Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
CSV information ?
Status | active |
---|---|
Valid from | 28.09.2022 |
Valid until | 28.09.2027 |
Scheme | 🇫🇷 FR |
Manufacturer | Apple Inc. |
Category | Mobility |
Security level | EAL2+, ALC_FLR.3, ADV_FSP.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
D.OS, D.SEP_SE, T.COR-, T.PHYSI-, T.RE-, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, T.RECOVER, T.CORRUPT, T.PHYSICAL, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EXTERNAL_KEY-, A.NO_EVIL_ROOT_USERSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- coveryStandards
FIPS 140-2File metadata
Title | [ST] MacBook_M1_macOS11_SecurityTarget_v1.6 |
---|---|
Author | ThanhHaLe |
Creation date | D:20220608091744Z00'00' |
Modification date | D:20220608091744Z00'00' |
Pages | 49 |
Creator | Word |
Producer | macOS Version 12.3.1 (Build 21E258) Quartz PDFContext |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL4, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR.3, ALC_FLRCertificates
ANSSI-CC-2022/44Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | ANSSI-CC-2022/44 |
---|---|
Subject | Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1 |
Keywords | [ANSSI Crypto] |
Author | [email protected] |
Creation date | D:20221010165312+02'00' |
Modification date | D:20221010165314+02'00' |
Pages | 13 |
Creator | Acrobat PDFMaker 21 pour Word |
Producer | Adobe PDF Library 21.11.71 |
Security target ?
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
D.OS, D.SEP_SE, T.COR-, T.PHYSI-, T.RE-, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, T.RECOVER, T.CORRUPT, T.PHYSICAL, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EXTERNAL_KEY-, A.NO_EVIL_ROOT_USERSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- coveryStandards
FIPS 140-2File metadata
Title | [ST] MacBook_M1_macOS11_SecurityTarget_v1.6 |
---|---|
Author | ThanhHaLe |
Creation date | D:20220608091744Z00'00' |
Modification date | D:20220608091744Z00'00' |
Pages | 49 |
Creator | Word |
Producer | macOS Version 12.3.1 (Build 21E258) Quartz PDFContext |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, ALC_FLR.3, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, ALC_CMC.2, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ASE_OBJ.2, ADV_FSP.3Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-0590 | HIGH | 10.0 | 10.0 | 01.06.2000 04:00 | ||
CVE-2001-0102 | HIGH | 7.2 | 10.0 | 12.02.2001 05:00 | ||
CVE-2013-0340 | MEDIUM | 6.8 | 6.4 | 21.01.2014 18:55 | ||
CVE-2018-25032 | HIGH | 7.5 | 3.6 | 25.03.2022 09:15 | ||
CVE-2020-36221 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36222 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36223 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36224 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36225 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36226 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36227 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36228 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36229 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-36230 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-9846 | MEDIUM | 5.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2021-1821 | MEDIUM | 6.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-22925 | MEDIUM | 5.3 | 1.4 | 05.08.2021 21:15 | ||
CVE-2021-22946 | HIGH | 7.5 | 3.6 | 29.09.2021 20:15 | ||
CVE-2021-22947 | MEDIUM | 5.9 | 3.6 | 29.09.2021 20:15 | ||
CVE-2021-23841 | MEDIUM | 5.9 | 3.6 | 16.02.2021 17:15 | ||
CVE-2021-30665 | HIGH | 8.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30668 | MEDIUM | 4.6 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30669 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30671 | LOW | 3.3 | 1.4 | 08.09.2021 15:15 | ||
CVE-2021-30672 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30673 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30676 | HIGH | 7.1 | 5.2 | 08.09.2021 15:15 | ||
CVE-2021-30677 | HIGH | 8.8 | 6.0 | 08.09.2021 15:15 | ||
CVE-2021-30678 | CRITICAL | 9.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30679 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30680 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30681 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30682 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30683 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30684 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30685 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30686 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30687 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30688 | HIGH | 8.8 | 6.0 | 08.09.2021 15:15 | ||
CVE-2021-30689 | MEDIUM | 6.1 | 2.7 | 08.09.2021 15:15 | ||
