This page was not yet optimized for use on mobile
devices.
Symantec™ Endpoint Protection Version 11.0
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 25.06.2008 |
| Valid until | 29.09.2015 |
| Scheme | 🇨🇦 CA |
| Manufacturer | Symantec Corporation |
| Category | Detection Devices and Systems |
| Security level | EAL2+, ALC_FLR.2, AVA_MSU.1 |
Heuristics summary
Certificate ID: 383-4-84
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Hash functions
SHA-1Vendor
Microsoft, Microsoft CorporationSecurity level
EAL 2+, EAL 2, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, AVA_MSU.1Security Functional Requirements (SFR)
FIA_PLA_EXP.1, FPT_SEP_EXPCertificates
383-4-84Evaluation facilities
EWA-CanadaStandards
FIPS 180-2File metadata
| Title | EAL X+ Evaluation of [Developer Long Name] |
|---|---|
| Author | kbraun |
| Creation date | D:20080715121453-04'00' |
| Modification date | D:20080715134509-04'00' |
| Pages | 16 |
| Creator | Acrobat PDFMaker 6.0 for Word |
| Producer | Acrobat Distiller 6.0 (Windows) |
Frontpage
| Certificate ID | 383-4-84 |
|---|---|
| Certification lab | CANADA |
Security target
Extracted keywords
Hash functions
SHA-1Protocols
SSLVendor
MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
O.ADMIN_GUIDANCE, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CONFIGURATION_IDENTIFICATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHY, O.DOCUMENTED_DESIGN, O.MANAGE, O.PARTIAL_FUNCTIONAL_TEST, O.PARTIAL_SELF_PROTECTION, O.VIRUS, O.VULNERABILITY_ANALYSIS, O.AUDIT_, O.AUDIT_PROTECT, O.CONFIGURATION_, O.CORRECT_TSF_, O.CRYTOGRAPHY, O.DOCUMENTED_, O.PARTIAL_, O.PARTIAL_SELF_, O.VULNERABILITY_, O.PARTIAL_SELF_PROTECTIO, O.PARTIAL_SELF_PROTECTI, O.CONFIGURATION_IDENTIFIC, O.CONFIGURATION_IDENTIFI, O.PARTIAL_FUNCTIONAL_TE, O.CORRECT_TSF_OPERATIO, O.PARTIAL_FUNCTIONA_TEST, O.PARTIAL_FUNCTIONAL_TES, T.ACCIDENTAL_ADMIN_ERROR, T.AUDIT_COMPROMISE, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNIDENTIFIED_ACTIONS, T.VIRUS, T.ACCIDENTAL_ADMIN, T._AUDIT_COMPROMISE, T.ACCIDENTAL_AD, T.AUDIT_, T.POOR_IMPLEMEN, T.TSF_COMPROMIS, T.UNATTENDED_, T.UNIDENTIFIED_A, A.AUDIT_BACKUP, A.NO_EVIL, A.PHYSICAL, A.SECURE_COMMS, A.SECURE_UPDATES, A.SECURE_UPDAT, OE.AUDIT_ALARM, OE.AUDIT_BACKUP, OE.AUDIT_STORAGE, OE.DISPLAY_BANNER, OE.DOMAIN_SEPARATION, OE.NO_BYPASS, OE.NO_EVIL, OE.PHYSICAL, OE.SECURE_COMMS, OE.SECURE_UPDATES, OE.TIME_STAMPS, OE.TOE_ACCESS, OE.DISPLAY_BANNE, OE.DOMAIN_, OE.RESIDUAL_, OE.SECURE_UPDAT, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_SOFSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_STG.4.2, FAU_STG, FAU_GEN, FAU_SAR, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_RIP.1, FDP_RIP.1.1, FDP_RIP.2, FDP_ITC.1, FDP_ACF, FDP_IFF, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_PLA_EXP.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID.2.1, FIA_PLA_EXP.1.1, FIA_UID.1, FIA_UAU.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_MSA.2, FPT_SEP_EXP.1, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_SEP_EXP.1.1, FPT_SEP_EXP.1.2, FPT_ITT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_SEP, FPT_RIP.2, FTA_SSL.1, FTA_TAB.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_TAB.1.1, FTP_SEP.1Evaluation facilities
