Hewlett-Packard Tru64 UNIX V5.1A

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 01.02.2004
Valid until 05.03.2013
Scheme 🇬🇧 UK
Manufacturer Hewlett-Packard Company
Category Operating Systems
Security level EAL1

Heuristics summary ?

Certificate ID: CRP199

Certification report ?

Extracted keywords

Security level
EAL1, EAL7
Certificates
CERTIFICATION REPORT No. P199
Certification process
out of scope, The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user, respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE

Certification process
out of scope, The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user, respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE

Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title: tru64_cr_1_0.doc
Author: racook
Creation date: D:20040213085521Z
Modification date: D:20131204151403Z
Pages: 24
Creator: tru64_cr_1_0 - Microsoft Word
Producer: Acrobat PDFWriter 5.0 for Windows NT

References

Security target ?

Extracted keywords

Symmetric Algorithms
E2

Security level
EAL1, EAL3
Claims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.INSTALL, O.PHYSICAL, O.CREDEN, A.NETWORK, A.CONNECT, A.PEER, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADM, A.COOP
Security Assurance Requirements (SAR)
ACM_CAP.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.3.1, FAU_GEN.1.2, FAU_SAR.1.2, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1, FIA_UID.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UID.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_REV, FMT_SMR.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.1, FMT_MTD.1, FPT_AMT.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_STM.1, FPT_STM.1.1, FPT_AMT.1.1, FPT_SEP.1.2

Standards
ISO/IEC 15408, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title: Tru64ST Issue 1.0.rtf
Author: racook
Creation date: D:20040218114941
Pages: 39
Creator: Tru64ST Issue 1.0 - Microsoft Word
Producer: Acrobat PDFWriter 5.0 for Windows NT

References

Heuristics ?

Certificate ID: CRP199

Extracted SARs

AGD_ADM.1, ADV_FSP.1, ATE_IND.1, AGD_USR.1, ADV_RCR.1

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2000-1031
C M N
MEDIUM 4.6 6.4 11.12.2000 05:00
CVE-2002-1604
C M N
HIGH 7.5 6.4 02.09.2002 04:00
CVE-2002-1605
C M N
HIGH 7.5 6.4 02.09.2002 04:00
CVE-2002-1606
C M N
MEDIUM 4.6 6.4 30.08.2002 04:00
CVE-2002-1607
C M N
MEDIUM 4.6 6.4 31.08.2002 04:00
CVE-2002-1608
C M N
MEDIUM 4.6 6.4 31.08.2002 04:00
CVE-2002-1609
C M N
MEDIUM 4.6 6.4 30.08.2002 04:00
CVE-2002-1610
C M N
LOW 2.1 2.9 30.08.2002 04:00
CVE-2002-1611
C M N
MEDIUM 4.6 6.4 30.08.2002 04:00
CVE-2002-1612
C M N
HIGH 7.2 10.0 13.09.2002 04:00
CVE-2002-1613
C M N
HIGH 7.2 10.0 10.09.2002 04:00
CVE-2002-1614
C M N
HIGH 7.2 10.0 09.09.2002 04:00
CVE-2002-1615
C M N
HIGH 7.2 10.0 13.09.2002 04:00
CVE-2002-1616
C M N
HIGH 7.2 10.0 01.08.2002 04:00
CVE-2002-1617
C M N
HIGH 7.2 10.0 31.12.2002 05:00
CVE-2002-1784
C M N
MEDIUM 5.0 2.9 31.12.2002 05:00
CVE-2003-0221
C M N
HIGH 7.2 10.0 12.05.2003 04:00
CVE-2003-1496
C M N
HIGH 10.0 10.0 31.12.2003 05:00
CVE-2004-0657
C M N
MEDIUM 5.0 2.9 06.08.2004 04:00
CVE-2004-2678
C M N
MEDIUM 5.1 6.4 31.12.2004 05:00
CVE-2005-0719
C M N
LOW 2.1 2.9 09.03.2005 05:00
CVE-2005-2993
C M N
LOW 1.7 2.9 20.09.2005 20:03
CVE-2005-3670
C M N
HIGH 7.8 6.9 18.11.2005 21:03
CVE-2006-5452
C M N
MEDIUM 4.6 6.4 23.10.2006 17:07
CVE-2006-6418
C M N
HIGH 7.2 10.0 10.12.2006 11:28
CVE-2007-0805
C M N
LOW 2.1 2.9 07.02.2007 11:28
CVE-2007-2553
C M N
HIGH 7.2 10.0 09.05.2007 17:19
CVE-2007-2791
C M N
HIGH 10.0 10.0 22.05.2007 00:30
CVE-2007-6519
C M N
MEDIUM 4.9 6.9 24.12.2007 20:46
CVE-2008-4414
C M N
HIGH 7.2 10.0 07.11.2008 19:35