CVE-2021-30691 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30692 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30693 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30694 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30695 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30696 | MEDIUM | 5.9 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30697 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30698 | HIGH | 7.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30700 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30701 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30702 | MEDIUM | 4.6 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30703 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30704 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30705 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30706 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30707 | HIGH | 8.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30708 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30709 | MEDIUM | 5.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30710 | HIGH | 7.1 | 5.2 | 08.09.2021 15:15 | ||
CVE-2021-30712 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30713 | HIGH | 7.8 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30715 | HIGH | 7.5 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30716 | MEDIUM | 5.9 | 3.6 | 08.09.2021 15:15 | ||
CVE-2021-30717 | HIGH | 8.1 | 5.9 | 08.09.2021 15:15 | ||
CVE-2021-30718 | MEDIUM | 4.3 | 1.4 | 08.09.2021 15:15 | ||
CVE-2021-30719 | HIGH | 7.1 | 5.2 | 08.09.2021 15:15 | ||
CVE-2021-30720 | MEDIUM | 5.4 | 2.5 | 08.09.2021 14:15 | ||
CVE-2021-30721 | MEDIUM | 6.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30722 | MEDIUM | 5.9 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30723 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30724 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30725 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30726 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30727 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30728 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30731 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30733 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30734 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30735 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30736 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30737 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30738 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30739 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30740 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30744 | MEDIUM | 6.1 | 2.7 | 08.09.2021 14:15 | ||
CVE-2021-30746 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30748 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30749 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30751 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30753 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30755 | MEDIUM | 6.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30756 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30758 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30759 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30760 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30765 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30766 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30767 | MEDIUM | 5.5 | 3.6 | 23.12.2021 20:15 | ||
CVE-2021-30768 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30771 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2021-30772 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30774 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30775 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30776 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30777 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30778 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30779 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30780 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30781 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30783 | MEDIUM | 6.5 | 4.0 | 08.09.2021 14:15 | ||
CVE-2021-30784 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30785 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30786 | HIGH | 7.0 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30787 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30788 | HIGH | 7.1 | 5.2 | 08.09.2021 14:15 | ||