EWA-CanadaStandards
FIPS 140-2, FIPS 180-2File metadata
| Title | Security Target for Common Criteria Evaluation |
|---|---|
| Subject | Symantec™ Endpoint Protection Version 11.0 |
| Author | Apex Assurance Group |
| Creation date | D:20080602151417Z |
| Modification date | D:20080702160337-04'00' |
| Pages | 68 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
383-4-84Extracted SARs
ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1CPE matches
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection_manager:11.0:*:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2009-1428 | MEDIUM | 4.3 | 2.9 | 29.04.2009 | ||
| CVE-2009-1429 | HIGH | 10.0 | 10.0 | 29.04.2009 | ||
| CVE-2009-1430 | HIGH | 9.3 | 10.0 | 29.04.2009 | ||
| CVE-2009-1431 | HIGH | 9.3 | 10.0 | 29.04.2009 | ||
| CVE-2009-1432 | MEDIUM | 5.0 | 2.9 | 30.04.2009 | ||
| CVE-2010-0106 | LOW | 1.9 | 2.9 | 19.02.2010 | ||
| CVE-2010-0108 | HIGH | 10.0 | 10.0 | 19.02.2010 | ||
| CVE-2010-0114 | HIGH | 7.5 | 6.4 | 22.12.2010 | ||
| CVE-2010-3268 | MEDIUM | 5.0 | 2.9 | 22.12.2010 | ||
| CVE-2011-0550 | MEDIUM | 4.3 | 2.9 | 15.08.2011 | ||
| CVE-2011-0551 | MEDIUM | 6.8 | 6.4 | 15.08.2011 | ||
| CVE-2012-0289 | HIGH | 7.2 | 10.0 | 23.05.2012 | ||
| CVE-2012-1421 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1425 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1443 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1446 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1456 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1457 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1459 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1461 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-1462 | MEDIUM | 4.3 | 2.9 | 21.03.2012 | ||
| CVE-2012-4348 | HIGH | 7.2 | 10.0 | 18.12.2012 | ||
| CVE-2012-4953 | HIGH | 9.3 | 10.0 | 14.11.2012 | ||
| CVE-2013-5009 | HIGH | 7.4 | 10.0 | 10.01.2014 | ||
| CVE-2013-5010 | MEDIUM | 4.6 | 6.4 | 10.01.2014 | ||
| CVE-2013-5011 | HIGH | 7.2 | 10.0 | 10.01.2014 | ||
| CVE-2013-5014 | HIGH | 7.5 | 6.4 | 14.02.2014 | ||
| CVE-2013-5015 | MEDIUM | 6.5 | 6.4 | 14.02.2014 | ||
| CVE-2014-3434 | MEDIUM | 6.9 | 10.0 | 06.08.2014 | ||
| CVE-2014-3437 | HIGH | 7.5 | 6.4 | 07.11.2014 | ||
| CVE-2014-3438 | MEDIUM | 4.3 | 2.9 | 07.11.2014 | ||
| CVE-2014-3439 | MEDIUM | 6.1 | 6.9 | 07.11.2014 | ||
| CVE-2014-9227 | MEDIUM | 4.4 | 6.4 | 20.09.2015 | ||
| CVE-2014-9228 | MEDIUM | 4.9 | 6.9 | 20.09.2015 | ||
| CVE-2014-9229 | MEDIUM | 6.5 | 6.4 | 20.09.2015 | ||
| CVE-2015-8113 | HIGH | 7.2 | 10.0 | 12.11.2015 | ||
| CVE-2016-5311 | HIGH | 7.8 | 5.9 | 09.01.2020 | ||
| CVE-2016-9093 | HIGH | 7.0 | 5.9 | 16.04.2018 | ||
| CVE-2016-9094 | HIGH | 7.8 | 5.9 | 16.04.2018 | ||
| CVE-2017-6331 | HIGH | 7.1 | 5.2 | 06.11.2017 | ||
| CVE-2018-12238 | HIGH | 7.8 | 5.9 | 29.11.2018 | ||
| CVE-2018-12239 | MEDIUM | 6.8 | 5.9 | 29.11.2018 | ||
| CVE-2018-12245 | HIGH | 7.8 | 5.9 | 29.11.2018 | ||
| CVE-2018-18368 | HIGH | 7.8 | 5.9 | 15.11.2019 | ||
| CVE-2018-5236 | MEDIUM | 5.3 | 3.6 | 20.06.2018 | ||
