Hewlett-Packard Tru64 UNIX V5.1A
CSV information ?
Status | archived |
---|---|
Valid from | 01.02.2004 |
Valid until | 05.03.2013 |
Scheme | 🇬🇧 UK |
Manufacturer | Hewlett-Packard Company |
Category | Operating Systems |
Security level | EAL1 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL1, EAL7Certificates
CERTIFICATION REPORT No. P199Certification process
out of scope, The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user, respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOECertification process
out of scope, The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user, respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOEStandards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title: | tru64_cr_1_0.doc |
---|---|
Author: | racook |
Creation date: | D:20040213085521Z |
Modification date: | D:20131204151403Z |
Pages: | 24 |
Creator: | tru64_cr_1_0 - Microsoft Word |
Producer: | Acrobat PDFWriter 5.0 for Windows NT |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
E2Security level
EAL1, EAL3Claims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.INSTALL, O.PHYSICAL, O.CREDEN, A.NETWORK, A.CONNECT, A.PEER, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADM, A.COOPSecurity Assurance Requirements (SAR)
ACM_CAP.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.3.1, FAU_GEN.1.2, FAU_SAR.1.2, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1, FIA_UID.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UID.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_REV, FMT_SMR.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.1, FMT_MTD.1, FPT_AMT.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_STM.1, FPT_STM.1.1, FPT_AMT.1.1, FPT_SEP.1.2Standards
ISO/IEC 15408, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title: | Tru64ST Issue 1.0.rtf |
---|---|
Author: | racook |
Creation date: | D:20040218114941 |
Pages: | 39 |
Creator: | Tru64ST Issue 1.0 - Microsoft Word |
Producer: | Acrobat PDFWriter 5.0 for Windows NT |
References
No references.
Heuristics ?
Extracted SARs
ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1, ADV_FSP.1CPE matches
- cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2000-1031 | MEDIUM | 4.6 | 6.4 | 11.12.2000 05:00 | ||
CVE-2002-1604 | HIGH | 7.5 | 6.4 | 02.09.2002 04:00 | ||
CVE-2002-1605 | HIGH | 7.5 | 6.4 | 02.09.2002 04:00 | ||
CVE-2002-1606 | MEDIUM | 4.6 | 6.4 | 30.08.2002 04:00 | ||
CVE-2002-1607 | MEDIUM | 4.6 | 6.4 | 31.08.2002 04:00 | ||
CVE-2002-1608 | MEDIUM | 4.6 | 6.4 | 31.08.2002 04:00 | ||
CVE-2002-1609 | MEDIUM | 4.6 | 6.4 | 30.08.2002 04:00 | ||
CVE-2002-1610 | LOW | 2.1 | 2.9 | 30.08.2002 04:00 | ||
CVE-2002-1611 | MEDIUM | 4.6 | 6.4 | 30.08.2002 04:00 | ||
CVE-2002-1612 | HIGH | 7.2 | 10.0 | 13.09.2002 04:00 | ||
CVE-2002-1613 | HIGH | 7.2 | 10.0 | 10.09.2002 04:00 | ||
CVE-2002-1614 | HIGH | 7.2 | 10.0 | 09.09.2002 04:00 | ||
CVE-2002-1615 | HIGH | 7.2 | 10.0 | 13.09.2002 04:00 | ||
CVE-2002-1616 | HIGH | 7.2 | 10.0 | 01.08.2002 04:00 | ||
CVE-2002-1617 | HIGH | 7.2 | 10.0 | 31.12.2002 05:00 | ||
CVE-2002-1784 | MEDIUM | 5.0 | 2.9 | 31.12.2002 05:00 | ||
CVE-2003-0221 | HIGH | 7.2 | 10.0 | 12.05.2003 04:00 | ||
CVE-2003-1496 | HIGH | 10.0 | 10.0 | 31.12.2003 05:00 | ||
CVE-2004-0657 | MEDIUM | 5.0 | 2.9 | 06.08.2004 04:00 | ||
CVE-2004-2678 | MEDIUM | 5.1 | 6.4 | 31.12.2004 05:00 | ||
CVE-2005-0719 | LOW | 2.1 | 2.9 | 09.03.2005 05:00 | ||
CVE-2005-2993 | LOW | 1.7 | 2.9 | 20.09.2005 20:03 | ||
CVE-2005-3670 | HIGH | 7.8 | 6.9 | 18.11.2005 21:03 | ||
CVE-2006-5452 | MEDIUM | 4.6 | 6.4 | 23.10.2006 17:07 | ||
CVE-2006-6418 | HIGH | 7.2 | 10.0 | 10.12.2006 11:28 | ||
CVE-2007-0805 | LOW | 2.1 | 2.9 | 07.02.2007 11:28 | ||
CVE-2007-2553 | HIGH | 7.2 | 10.0 | 09.05.2007 17:19 | ||
CVE-2007-2791 | HIGH | 10.0 | 10.0 | 22.05.2007 00:30 | ||
CVE-2007-6519 | MEDIUM | 4.9 | 6.9 | 24.12.2007 20:46 | ||
CVE-2008-4414 | HIGH | 7.2 | 10.0 | 07.11.2008 19:35 |
References ?