CVE-2021-30789 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30790 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30791 | MEDIUM | 5.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30792 | HIGH | 7.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30793 | CRITICAL | 9.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30795 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30796 | MEDIUM | 6.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30797 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30798 | HIGH | 7.5 | 3.6 | 08.09.2021 14:15 | ||
CVE-2021-30799 | HIGH | 8.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30803 | LOW | 3.3 | 1.4 | 08.09.2021 14:15 | ||
CVE-2021-30805 | CRITICAL | 9.8 | 5.9 | 08.09.2021 14:15 | ||
CVE-2021-30807 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30808 | MEDIUM | 5.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-30809 | HIGH | 8.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30811 | MEDIUM | 5.5 | 3.6 | 19.10.2021 14:15 | ||
CVE-2021-30813 | MEDIUM | 6.5 | 4.0 | 28.10.2021 19:15 | ||
CVE-2021-30814 | HIGH | 7.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30817 | MEDIUM | 5.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-30818 | HIGH | 8.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30819 | MEDIUM | 5.5 | 3.6 | 19.10.2021 14:15 | ||
CVE-2021-30821 | HIGH | 7.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30823 | MEDIUM | 6.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-30824 | HIGH | 7.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30827 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30828 | MEDIUM | 5.5 | 3.6 | 19.10.2021 14:15 | ||
CVE-2021-30829 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30830 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30831 | MEDIUM | 5.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-30832 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30833 | MEDIUM | 5.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-30834 | HIGH | 7.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30835 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30836 | MEDIUM | 5.5 | 3.6 | 28.10.2021 19:15 | ||
CVE-2021-30838 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30840 | HIGH | 7.8 | 5.9 | 28.10.2021 19:15 | ||
CVE-2021-30841 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30842 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30843 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30844 | HIGH | 7.5 | 3.6 | 19.10.2021 14:15 | ||
CVE-2021-30845 | MEDIUM | 5.5 | 3.6 | 19.10.2021 14:15 | ||
CVE-2021-30846 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30847 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30848 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30849 | HIGH | 7.8 | 5.9 | 19.10.2021 14:15 | ||
CVE-2021-30850 | MEDIUM | 5.5 | 3.6 | 19.10.2021 14:15 | ||
CVE-2021-30851 | HIGH | 8.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30852 | HIGH | 8.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30853 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30855 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30857 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30858 | HIGH | 8.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30859 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30860 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30861 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30864 | HIGH | 8.6 | 4.0 | 24.08.2021 19:15 | ||
CVE-2021-30865 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30866 | MEDIUM | 6.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30867 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30868 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30871 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30873 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30874 | HIGH | 7.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30876 | HIGH | 7.1 | 5.2 | 24.08.2021 19:15 | ||
CVE-2021-30877 | HIGH | 7.1 | 5.2 | 24.08.2021 19:15 | ||
CVE-2021-30879 | HIGH | 7.1 | 5.2 | 24.08.2021 19:15 | ||
CVE-2021-30880 | HIGH | 7.1 | 5.2 | 24.08.2021 19:15 | ||
CVE-2021-30881 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30883 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30884 | MEDIUM | 4.7 | 1.4 | 24.08.2021 19:15 | ||
CVE-2021-30886 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30887 | MEDIUM | 6.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30888 | HIGH | 7.4 | 4.0 | 24.08.2021 19:15 | ||
CVE-2021-30889 | HIGH | 8.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30890 | MEDIUM | 6.1 | 2.7 | 24.08.2021 19:15 | ||
CVE-2021-30892 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30895 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30897 | MEDIUM | 6.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30899 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30900 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30901 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30903 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30904 | MEDIUM | 5.3 | 1.4 | 24.08.2021 19:15 | ||