| CVE-2018-5237 | HIGH | 8.8 | 5.9 | 20.06.2018 | ||
| CVE-2019-12750 | HIGH | 7.8 | 5.9 | 31.07.2019 | ||
| CVE-2019-12756 | LOW | 2.3 | 1.4 | 15.11.2019 | ||
| CVE-2019-12757 | HIGH | 7.8 | 5.9 | 15.11.2019 | ||
| CVE-2019-12758 | MEDIUM | 6.7 | 5.9 | 15.11.2019 | ||
| CVE-2019-12759 | HIGH | 7.8 | 5.9 | 15.11.2019 | ||
| CVE-2019-18372 | HIGH | 7.8 | 5.9 | 15.11.2019 | ||
| CVE-2020-5820 | HIGH | 7.8 | 5.9 | 11.02.2020 | ||
| CVE-2020-5821 | HIGH | 7.8 | 5.9 | 11.02.2020 | ||
| CVE-2020-5822 | HIGH | 7.8 | 5.9 | 11.02.2020 | ||
| CVE-2020-5823 | HIGH | 7.8 | 5.9 | 11.02.2020 | ||
| CVE-2020-5824 | MEDIUM | 5.5 | 3.6 | 11.02.2020 | ||
| CVE-2020-5825 | MEDIUM | 5.5 | 3.6 | 11.02.2020 | ||
| CVE-2020-5826 | MEDIUM | 5.5 | 3.6 | 11.02.2020 | ||
| CVE-2020-5827 | LOW | 3.3 | 1.4 | 11.02.2020 | ||
| CVE-2020-5828 | LOW | 3.3 | 1.4 | 11.02.2020 | ||
| CVE-2020-5829 | LOW | 3.3 | 1.4 | 11.02.2020 | ||
| CVE-2020-5830 | LOW | 3.3 | 1.4 | 11.02.2020 | ||
| CVE-2020-5831 | LOW | 3.3 | 1.4 | 11.02.2020 | ||
| CVE-2020-5833 | LOW | 3.3 | 1.4 | 11.05.2020 | ||
| CVE-2020-5834 | MEDIUM | 5.3 | 1.4 | 11.05.2020 | ||
| CVE-2020-5835 | HIGH | 7.0 | 5.9 | 11.05.2020 | ||
| CVE-2020-5836 | HIGH | 7.8 | 5.9 | 11.05.2020 | ||
| CVE-2020-5837 | HIGH | 7.8 | 5.9 | 11.05.2020 | ||
Showing 5 out of 69.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Detection Devices and Systems",
"cert_link": null,
"dgst": "0d1b1dccbbd49d84",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-84",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection_manager:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"11.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2014-3439",
"CVE-2018-18368",
"CVE-2013-5011",
"CVE-2020-5824",
"CVE-2020-5827",
"CVE-2010-3268",
"CVE-2014-9229",
"CVE-2010-0108",
"CVE-2014-9228",
"CVE-2012-1456",
"CVE-2012-1446",
"CVE-2019-18372",
"CVE-2020-5829",
"CVE-2019-12750",
"CVE-2012-4953",
"CVE-2020-5834",
"CVE-2009-1429",
"CVE-2020-5821",
"CVE-2011-0550",
"CVE-2020-5830",
"CVE-2014-9227",
"CVE-2012-1461",
"CVE-2015-8113",
"CVE-2012-4348",
"CVE-2020-5820",
"CVE-2020-5823",
"CVE-2020-5826",
"CVE-2016-9094",
"CVE-2009-1431",
"CVE-2018-12245",
"CVE-2012-1457",
"CVE-2009-1430",
"CVE-2012-1459",
"CVE-2020-5837",
"CVE-2018-5237",
"CVE-2012-1443",
"CVE-2018-12239",
"CVE-2013-5009",
"CVE-2019-12759",
"CVE-2012-1425",
"CVE-2012-1462",
"CVE-2012-0289",
"CVE-2010-0114",
"CVE-2020-5825",
"CVE-2018-12238",
"CVE-2009-1428",
"CVE-2020-5822",
"CVE-2017-6331",
"CVE-2019-12758",
"CVE-2011-0551",
"CVE-2013-5010",
"CVE-2018-5236",
"CVE-2014-3437",
"CVE-2020-5835",
"CVE-2009-1432",
"CVE-2010-0106",
"CVE-2020-5828",
"CVE-2016-9093",
"CVE-2019-12757",
"CVE-2013-5015",
"CVE-2016-5311",
"CVE-2013-5014",
"CVE-2014-3434",
"CVE-2014-3438",
"CVE-2020-5833",
"CVE-2020-5836",
"CVE-2020-5831",
"CVE-2019-12756",
"CVE-2012-1421"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Symantec Corporation",
"manufacturer_web": "https://www.symantec.com",
"name": "Symantec\u2122 Endpoint Protection Version 11.0",
"not_valid_after": "2015-09-29",