No references are available for this certificate.
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56', 'txt_hash': '652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec', 'txt_hash': '4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}
. - The report_frontpage property was set to
{}
. - The st_frontpage property was set to
None
.
- The following values were inserted:
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2003-0221', 'CVE-2005-2993']}
values added.
- The following values were inserted:
-
24.03.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2003-0221', 'CVE-2005-2993']}
values discarded.
- The related_cves property was updated, with the
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2004-2678', 'CVE-2003-0221', 'CVE-2004-0657', 'CVE-2003-1496']}
values added.
- The related_cves property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec
. - The st_txt_hash property was set to
4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 158515, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 39, '/Creator': 'Tru64ST Issue 1.0 - Microsoft Word', '/CreationDate': 'D:20040218114941', '/Title': 'Tru64ST Issue 1.0.rtf', '/Author': 'racook', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 12, 'EAL3': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.1': 1}, 'ADO': {'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ATE': {'ATE_IND.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.1.1': 2, 'FAU_GEN.2': 1, 'FAU_GEN.2.1': 2, 'FAU_SAR.1': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.2': 1, 'FAU_SAR.2.1': 2, 'FAU_SAR.3': 2, 'FAU_SEL.1': 2, 'FAU_STG.1': 1, 'FAU_STG.1.1': 2, 'FAU_STG.3': 2, 'FAU_SAR.3.1': 2, 'FAU_SEL.1.1': 2, 'FAU_STG.3.1': 2, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 2, 'FDP_ACF.1': 8, 'FDP_RIP': 3, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, 'FIA': {'FIA_ATD.1': 2, 'FIA_SOS.1': 1, 'FIA_SOS.1.1': 3, 'FIA_UAU.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.7': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.1': 2, 'FIA_UID.1.2': 2, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 2, 'FIA_UID.1.1': 2}, 'FMT': {'FMT_MSA.1': 2, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 2, 'FMT_MTD': 14, 'FMT_REV': 12, 'FMT_SMR.1': 2, 'FMT_SMR.1.2': 3, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 4, 'FMT_MTD.1': 1}, 'FPT': {'FPT_AMT.1': 2, 'FPT_RVM.1': 1, 'FPT_RVM.1.1': 2, 'FPT_SEP.1': 1, 'FPT_SEP.1.1': 2, 'FPT_STM.1': 1, 'FPT_STM.1.1': 2, 'FPT_AMT.1.1': 2, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 1, 'O.DISCRETIONARY_ACCESS': 1, 'O.AUDITING': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.MANAGE': 1, 'O.ENFORCEMENT': 1, 'O.INSTALL': 3, 'O.PHYSICAL': 2, 'O.CREDEN': 1}, 'A': {'A.NETWORK': 6, 'A.CONNECT': 6, 'A.PEER': 5, 'A.LOCATE': 1, 'A.PROTECT': 1, 'A.MANAGE': 1, 'A.NO_EVIL_ADM': 1, 'A.COOP': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'E2': {'E2': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Tru64STIssue1.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}]}
.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/CRP199.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tru64STIssue1.pdf, code: 408']
.
- The errors property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tru64STIssue1.pdf, code: nok']
.
