr_fips.html', 'http://www.w3.org/TR/wsdl', 'http://jcp.org/en/jsr/detail?id=101', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/cweb_jov2.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/urun_chain_typedcs.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_jaas.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tdat_tccrtprovds.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/welc6tech_nam.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/twbs_usewbs.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/welc6tech_orb.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tdat_jdbcconnect.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tsec_ldap.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tsec_msso.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.ihs.doc/info/welcome_ihs.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tm_learn.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/glossary.html', 'http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/cwbs_clienttransport.html']}}
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
.
- The st_extract_ok property was set to
-
27.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2009-0506', 'CVE-2009-0437', 'CVE-2007-1945', 'CVE-2010-2323', 'CVE-2008-5412', 'CVE-2010-2324', 'CVE-2010-2327', 'CVE-2010-2325', 'CVE-2006-7198', 'CVE-2011-1378', 'CVE-2011-1683']}
values discarded.
- The related_cves property was updated, with the
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/reports/pdf/686005d0b5ff5c5c.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/686005d0b5ff5c5c.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/686005d0b5ff5c5c.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/686005d0b5ff5c5c.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-06-0024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 1': 1, 'EAL4+': 2, 'EAL4': 21, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM': 1}, 'ALC': {'ALC_FLR.1': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 123, 'EAL4': 12}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 6}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.1': 8, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 5, 'FCS_COP': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 4}, 'FDP': {'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_ACC.1': 3, 'FDP_IFC.1': 2}, 'FIA': {'FIA_UID.1.1': 2, 'FIA_UID': 1, 'FIA_UID.1': 14, 'FIA_UID.1.2': 2, 'FIA_USB': 1, 'FIA_USB.1': 13, 'FIA_USB.1.1': 2, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_ATD.1': 5, 'FIA_UAU.1': 3}, 'FMT': {'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_SMF.1': 9, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR': 1, 'FMT_SMR.1': 13, 'FMT_SMR.1.2': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.1': 9, 'FMT_MSA.3': 6, 'FMT_MSA.2': 9}}, 'cc_claims': {'O': {'O.ACCESS': 7, 'O.IDENTIFY': 6, 'O.INVOKE_SSL': 5, 'O.MANAGE': 7, 'O.ADMIN': 6, 'O.APP': 7, 'O.ATTR': 7, 'O.AUTH': 5, 'O.PROTECT': 8, 'O.RECOVER': 5, 'O.TRANSFER': 5, 'O.EXP': 1}, 'T': {'T': 4, 'T.ACCESS_RES': 3, 'T.ACCESS_TOE': 3, 'T.NETWORK': 3, 'T.APP': 3}, 'A': {'A.AUTH': 3, 'A.APP': 4, 'A.PROTECT': 3, 'A.ADMIN': 4}, 'OE': {'OE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TripleDES': 3}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 27}, 'TLS': {'TLS': 8}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS 186-2': 1, 'FIPS 140-1': 1, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 140': 1}, 'X509': {'x.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The cert_lab property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}]}
values discarded.
- The st_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'e0a94363a3a69502dd53a983f764943d01ccc32eaf94321e7bc351ad673dee1d', 'st_pdf_hash': '96bf6ea36120cc05f5ba4f45f12929a444735fd512b911ac6e36b218d14a33f0', 'report_txt_hash': 'f883690f8aa0bf4dd2bf89c5e25dac95bd07de881ec1d56b38a2dc2d50fe4d9f', 'st_txt_hash': 'd6e1e1ec57ece8ca3f5bf192c9befc7bc4182dc13e56cbf7cd629be2bdb0d7c2'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 7}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 3, 'DES': 3}, 'rules_asymmetric_crypto': {'DSA': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 27, 'TLS': 8}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
21.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere_mq:6.0.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_mq:6.0:*:*:*:*:*:*:*']}
values added. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2010-0782', 'CVE-2009-0439', 'CVE-2009-0896', 'CVE-2009-0905', 'CVE-2007-6705', 'CVE-2016-3013', 'CVE-2007-6044', 'CVE-2010-2637', 'CVE-2009-3160', 'CVE-2011-1224', 'CVE-2016-3052', 'CVE-2015-0176', 'CVE-2011-1378', 'CVE-2011-0314', 'CVE-2009-0900']}
values added.