"not_valid_before": "2008-06-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "sepv110-cert-e.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-84",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-84": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
},
"AVA": {
"AVA_MSU.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 5,
"EAL 2 augmented": 2,
"EAL 2+": 2
}
},
"cc_sfr": {
"FIA": {
"FIA_PLA_EXP.1": 1
},
"FPT": {
"FPT_SEP_EXP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 180-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 8,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "kbraun",
"/CCEF": "CCEF name",
"/CR date": "dd month yyyy",
"/CR version": "x.x",
"/Certificate date": "dd month yyyy",
"/Comments": "PCR Template\nVersion 1.3",
"/CreationDate": "D:20080715121453-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/Developer name": "Developer name",
"/Document number": "383-4-xx-CR",
"/ETR title, version, date": "ETR title, version, date",
"/Evaluation completion date": "dd month yyyy",
"/ModDate": "D:20080715134509-04\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/ST Title": "ST title",
"/ST date": "dd month yyyy",
"/ST version": "ST version",
"/SourceModified": "D:20080715141427",
"/Sponsor": "Sponsor",
"/TOE Version": "5.0",
"/TOE name and version": "TOE name and version",
"/TOE short name": "TOE short name",
"/Title": "EAL X+ Evaluation of [Developer Long Name]",
"/_AdHocReviewCycleID": "-1880835950",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "White, Debra E.",
"/_EmailSubject": "Partial Post to full post",
"pdf_file_size_bytes": 117831,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.cse-cst.gc.ca/services/common-criteria/trusted-products-e.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "sepv110-sec-e.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUDIT_BACKUP": 1,
"A.NO_EVIL": 3,
"A.PHYSICAL": 1,
"A.SECURE_COMMS": 4,
"A.SECURE_UPDAT": 1,
"A.SECURE_UPDATES": 1
},
"O": {
"O.ADMIN_GUIDANCE": 6,
"O.ADMIN_ROLE": 4,
"O.AUDIT_": 1,
"O.AUDIT_GENERATION": 6,
"O.AUDIT_PROTECT": 2,
"O.AUDIT_PROTECTION": 1,
"O.AUDIT_REVIEW": 6,
"O.CONFIGURATION_": 1,
"O.CONFIGURATION_IDENTIFI": 2,
"O.CONFIGURATION_IDENTIFIC": 3,
"O.CONFIGURATION_IDENTIFICATION": 1,
"O.CORRECT_TSF_": 1,
"O.CORRECT_TSF_OPERATIO": 2,
"O.CORRECT_TSF_OPERATION": 6,
"O.CRYPTOGRAPHY": 2,
"O.CRYTOGRAPHY": 1,
"O.DOCUMENTED_": 1,
"O.DOCUMENTED_DESIGN": 7,
"O.MANAGE": 4,
"O.PARTIAL_": 1,
"O.PARTIAL_FUNCTIONAL_TE": 2,
"O.PARTIAL_FUNCTIONAL_TES": 1,
"O.PARTIAL_FUNCTIONAL_TEST": 3,
"O.PARTIAL_FUNCTIONA_TEST": 3,
"O.PARTIAL_SELF_": 1,
"O.PARTIAL_SELF_PROTECTI": 2,
"O.PARTIAL_SELF_PROTECTIO": 3,
"O.PARTIAL_SELF_PROTECTION": 1,
"O.VIRUS": 8,
"O.VULNERABILITY_": 1,
"O.VULNERABILITY_ANALYSIS": 4
},
"OE": {
"OE.AUDIT_ALARM": 4,
"OE.AUDIT_BACKUP": 3,
"OE.AUDIT_STORAGE": 5,
"OE.DISPLAY_BANNE": 1,
"OE.DISPLAY_BANNER": 2,
"OE.DOMAIN_": 3,
"OE.DOMAIN_SEPARATION": 3,
"OE.NO_BYPASS": 6,
"OE.NO_EVIL": 3,
"OE.PHYSICAL": 3,
"OE.RESIDUAL_": 2,
"OE.RESIDUAL_INFORMATION": 3,
"OE.SECURE_COMMS": 5,
"OE.SECURE_UPDAT": 1,
"OE.SECURE_UPDATES": 2,
"OE.TIME_STAMPS": 4,
"OE.TOE_ACCESS": 6
},
"T": {
"T.ACCIDENTAL_AD": 1,
"T.ACCIDENTAL_ADMIN": 2,
"T.ACCIDENTAL_ADMIN_ERROR": 1,
"T.AUDIT_": 1,