- The errors property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tru64STIssue1.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2007-0805', 'CVE-2007-2553', 'CVE-2007-2791', 'CVE-2006-6418', 'CVE-2005-2993', 'CVE-2007-6519', 'CVE-2006-5452', 'CVE-2005-0719', 'CVE-2005-3670', 'CVE-2008-4414']}
values added. - The extracted_sars property was set to
None
.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec
. - The st_txt_hash property was set to
4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 158515, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 39, '/Creator': 'Tru64ST Issue 1.0 - Microsoft Word', '/CreationDate': 'D:20040218114941', '/Title': 'Tru64ST Issue 1.0.rtf', '/Author': 'racook', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 12, 'EAL3': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.1': 1}, 'ADO': {'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ATE': {'ATE_IND.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.1.1': 2, 'FAU_GEN.2': 1, 'FAU_GEN.2.1': 2, 'FAU_SAR.1': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.2': 1, 'FAU_SAR.2.1': 2, 'FAU_SAR.3': 2, 'FAU_SEL.1': 2, 'FAU_STG.1': 1, 'FAU_STG.1.1': 2, 'FAU_STG.3': 2, 'FAU_SAR.3.1': 2, 'FAU_SEL.1.1': 2, 'FAU_STG.3.1': 2, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 2, 'FDP_ACF.1': 8, 'FDP_RIP': 3, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, 'FIA': {'FIA_ATD.1': 2, 'FIA_SOS.1': 1, 'FIA_SOS.1.1': 3, 'FIA_UAU.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.7': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.1': 2, 'FIA_UID.1.2': 2, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 2, 'FIA_UID.1.1': 2}, 'FMT': {'FMT_MSA.1': 2, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 2, 'FMT_MTD': 14, 'FMT_REV': 12, 'FMT_SMR.1': 2, 'FMT_SMR.1.2': 3, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 4, 'FMT_MTD.1': 1}, 'FPT': {'FPT_AMT.1': 2, 'FPT_RVM.1': 1, 'FPT_RVM.1.1': 2, 'FPT_SEP.1': 1, 'FPT_SEP.1.1': 2, 'FPT_STM.1': 1, 'FPT_STM.1.1': 2, 'FPT_AMT.1.1': 2, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 1, 'O.DISCRETIONARY_ACCESS': 1, 'O.AUDITING': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.MANAGE': 1, 'O.ENFORCEMENT': 1, 'O.INSTALL': 3, 'O.PHYSICAL': 2, 'O.CREDEN': 1}, 'A': {'A.NETWORK': 6, 'A.CONNECT': 6, 'A.PEER': 5, 'A.LOCATE': 1, 'A.PROTECT': 1, 'A.MANAGE': 1, 'A.NO_EVIL_ADM': 1, 'A.COOP': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'E2': {'E2': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Tru64STIssue1.pdf
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2007-0805', 'CVE-2007-2553', 'CVE-2007-2791', 'CVE-2006-6418', 'CVE-2005-2993', 'CVE-2007-6519', 'CVE-2006-5452', 'CVE-2005-0719', 'CVE-2005-3670']}
values discarded. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}]}
.
- The st_download_ok property was set to
-
21.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tru64STIssue1.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2008-4414']}
values discarded. - The extracted_sars property was set to
None
.
- The st_download_ok property was set to
-
17.11.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0524']}
values discarded.
- The related_cves property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
04.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*']}
values added. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2002-1614', 'CVE-2000-1031', 'CVE-2002-1608', 'CVE-2005-3670', 'CVE-2008-4414', 'CVE-2004-0657', 'CVE-2007-2553', 'CVE-2004-2678', 'CVE-2006-6418', 'CVE-2002-1609', 'CVE-2002-1784', 'CVE-2003-1496', 'CVE-2002-1605', 'CVE-2007-0805', 'CVE-2007-2791', 'CVE-2005-0719', 'CVE-2002-1610', 'CVE-2002-1615', 'CVE-2002-1617', 'CVE-2003-0221', 'CVE-2002-1607', 'CVE-2002-1613', 'CVE-2002-1612', 'CVE-2002-1611', 'CVE-2002-1604', 'CVE-2007-6519', 'CVE-2002-1606']}
values added.
- The cpe_matches property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'CRP199.pdf', 'st_filename': 'Tru64STIssue1.pdf'}
. - The report_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL1': 18}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE': 1}, '__delete__': ['. The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE', 'o respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE']}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL1': 12}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1.2': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3': 2, 'FAU_SEL.1': 2, 'FAU_STG.1.2': 1, 'FAU_STG.3': 2}}, 'FDP': {'__insert__': {'FDP_RIP': 3}, '__update__': {'FDP_ACC.1': 2, 'FDP_ACF.1': 8, 'FDP_ACF.1.2': 3}}, 'FIA': {'__update__': {'FIA_ATD.1': 2, 'FIA_UAU.1': 2, 'FIA_UID.1': 2}}, 'FMT': {'__insert__': {'FMT_MTD': 14, 'FMT_REV': 12}, '__update__': {'FMT_MSA.1': 2, 'FMT_SMR.1': 2}}, 'FPT': {'__update__': {'FPT_AMT.1': 2, 'FPT_SEP.1.2': 1}}}}, 'vendor': {}}
data.