- The cpe_matches property was updated, with the
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
29.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2005-1112', 'CVE-2007-1945', 'CVE-2006-4137', 'CVE-2009-2746', 'CVE-2005-4833', 'CVE-2009-0217', 'CVE-2009-0434', 'CVE-2007-3265', 'CVE-2007-1608', 'CVE-2007-3397', 'CVE-2008-5412', 'CVE-2007-5483', 'CVE-2006-4136', 'CVE-2009-0891', 'CVE-2009-0436', 'CVE-2006-6637', 'CVE-2005-3498', 'CVE-2006-4223', 'CVE-2008-0740', 'CVE-2009-0437', 'CVE-2008-0741', 'CVE-2009-1900', 'CVE-2006-3231', 'CVE-2006-2430', 'CVE-2007-3960', 'CVE-2006-2429', 'CVE-2008-4679', 'CVE-2009-3106', 'CVE-2006-5323', 'CVE-2006-6636', 'CVE-2006-5324', 'CVE-2006-2431', 'CVE-2007-4833', 'CVE-2009-0506', 'CVE-2006-4222', 'CVE-2007-5798', 'CVE-2008-2550', 'CVE-2007-1944', 'CVE-2006-2433', 'CVE-2009-1899', 'CVE-2007-6679', 'CVE-2006-2342', 'CVE-2009-1898', 'CVE-2008-4284', 'CVE-2006-7198', 'CVE-2009-0433', 'CVE-2009-1901', 'CVE-2008-5411', 'CVE-2008-4678', 'CVE-2007-5799', 'CVE-2008-5413', 'CVE-2005-0425', 'CVE-2007-3264', 'CVE-2005-4413', 'CVE-2009-0508', 'CVE-2007-3263', 'CVE-2007-3262', 'CVE-2006-3232', 'CVE-2008-0389', 'CVE-2009-0504', 'CVE-2009-2747']}
values added.
- The related_cves property was updated, with the
-
28.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2005-1112', 'CVE-2007-1945', 'CVE-2006-4137', 'CVE-2009-2746', 'CVE-2005-4833', 'CVE-2009-0217', 'CVE-2009-0434', 'CVE-2007-3265', 'CVE-2007-1608', 'CVE-2007-3397', 'CVE-2008-5412', 'CVE-2007-5483', 'CVE-2006-4136', 'CVE-2009-0891', 'CVE-2009-0436', 'CVE-2006-6637', 'CVE-2005-3498', 'CVE-2006-4223', 'CVE-2008-0740', 'CVE-2009-0437', 'CVE-2008-0741', 'CVE-2009-1900', 'CVE-2006-3231', 'CVE-2006-2430', 'CVE-2007-3960', 'CVE-2006-2429', 'CVE-2008-4679', 'CVE-2009-3106', 'CVE-2006-5323', 'CVE-2006-6636', 'CVE-2006-5324', 'CVE-2006-2431', 'CVE-2007-4833', 'CVE-2009-0506', 'CVE-2006-4222', 'CVE-2007-5798', 'CVE-2008-2550', 'CVE-2007-1944', 'CVE-2006-2433', 'CVE-2009-1899', 'CVE-2007-6679', 'CVE-2006-2342', 'CVE-2009-1898', 'CVE-2008-4284', 'CVE-2006-7198', 'CVE-2009-0433', 'CVE-2009-1901', 'CVE-2008-5411', 'CVE-2008-4678', 'CVE-2007-5799', 'CVE-2008-5413', 'CVE-2005-0425', 'CVE-2007-3264', 'CVE-2005-4413', 'CVE-2009-0508', 'CVE-2007-3263', 'CVE-2007-3262', 'CVE-2006-3232', 'CVE-2008-0389', 'CVE-2009-0504', 'CVE-2009-2747']}
values discarded.