"T.AUDIT_COMPROMISE": 1,
"T.MASQUERADE": 1,
"T.POOR_DESIGN": 3,
"T.POOR_IMPLEMEN": 1,
"T.POOR_IMPLEMENTATION": 1,
"T.POOR_TEST": 3,
"T.RESIDUAL_DATA": 1,
"T.TSF_COMPROMIS": 1,
"T.TSF_COMPROMISE": 3,
"T.UNATTENDED_": 1,
"T.UNATTENDED_SESSION": 1,
"T.UNIDENTIFIED_A": 1,
"T.UNIDENTIFIED_ACTIONS": 3,
"T.VIRUS": 1,
"T._AUDIT_COMPROMISE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 5
},
"ADO": {
"ADO_DEL.1": 5,
"ADO_IGS.1": 4
},
"ADV": {
"ADV_FSP.1": 4,
"ADV_HLD.1": 4,
"ADV_RCR.1": 5
},
"AGD": {
"AGD_ADM.1": 5,
"AGD_USR.1": 4
},
"ALC": {
"ALC_FLR.2": 7
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 3,
"ATE_IND.2": 4
},
"AVA": {
"AVA_MSU.1": 7,
"AVA_SOF": 2,
"AVA_SOF.1": 3,
"AVA_VLA.1": 6
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL2 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 11,
"FAU_GEN.2.1": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 13,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 10,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 11,
"FAU_SAR.3.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 18,
"FAU_STG.1.1": 2,
"FAU_STG.1.2": 2,
"FAU_STG.4": 11,
"FAU_STG.4.1": 1,
"FAU_STG.4.2": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 10,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACF": 2,
"FDP_IFF": 2,
"FDP_ITC.1": 2,
"FDP_RIP.1": 4,
"FDP_RIP.1.1": 1,
"FDP_RIP.2": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PLA_EXP.1": 6,
"FIA_PLA_EXP.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 2,
"FMT_MSA.2": 2,
"FMT_MTD.1": 12,
"FMT_MTD.1.1": 5,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_ITT.1": 5,
"FPT_ITT.1.1": 1,
"FPT_RIP.2": 1,
"FPT_RVM.1": 5,
"FPT_RVM.1.1": 1,
"FPT_SEP": 2,
"FPT_SEP.1": 5,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_SEP_EXP.1": 12,
"FPT_SEP_EXP.1.1": 1,
"FPT_SEP_EXP.1.2": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_SSL.1": 6,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_SEP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 5,
"FIPS 180-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 8
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apex Assurance Group",
"/CreationDate": "D:20080602151417Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20080702160337-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Symantec\u2122 Endpoint Protection Version 11.0",
"/Title": "Security Target for Common Criteria Evaluation",
"pdf_file_size_bytes": 913344,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.apexassurance.com/",
"http://www.symantec.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/sepv110-cert-e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+",
"AVA_MSU.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/sepv110-sec-e.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aeb43bbf0610f7263c568a593030426df953ad9f86d929de4563fc0c2a76733b",
"txt_hash": "7c8536812cc41256bf62352b2131908f1c707b85decc06b6594b043c1acb6751"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fc3c72dfa7ff9ff6696f344b5a7f240dd1c27a8961bb13a61a46617b1164b144",
"txt_hash": "344af52a73d9b3e484538525ac806103032becc5dd89213e4fc73620535cc401"
}
},
"status": "archived"
}