CVE-2021-30905 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30906 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30907 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30908 | LOW | 3.3 | 1.4 | 24.08.2021 19:15 | ||
CVE-2021-30909 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30910 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30911 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30912 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30913 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30915 | LOW | 2.4 | 1.4 | 24.08.2021 19:15 | ||
CVE-2021-30916 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30917 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30919 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30920 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30922 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30923 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30924 | HIGH | 7.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30925 | CRITICAL | 9.1 | 5.2 | 24.08.2021 19:15 | ||
CVE-2021-30926 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30927 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30928 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30929 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30930 | MEDIUM | 5.3 | 1.4 | 24.08.2021 19:15 | ||
CVE-2021-30931 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30933 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30935 | HIGH | 8.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30937 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30938 | HIGH | 7.7 | 5.2 | 24.08.2021 19:15 | ||
CVE-2021-30939 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30940 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30941 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30942 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30945 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30946 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30947 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30949 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30950 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30955 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30957 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30958 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30959 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30960 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30961 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30963 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30964 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30965 | MEDIUM | 6.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30966 | HIGH | 7.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30968 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30969 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30971 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30972 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30973 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30975 | HIGH | 8.6 | 6.0 | 24.08.2021 19:15 | ||
CVE-2021-30976 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30977 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30979 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30980 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30981 | HIGH | 7.8 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30982 | MEDIUM | 5.9 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30984 | HIGH | 7.5 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30990 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-30995 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-30996 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-31004 | HIGH | 7.0 | 5.9 | 24.08.2021 19:15 | ||
CVE-2021-31006 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-31007 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-31010 | HIGH | 7.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-31013 | MEDIUM | 5.5 | 3.6 | 24.08.2021 19:15 | ||
CVE-2021-36690 | HIGH | 7.5 | 3.6 | 24.08.2021 14:15 | ||
CVE-2021-36976 | MEDIUM | 6.5 | 3.6 | 20.07.2021 07:15 | ||
CVE-2021-4136 | HIGH | 7.8 | 5.9 | 19.12.2021 17:15 | ||
CVE-2021-4166 | HIGH | 7.1 | 5.2 | 25.12.2021 19:15 | ||
CVE-2021-4173 | HIGH | 7.8 | 5.9 | 27.12.2021 13:15 | ||
CVE-2021-4187 | HIGH | 7.8 | 5.9 | 29.12.2021 17:15 | ||
CVE-2021-4192 | HIGH | 7.8 | 5.9 | 31.12.2021 15:15 | ||