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Hewlett-Packard Tru64 UNIX V5.1A was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [15, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [27, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [28, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [18, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [23, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [13, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [22, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [23, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [27, 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [4, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [6, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*'], [13, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [15, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [27, 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*'], [28, 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*']] values inserted.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*'], [7, 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*'], [13, 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*'], [15, 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*'], [17, 'cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*'], [22, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*'], [23, 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*'], [24, 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*'], [25, 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*'], [29, 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*']] values inserted.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['5.1']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to None.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2007-2553', 'CVE-2002-1604', 'CVE-2003-1496', 'CVE-2002-1613', 'CVE-2005-0719', 'CVE-2004-0657', 'CVE-2004-2678', 'CVE-2006-5452', 'CVE-2007-2791', 'CVE-2002-1615', 'CVE-2008-4414', 'CVE-2005-2993', 'CVE-2002-1612', 'CVE-2002-1611', 'CVE-2002-1616', 'CVE-2002-1608', 'CVE-1999-0524', 'CVE-2003-0221', 'CVE-2002-1609', 'CVE-2002-1606', 'CVE-2006-6418', 'CVE-2002-1610', 'CVE-2000-1031', 'CVE-2002-1784', 'CVE-2002-1605', 'CVE-2002-1607', 'CVE-2002-1617', 'CVE-2002-1614', 'CVE-2007-0805', 'CVE-2007-6519', 'CVE-2005-3670']}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]}}.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2007-2553', 'CVE-2002-1604', 'CVE-2003-1496', 'CVE-2002-1613', 'CVE-2005-0719', 'CVE-2004-0657', 'CVE-2004-2678', 'CVE-2007-2791', 'CVE-2002-1615', 'CVE-2008-4414', 'CVE-2002-1612', 'CVE-2002-1611', 'CVE-2002-1608', 'CVE-2003-0221', 'CVE-2002-1609', 'CVE-2002-1606', 'CVE-2006-6418', 'CVE-2002-1610', 'CVE-2002-1784', 'CVE-2000-1031', 'CVE-2002-1605', 'CVE-2002-1607', 'CVE-2002-1617', 'CVE-2002-1614', 'CVE-2007-0805', 'CVE-2007-6519', 'CVE-2005-3670']} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56', 'st_pdf_hash': 'ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec', 'report_txt_hash': '652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715', 'st_txt_hash': '4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'E2': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P199': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 30}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE': 1, 'The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user': 1, 'o respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 10, 'EAL3': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.1': 1}, 'ADO': {'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ATE': {'ATE_IND.