- The related_cves property was updated, with the
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The cert_lab property was set to
['US']
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-06-0024', 'cert_item': 'IBM WebSphere Application Server', 'cert_lab': 'US NIAP'}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['6.0.2.3']}
. - The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*']}
.
- The report_frontpage property was updated, with the
-
12.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
11.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
03.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[2, 'cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
02.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*'], [2, 'cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IBM WebSphere Application Server Version 6.0.2.3 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "686005d0b5ff5c5c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "CCEVS-VR-06-0024",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.0.2.3"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2010-0775",
"CVE-2006-2429",
"CVE-2015-0176",
"CVE-2009-3160",
"CVE-2010-2637",
"CVE-2008-0389",
"CVE-2009-2747",
"CVE-2006-6636",
"CVE-2006-6637",
"CVE-2006-4222",
"CVE-2008-2550",
"CVE-2006-3231",
"CVE-2012-2162",
"CVE-2006-2431",
"CVE-2006-3232",
"CVE-2009-1901",
"CVE-2009-0891",
"CVE-2007-3265",
"CVE-2007-1944",
"CVE-2010-0782",
"CVE-2016-3013",
"CVE-2008-5411",
"CVE-2006-4136",
"CVE-2005-1112",
"CVE-2008-5413",
"CVE-2006-2433",
"CVE-2009-0217",
"CVE-2009-0900",
"CVE-2011-1311",
"CVE-2007-3264",
"CVE-2005-4413",
"CVE-2014-0964",
"CVE-2006-5323",
"CVE-2007-4833",
"CVE-2010-0776",
"CVE-2010-3271",
"CVE-2005-3498",
"CVE-2007-1608",
"CVE-2008-0740",
"CVE-2006-5324",
"CVE-2010-0768",
"CVE-2009-0896",
"CVE-2010-0779",
"CVE-2007-5483",
"CVE-2008-4678",
"CVE-2012-0193",
"CVE-2009-0436",
"CVE-2006-4223",
"CVE-2010-1650",
"CVE-2006-4137",
"CVE-2009-0434",
"CVE-2009-0433",
"CVE-2009-1898",
"CVE-2011-1308",
"CVE-2005-4833",
"CVE-2007-3263",
"CVE-2006-2342",
"CVE-2007-6679",
"CVE-2016-3052",
"CVE-2008-4284",
"CVE-2014-4770",
"CVE-2011-1316",
"CVE-2009-0504",
"CVE-2008-0741",
"CVE-2011-1314",
"CVE-2008-4679",
"CVE-2013-0542",
"CVE-2010-0769",
"CVE-2007-3262",
"CVE-2006-2430",
"CVE-2007-3397",
"CVE-2011-1309",
"CVE-2011-1315",
"CVE-2009-0508",
"CVE-2009-1899",
"CVE-2009-1900",
"CVE-2011-1318",
"CVE-2009-2746",
"CVE-2011-1224",
"CVE-2005-0425",
"CVE-2010-0770",
"CVE-2007-5798",
"CVE-2010-0774",
"CVE-2009-3106",
"CVE-2007-3960",
"CVE-2007-5799",
"CVE-2009-0905",
"CVE-2011-1307",
"CVE-2011-0314",
"CVE-2009-0439",
"CVE-2010-0777",
"CVE-2014-4816"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "IBM Corporation",
"manufacturer_web": "https://www.ibm.com",
"name": "IBM WebSphere Application Server Version 6.0.2.3",
"not_valid_after": "2012-09-06",
"not_valid_before": "2006-05-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "st_vid10075-vr.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {
"cert_id": "CCEVS-VR-06-0024",
"cert_item": "IBM WebSphere Application Server",
"cert_lab": "US NIAP"
},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-06-0024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_SPM": 1
},
"ALC": {
"ALC_FLR.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 4,
"EAL 4 augmented": 1,
"EAL4": 21,
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Santosh Chokhani",
"/CreationDate": "D:20060605135152-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20060605135214-03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Validation Report",
"pdf_file_size_bytes": 489763,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "st_vid10075-st.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 4,
"A.APP": 4,
"A.AUTH": 3,
"A.PROTECT": 3
},
"O": {
"O.ACCESS": 7,
"O.ADMIN": 6,
"O.APP": 6,
"O.ATTR": 7,
"O.AUTH": 4,
"O.IDENTIFY": 5,
"O.INVOKE_SSL": 5,
"O.MANAGE": 6,
"O.PROTECT": 8,
"O.RECOVER": 4,
"O.TRANSFER": 5
},
"T": {
"T.ACCESS_RES": 3,
"T.ACCESS_TOE": 3,
"T.APP": 3,
"T.NETWORK": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 6