CVE-2021-4193 | MEDIUM | 5.5 | 3.6 | 31.12.2021 16:15 | ||
CVE-2021-44224 | HIGH | 8.2 | 4.2 | 20.12.2021 12:15 | ||
CVE-2021-44790 | CRITICAL | 9.8 | 5.9 | 20.12.2021 12:15 | ||
CVE-2021-45444 | HIGH | 7.8 | 5.9 | 14.02.2022 12:15 | ||
CVE-2022-0128 | HIGH | 7.8 | 5.9 | 06.01.2022 17:15 | ||
CVE-2022-0156 | MEDIUM | 5.5 | 3.6 | 10.01.2022 16:15 | ||
CVE-2022-0158 | LOW | 3.3 | 1.4 | 10.01.2022 16:15 | ||
CVE-2022-0261 | HIGH | 7.8 | 5.9 | 18.01.2022 16:15 | ||
CVE-2022-0318 | CRITICAL | 9.8 | 5.9 | 21.01.2022 12:15 | ||
CVE-2022-0319 | MEDIUM | 5.5 | 3.6 | 21.01.2022 14:15 | ||
CVE-2022-0351 | HIGH | 7.8 | 5.9 | 25.01.2022 18:15 | ||
CVE-2022-0530 | MEDIUM | 5.5 | 3.6 | 09.02.2022 23:15 | ||
CVE-2022-0554 | HIGH | 7.8 | 5.9 | 10.02.2022 22:15 | ||
CVE-2022-0572 | HIGH | 7.8 | 5.9 | 14.02.2022 12:15 | ||
CVE-2022-0629 | HIGH | 7.8 | 5.9 | 17.02.2022 12:15 | ||
CVE-2022-0685 | HIGH | 7.8 | 5.9 | 20.02.2022 11:15 | ||
CVE-2022-0696 | MEDIUM | 5.5 | 3.6 | 21.02.2022 20:15 | ||
CVE-2022-0714 | MEDIUM | 5.5 | 3.6 | 22.02.2022 20:15 | ||
CVE-2022-0729 | HIGH | 8.8 | 5.9 | 23.02.2022 14:15 | ||
CVE-2022-0943 | HIGH | 7.8 | 5.9 | 14.03.2022 21:15 | ||
CVE-2022-1381 | HIGH | 7.8 | 5.9 | 18.04.2022 01:15 | ||
CVE-2022-1420 | MEDIUM | 5.5 | 3.6 | 21.04.2022 11:15 | ||
CVE-2022-1616 | HIGH | 7.8 | 5.9 | 07.05.2022 19:15 | ||
CVE-2022-1619 | HIGH | 7.8 | 5.9 | 08.05.2022 10:15 | ||
CVE-2022-1620 | HIGH | 7.5 | 3.6 | 08.05.2022 11:15 | ||
CVE-2022-1621 | HIGH | 7.8 | 5.9 | 10.05.2022 14:15 | ||
CVE-2022-1622 | MEDIUM | 5.5 | 3.6 | 11.05.2022 15:15 | ||
CVE-2022-1629 | HIGH | 7.8 | 5.9 | 10.05.2022 14:15 | ||
CVE-2022-1674 | MEDIUM | 5.5 | 3.6 | 12.05.2022 11:15 | ||
CVE-2022-1720 | HIGH | 7.8 | 5.9 | 20.06.2022 15:15 | ||
CVE-2022-1725 | MEDIUM | 5.5 | 3.6 | 29.09.2022 03:15 | ||
CVE-2022-1733 | HIGH | 7.8 | 5.9 | 17.05.2022 17:15 | ||
CVE-2022-1735 | HIGH | 7.8 | 5.9 | 17.05.2022 19:15 | ||
CVE-2022-1769 | HIGH | 7.8 | 5.9 | 17.05.2022 17:15 | ||
CVE-2022-1851 | HIGH | 7.8 | 5.9 | 25.05.2022 13:15 | ||
CVE-2022-1897 | HIGH | 7.8 | 5.9 | 27.05.2022 15:15 | ||
CVE-2022-1898 | HIGH | 7.8 | 5.9 | 27.05.2022 09:15 | ||
CVE-2022-1927 | HIGH | 7.8 | 5.9 | 29.05.2022 14:15 | ||
CVE-2022-1942 | HIGH | 7.8 | 5.9 | 31.05.2022 14:15 | ||
CVE-2022-1968 | HIGH | 7.8 | 5.9 | 02.06.2022 14:15 | ||
CVE-2022-2000 | HIGH | 7.8 | 5.9 | 09.06.2022 16:15 | ||
CVE-2022-2042 | HIGH | 7.8 | 5.9 | 10.06.2022 19:15 | ||
CVE-2022-2124 | HIGH | 7.8 | 5.9 | 19.06.2022 10:15 | ||
CVE-2022-2125 | HIGH | 7.8 | 5.9 | 19.06.2022 12:15 | ||
CVE-2022-2126 | HIGH | 7.8 | 5.9 | 19.06.2022 13:15 | ||
CVE-2022-22578 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22579 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22582 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2022-22583 | MEDIUM | 5.5 | 3.6 | 18.03.2022 18:15 | ||
CVE-2022-22584 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22585 | HIGH | 7.5 | 3.6 | 18.03.2022 18:15 | ||
CVE-2022-22586 | CRITICAL | 9.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22587 | CRITICAL | 9.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22589 | MEDIUM | 6.1 | 2.7 | 18.03.2022 18:15 | ||
CVE-2022-22593 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22594 | MEDIUM | 6.5 | 3.6 | 18.03.2022 18:15 | ||
CVE-2022-22597 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22599 | LOW | 2.4 | 1.4 | 18.03.2022 18:15 | ||
CVE-2022-22600 | MEDIUM | 5.5 | 3.6 | 18.03.2022 18:15 | ||
CVE-2022-22616 | MEDIUM | 5.5 | 3.6 | 26.05.2022 18:15 | ||
CVE-2022-22617 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22625 | HIGH | 7.1 | 5.2 | 18.03.2022 18:15 | ||
CVE-2022-22626 | HIGH | 7.1 | 5.2 | 18.03.2022 18:15 | ||
CVE-2022-22627 | HIGH | 7.1 | 5.2 | 18.03.2022 18:15 | ||
CVE-2022-22630 | CRITICAL | 9.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2022-22631 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22633 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22639 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22651 | HIGH | 7.5 | 3.6 | 18.03.2022 18:15 | ||
CVE-2022-22657 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22662 | MEDIUM | 6.5 | 3.6 | 26.05.2022 18:15 | ||
CVE-2022-22663 | MEDIUM | 5.5 | 3.6 | 26.05.2022 18:15 | ||
CVE-2022-22664 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22665 | HIGH | 7.8 | 5.9 | 18.03.2022 18:15 | ||
CVE-2022-22672 | HIGH | 7.8 | 5.9 | 26.05.2022 18:15 | ||
CVE-2022-22674 | MEDIUM | 5.5 | 3.6 | 26.05.2022 18:15 | ||
CVE-2022-22675 | HIGH | 7.8 | 5.9 | 26.05.2022 18:15 | ||
CVE-2022-22719 | HIGH | 7.5 | 3.6 | 14.03.2022 11:15 | ||
CVE-2022-22720 | CRITICAL | 9.8 | 5.9 | 14.03.2022 11:15 | ||
CVE-2022-22721 | CRITICAL | 9.1 | 5.2 | 14.03.2022 11:15 | ||
CVE-2022-2294 | HIGH | 8.8 | 5.9 | 28.07.2022 02:15 | ||