The computed heuristics were updated.
- The cert_id property was set to
CRP199
.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P199': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 30}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE': 1, 'The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user': 1, 'o respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 10, 'EAL3': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.1': 1}, 'ADO': {'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ATE': {'ATE_IND.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2': 1, 'FAU_GEN.2.1': 2, 'FAU_SAR.1': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_SAR.2': 1, 'FAU_SAR.2.1': 2, 'FAU_SAR.3': 1, 'FAU_SEL.1': 1, 'FAU_STG.1': 1, 'FAU_STG.1.1': 2, 'FAU_STG.1.2': 2, 'FAU_STG.3': 1, 'FAU_SAR.3.1': 2, 'FAU_SEL.1.1': 2, 'FAU_STG.3.1': 2}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, 'FIA': {'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_SOS.1.1': 3, 'FIA_UAU.1': 1, 'FIA_UAU.1.2': 2, 'FIA_UAU.7': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.1': 1, 'FIA_UID.1.2': 2, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 2, 'FIA_UID.1.1': 2}, 'FMT': {'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 2, 'FMT_SMR.1': 1, 'FMT_SMR.1.2': 3, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 4, 'FMT_MTD.1': 1}, 'FPT': {'FPT_AMT.1': 1, 'FPT_RVM.1': 1, 'FPT_RVM.1.1': 2, 'FPT_SEP.1': 1, 'FPT_SEP.1.1': 2, 'FPT_SEP.1.2': 2, 'FPT_STM.1': 1, 'FPT_STM.1.1': 2, 'FPT_AMT.1.1': 2}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 1, 'O.DISCRETIONARY_ACCESS': 1, 'O.AUDITING': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.MANAGE': 1, 'O.ENFORCEMENT': 1, 'O.INSTALL': 3, 'O.PHYSICAL': 2, 'O.CREDEN': 1}, 'A': {'A.NETWORK': 6, 'A.CONNECT': 6, 'A.PEER': 5, 'A.LOCATE': 1, 'A.PROTECT': 1, 'A.MANAGE': 1, 'A.NO_EVIL_ADM': 1, 'A.COOP': 1}}, 'vendor': {'STMicroelectronics': {'STM': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'E2': {'E2': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 1}]}
values discarded.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56', 'st_pdf_hash': 'ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec', 'report_txt_hash': '652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715', 'st_txt_hash': '4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'E2': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
21.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*']}
values discarded. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2002-1614', 'CVE-2000-1031', 'CVE-2002-1608', 'CVE-2005-3670', 'CVE-2008-4414', 'CVE-2004-0657', 'CVE-2007-2553', 'CVE-2004-2678', 'CVE-2006-6418', 'CVE-2002-1609', 'CVE-2002-1784', 'CVE-2003-1496', 'CVE-2002-1605', 'CVE-2007-0805', 'CVE-2007-2791', 'CVE-2005-0719', 'CVE-2002-1610', 'CVE-2002-1615', 'CVE-2002-1617', 'CVE-2003-0221', 'CVE-2002-1607', 'CVE-2002-1613', 'CVE-2002-1612', 'CVE-2002-1604', 'CVE-2002-1611', 'CVE-2007-6519', 'CVE-2002-1606']}
values discarded.
- The cpe_matches property was updated, with the
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
29.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was set to
{'_type': 'Set', 'elements': ['CVE-1999-0524', 'CVE-2005-2993', 'CVE-2002-1614', 'CVE-2000-1031', 'CVE-2002-1608', 'CVE-2005-3670', 'CVE-2008-4414', 'CVE-2004-0657', 'CVE-2007-2553', 'CVE-2004-2678', 'CVE-2002-1616', 'CVE-2006-6418', 'CVE-2002-1609', 'CVE-2002-1784', 'CVE-2002-1605', 'CVE-2003-1496', 'CVE-2007-0805', 'CVE-2007-2791', 'CVE-2005-0719', 'CVE-2002-1610', 'CVE-2002-1615', 'CVE-2002-1617', 'CVE-2003-0221', 'CVE-2002-1607', 'CVE-2002-1613', 'CVE-2002-1612', 'CVE-2002-1604', 'CVE-2002-1611', 'CVE-2006-5452', 'CVE-2007-6519', 'CVE-2002-1606']}
.
- The related_cves property was set to
-
28.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was set to
None
.