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2': 1, 'FAU_GEN.2.1': 2, 'FAU_SAR.1': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_SAR.2': 1, 'FAU_SAR.2.1': 2, 'FAU_SAR.3': 1, 'FAU_SEL.1': 1, 'FAU_STG.1': 1, 'FAU_STG.1.1': 2, 'FAU_STG.1.2': 2, 'FAU_STG.3': 1, 'FAU_SAR.3.1': 2, 'FAU_SEL.1.1': 2, 'FAU_STG.3.1': 2}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, 'FIA': {'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_SOS.1.1': 3, 'FIA_UAU.1': 1, 'FIA_UAU.1.2': 2, 'FIA_UAU.7': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.1': 1, 'FIA_UID.1.2': 2, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 2, 'FIA_UID.1.1': 2}, 'FMT': {'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_MSA.3.1': 2, 'FMT_SMR.1': 1, 'FMT_SMR.1.2': 3, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 4, 'FMT_MTD.1': 1}, 'FPT': {'FPT_AMT.1': 1, 'FPT_RVM.1': 1, 'FPT_RVM.1.1': 2, 'FPT_SEP.1': 1, 'FPT_SEP.1.1': 2, 'FPT_SEP.1.2': 2, 'FPT_STM.1': 1, 'FPT_STM.1.1': 2, 'FPT_AMT.1.1': 2}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 1, 'O.DISCRETIONARY_ACCESS': 1, 'O.AUDITING': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.MANAGE': 1, 'O.ENFORCEMENT': 1, 'O.INSTALL': 3, 'O.PHYSICAL': 2, 'O.CREDEN': 1}, 'A': {'A.NETWORK': 6, 'A.CONNECT': 6, 'A.PEER': 5, 'A.LOCATE': 1, 'A.PROTECT': 1, 'A.MANAGE': 1, 'A.NO_EVIL_ADM': 1, 'A.COOP': 1}}, 'vendor': {'STMicroelectronics': {'STM': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'E2': {'E2': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_CAP', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'CRP199.pdf', 'st_filename': 'Tru64STIssue1.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL1': 18}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE': 1}, '__delete__': ['. The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE', 'o respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE']}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL1': 12}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1.2': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3': 2, 'FAU_SEL.1': 2, 'FAU_STG.1.2': 1, 'FAU_STG.3': 2}}, 'FDP': {'__insert__': {'FDP_RIP': 3}, '__update__': {'FDP_ACC.1': 2, 'FDP_ACF.1': 8, 'FDP_ACF.1.2': 3}}, 'FIA': {'__update__': {'FIA_ATD.1': 2, 'FIA_UAU.1': 2, 'FIA_UID.1': 2}}, 'FMT': {'__insert__': {'FMT_MTD': 14, 'FMT_REV': 12}, '__update__': {'FMT_MSA.1': 2, 'FMT_SMR.1': 2}}, 'FPT': {'__update__': {'FPT_AMT.1': 2, 'FPT_SEP.1.2': 1}}}}, 'vendor': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to CRP199.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*', 'cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2007-2553', 'CVE-2002-1604', 'CVE-2003-1496', 'CVE-2002-1613', 'CVE-2005-0719', 'CVE-2004-0657', 'CVE-2004-2678', 'CVE-2007-2791', 'CVE-2002-1615', 'CVE-2008-4414', 'CVE-2002-1612', 'CVE-2002-1611', 'CVE-2002-1608', 'CVE-2003-0221', 'CVE-2002-1609', 'CVE-2002-1606', 'CVE-2006-6418', 'CVE-2002-1610', 'CVE-2000-1031', 'CVE-2002-1784', 'CVE-2002-1605', 'CVE-2002-1607', 'CVE-2002-1617', 'CVE-2002-1614', 'CVE-2007-0805', 'CVE-2007-6519', 'CVE-2005-3670']} values added.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 17.11.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0524']} values discarded.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "8fa872c5e9d49a55",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "CRP199",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*"
      ]
    },
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2002-1607",
        "CVE-2006-6418",
        "CVE-2002-1614",
        "CVE-2002-1610",
        "CVE-2002-1608",
        "CVE-2002-1615",
        "CVE-2002-1613",
        "CVE-2003-0221",
        "CVE-2000-1031",
        "CVE-2004-2678",
        "CVE-2002-1609",
        "CVE-2002-1612",
        "CVE-2003-1496",
        "CVE-2005-0719",
        "CVE-2002-1616",
        "CVE-2007-0805",
        "CVE-2008-4414",
        "CVE-2006-5452",
        "CVE-2004-0657",
        "CVE-2002-1617",
        "CVE-2002-1606",
        "CVE-2002-1604",
        "CVE-2005-3670",
        "CVE-2007-2791",
        "CVE-2005-2993",
        "CVE-2007-2553",
        "CVE-2007-6519",
        "CVE-2002-1611",
        "CVE-2002-1784",