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_FLR.1": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF.1": 1,
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 12,
"EAL4+": 123
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 4,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 2,
"FCS_CKM.4.1": 1,
"FCS_COP": 14,
"FCS_COP.1": 5,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 104,
"FDP_ACC.1": 3,
"FDP_ACF": 145,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_ATD": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_OBO": 15,
"FIA_UAU": 1,
"FIA_UAU.1": 2,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1,
"FIA_USB": 2,
"FIA_USB.1": 11,
"FIA_USB.1.1": 2,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 75,
"FMT_MSA.1": 9,
"FMT_MSA.2": 9,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 6,
"FMT_SMF": 2,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 2,
"FMT_SMR": 2,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 25
},
"TLS": {
"TLS": 8
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-1": 1,
"FIPS 140-2": 2,
"FIPS 186-2": 1,
"FIPS 197": 1,
"FIPS 46-3": 1
},
"X509": {
"x.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TripleDES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Donna Skibbie",
"/CreationDate": "D:20060605133340-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20060605133702-03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "WebSphere Application Server EAL4+ Security Target",
"pdf_file_size_bytes": 2458843,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.ihs.doc/info/welcome_ihs.html",
"http://www.w3.org/TR/wsdl",
"http://jcp.org/en/jsr/detail?id=101",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/welc6tech_ejb.html",
"http://www.w3.org/TR/soap/",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tsec_msso.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/twbs_usewbs.html",
"http://csrc.nist.gov/cryptval/140-1/1401val2004.htm",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/cweb_jov2.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/rorb_r4lno.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/welc6tech_orb.html",
"http://www1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24011697",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.etools.j2eeapp.doc/topics/cjarch.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_jaas.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/crun_ha_hamanager.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tdat_jdbcconnect.html",
"http://www.w3.org/XML/",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/welc6tech_nam.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/glossary.html",
"http://www.omg.org/cgi-bin/doc?formal/01-12-01",
"http://www.omg.org/docs/formal/99-10-07.pdf",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_jaccauthorization.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tm_learn.html",
"http://java.sun.com/webservices/saaj/",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/cwsu_over.html",
"http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24011697",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tsec_ldap.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_trust.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/csec_corba.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/rovr_fips.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tdat_tccrtprovds.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/urun_chain_typedcs.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tnam_ovr2.html",
"http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/cwbs_clienttransport.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 121
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10075-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "e0a94363a3a69502dd53a983f764943d01ccc32eaf94321e7bc351ad673dee1d",
"report_txt_hash": "f883690f8aa0bf4dd2bf89c5e25dac95bd07de881ec1d56b38a2dc2d50fe4d9f",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "96bf6ea36120cc05f5ba4f45f12929a444735fd512b911ac6e36b218d14a33f0",
"st_txt_hash": "d6e1e1ec57ece8ca3f5bf192c9befc7bc4182dc13e56cbf7cd629be2bdb0d7c2"
},
"status": "archived"
}