- The related_cves property was set to
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['5.1']}
. - The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*']}
.
- The report_frontpage property was updated, with the
-
12.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [13, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [15, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [22, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [23, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
11.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [4, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [6, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*'], [13, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [15, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [27, 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*'], [28, 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
03.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [13, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [22, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [23, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [27, 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
02.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [18, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [23, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [15, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [27, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [28, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hewlett-Packard Tru64 UNIX V5.1A was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "8fa872c5e9d49a55",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP199",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2002-1610",
"CVE-2000-1031",
"CVE-2002-1608",
"CVE-2002-1605",
"CVE-2002-1611",
"CVE-2006-5452",
"CVE-2002-1616",
"CVE-2005-2993",
"CVE-2002-1614",
"CVE-2002-1784",
"CVE-2002-1613",
"CVE-2002-1617",
"CVE-2002-1615",
"CVE-2003-0221",
"CVE-2007-2553",
"CVE-2005-0719",
"CVE-2002-1612",
"CVE-2004-2678",
"CVE-2007-2791",
"CVE-2002-1604",
"CVE-2002-1606",
"CVE-2004-0657",
"CVE-2007-0805",
"CVE-2006-6418",
"CVE-2002-1607",
"CVE-2003-1496",
"CVE-2007-6519",
"CVE-2008-4414",
"CVE-2005-3670",
"CVE-2002-1609"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hewlett-Packard Company",
"manufacturer_web": "https://www.hp.com",
"name": "Hewlett-Packard Tru64 UNIX V5.1A",
"not_valid_after": "2013-03-05",
"not_valid_before": "2004-02-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP199.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P199": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL1": 18,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE\u2019s user": 1,
"out of scope": 2,
"respond to requests for Telnet \u0026 FTP services. The network, including clients of FTP \u0026 Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "racook",
"/CreationDate": "D:20040213085521Z",
"/Creator": "tru64_cr_1_0 - Microsoft Word",
"/ModDate": "D:20131204151403Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "tru64_cr_1_0.doc",
"pdf_file_size_bytes": 84416,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "Tru64STIssue1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT": 6,
"A.COOP": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NETWORK": 6,
"A.NO_EVIL_ADM": 1,
"A.PEER": 5,
"A.PROTECT": 1
},
"O": {
"O.AUDITING": 1,
"O.AUTHORIZATION": 1,
"O.CREDEN": 1,
"O.DISCRETIONARY_ACCESS": 1,
"O.ENFORCEMENT": 1,
"O.INSTALL": 3,
"O.MANAGE": 1,
"O.PHYSICAL": 2,
"O.RESIDUAL_INFORMATION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.1": 1
},
"ADO": {
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.1": 1,
"ADV_RCR.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ATE": {
"ATE_IND.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 12,
"EAL3": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 1,
"FAU_GEN.2.1": 2,
"FAU_SAR.1": 1,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 1,
"FAU_SAR.2.1": 2,
"FAU_SAR.3": 2,
"FAU_SAR.3.1": 2,
"FAU_SEL.1": 2,
"FAU_SEL.1.1": 2,
"FAU_STG.1": 1,
"FAU_STG.1.1": 2,
"FAU_STG.1.2": 1,
"FAU_STG.3": 2,
"FAU_STG.3.1": 2
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_RIP": 3
},
"FIA": {
"FIA_ATD.1": 2,
"FIA_ATD.1.1": 3,
"FIA_SOS.1": 1,
"FIA_SOS.1.1": 3,
"FIA_UAU.1": 2,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.7": 1,
"FIA_UAU.7.1": 2,
"FIA_UID.1": 2,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MSA.1": 2,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 1,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD": 14,
"FMT_MTD.1": 1,
"FMT_REV": 12,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 4,
"FMT_SMR.1.2": 3
},
"FPT": {
"FPT_AMT.1": 2,
"FPT_AMT.1.1": 2,
"FPT_RVM.1": 1,
"FPT_RVM.1.1": 2,
"FPT_SEP.1": 1,
"FPT_SEP.1.1": 2,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 1,
"FPT_STM.1.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"ISO": {
"ISO/IEC 15408": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"E2": {
"E2": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "racook",
"/CreationDate": "D:20040218114941",
"/Creator": "Tru64ST Issue 1.0 - Microsoft Word",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "Tru64ST Issue 1.0.rtf",
"pdf_file_size_bytes": 158515,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP199.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/Tru64STIssue1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56",
"txt_hash": "652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec",
"txt_hash": "4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41"
}
},
"status": "archived"
}