        "CVE-2002-1605"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hewlett-Packard Company",
  "manufacturer_web": "https://www.hp.com",
  "name": "Hewlett-Packard Tru64 UNIX V5.1A",
  "not_valid_after": "2013-03-05",
  "not_valid_before": "2004-02-01",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "CRP199.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CERTIFICATION REPORT No. P199": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL1": 18,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE\u2019s user": 1,
          "out of scope": 2,
          "respond to requests for Telnet \u0026 FTP services. The network, including clients of FTP \u0026 Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "racook",
      "/CreationDate": "D:20040213085521Z",
      "/Creator": "tru64_cr_1_0 - Microsoft Word",
      "/ModDate": "D:20131204151403Z",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "tru64_cr_1_0.doc",
      "pdf_file_size_bytes": 84416,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "Tru64STIssue1.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECT": 6,
          "A.COOP": 1,
          "A.LOCATE": 1,
          "A.MANAGE": 1,
          "A.NETWORK": 6,
          "A.NO_EVIL_ADM": 1,
          "A.PEER": 5,
          "A.PROTECT": 1
        },
        "O": {
          "O.AUDITING": 1,
          "O.AUTHORIZATION": 1,
          "O.CREDEN": 1,
          "O.DISCRETIONARY_ACCESS": 1,
          "O.ENFORCEMENT": 1,
          "O.INSTALL": 3,
          "O.MANAGE": 1,
          "O.PHYSICAL": 2,
          "O.RESIDUAL_INFORMATION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.1": 1
        },
        "ADO": {
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 1,
          "ADV_RCR.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 12,
          "EAL3": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 1,
          "FAU_GEN.2.1": 2,
          "FAU_SAR.1": 1,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 1,
          "FAU_SAR.2.1": 2,
          "FAU_SAR.3": 2,
          "FAU_SAR.3.1": 2,
          "FAU_SEL.1": 2,
          "FAU_SEL.1.1": 2,
          "FAU_STG.1": 1,
          "FAU_STG.1.1": 2,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 2,
          "FAU_STG.3.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_RIP": 3
        },
        "FIA": {
          "FIA_ATD.1": 2,
          "FIA_ATD.1.1": 3,
          "FIA_SOS.1": 1,
          "FIA_SOS.1.1": 3,
          "FIA_UAU.1": 2,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.7": 1,
          "FIA_UAU.7.1": 2,
          "FIA_UID.1": 2,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2
        },
        "FMT": {
          "FMT_MSA.1": 2,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 1,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD": 14,
          "FMT_MTD.1": 1,
          "FMT_REV": 12,
          "FMT_SMR.1": 2,
          "FMT_SMR.1.1": 4,
          "FMT_SMR.1.2": 3
        },
        "FPT": {
          "FPT_AMT.1": 2,
          "FPT_AMT.1.1": 2,
          "FPT_RVM.1": 1,
          "FPT_RVM.1.1": 2,
          "FPT_SEP.1": 1,
          "FPT_SEP.1.1": 2,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 1,
          "FPT_STM.1.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "E2": {
            "E2": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "racook",
      "/CreationDate": "D:20040218114941",
      "/Creator": "Tru64ST Issue 1.0 - Microsoft Word",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "Tru64ST Issue 1.0.rtf",
      "pdf_file_size_bytes": 158515,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 39
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP199.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Tru64STIssue1.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56",
    "report_txt_hash": "652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec",
    "st_txt_hash": "4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41"
  },
  "status": "archived"
}