CVE-2022-26688 | MEDIUM | 4.4 | 3.6 | 26.05.2022 18:15 | ||
CVE-2022-26691 | MEDIUM | 6.7 | 5.9 | 26.05.2022 18:15 | ||
CVE-2022-26697 | HIGH | 7.1 | 5.2 | 26.05.2022 19:15 | ||
CVE-2022-26698 | HIGH | 7.1 | 5.2 | 26.05.2022 19:15 | ||
CVE-2022-26699 | MEDIUM | 5.5 | 3.6 | 14.08.2023 23:15 | ||
CVE-2022-26701 | HIGH | 7.5 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26704 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26706 | MEDIUM | 5.5 | 3.6 | 26.05.2022 19:15 | ||
CVE-2022-26712 | MEDIUM | 5.5 | 3.6 | 26.05.2022 19:15 | ||
CVE-2022-26714 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26715 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26718 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26720 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26721 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26722 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26723 | CRITICAL | 9.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26726 | MEDIUM | 6.5 | 3.6 | 26.05.2022 19:15 | ||
CVE-2022-26728 | MEDIUM | 5.5 | 3.6 | 26.05.2022 19:15 | ||
CVE-2022-26730 | HIGH | 8.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-26731 | MEDIUM | 4.3 | 1.4 | 26.05.2022 19:15 | ||
CVE-2022-26737 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26738 | HIGH | 7.8 | 5.9 | 26.05.2022 19:15 | ||
CVE-2022-26745 | MEDIUM | 5.5 | 3.6 | 26.05.2022 20:15 | ||
CVE-2022-26746 | MEDIUM | 5.5 | 3.6 | 26.05.2022 20:15 | ||
CVE-2022-26748 | HIGH | 8.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26751 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26755 | MEDIUM | 6.3 | 4.0 | 26.05.2022 20:15 | ||
CVE-2022-26756 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26757 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26761 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26763 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26766 | MEDIUM | 5.5 | 3.6 | 26.05.2022 20:15 | ||
CVE-2022-26767 | MEDIUM | 5.5 | 3.6 | 26.05.2022 20:15 | ||
CVE-2022-26768 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26769 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26770 | HIGH | 7.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-26776 | CRITICAL | 9.8 | 5.9 | 26.05.2022 20:15 | ||
CVE-2022-28739 | HIGH | 7.5 | 3.6 | 09.05.2022 18:15 | ||
CVE-2022-29458 | HIGH | 7.1 | 5.2 | 18.04.2022 21:15 | ||
CVE-2022-32205 | MEDIUM | 4.3 | 1.4 | 07.07.2022 13:15 | ||
CVE-2022-32207 | CRITICAL | 9.8 | 5.9 | 07.07.2022 13:15 | ||
CVE-2022-32208 | MEDIUM | 5.9 | 3.6 | 07.07.2022 13:15 | ||
CVE-2022-32221 | CRITICAL | 9.8 | 5.9 | 05.12.2022 22:15 | ||
CVE-2022-32781 | MEDIUM | 4.4 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32785 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32786 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32787 | HIGH | 8.8 | 5.9 | 23.09.2022 19:15 | ||
CVE-2022-32790 | HIGH | 7.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32794 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32797 | HIGH | 7.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32800 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32805 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32807 | HIGH | 7.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32811 | HIGH | 7.8 | 5.9 | 24.08.2022 20:15 | ||
CVE-2022-32812 | HIGH | 7.8 | 5.9 | 24.08.2022 20:15 | ||
CVE-2022-32813 | HIGH | 7.8 | 5.9 | 24.08.2022 20:15 | ||
CVE-2022-32814 | HIGH | 7.8 | 5.9 | 23.09.2022 20:15 | ||
CVE-2022-32815 | HIGH | 7.8 | 5.9 | 23.09.2022 19:15 | ||
CVE-2022-32819 | HIGH | 7.8 | 5.9 | 23.09.2022 19:15 | ||
CVE-2022-32820 | HIGH | 7.8 | 5.9 | 23.09.2022 19:15 | ||
CVE-2022-32823 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32825 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32826 | HIGH | 7.8 | 5.9 | 23.09.2022 19:15 | ||
CVE-2022-32827 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32831 | HIGH | 7.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32832 | MEDIUM | 6.7 | 5.9 | 23.09.2022 19:15 | ||
CVE-2022-32833 | MEDIUM | 5.3 | 1.4 | 15.12.2022 19:15 | ||
CVE-2022-32834 | MEDIUM | 5.5 | 3.6 | 24.08.2022 20:15 | ||
CVE-2022-32838 | MEDIUM | 5.5 | 3.6 | 24.08.2022 20:15 | ||
CVE-2022-32839 | CRITICAL | 9.8 | 5.9 | 24.08.2022 20:15 | ||
CVE-2022-32843 | HIGH | 7.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32847 | CRITICAL | 9.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32848 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32849 | MEDIUM | 5.5 | 3.6 | 23.09.2022 19:15 | ||
CVE-2022-32851 | HIGH | 7.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32853 | HIGH | 7.1 | 5.2 | 23.09.2022 19:15 | ||
CVE-2022-32854 | MEDIUM | 5.5 | 3.6 | 20.09.2022 21:15 | ||
CVE-2022-32857 | MEDIUM | 4.3 | 1.4 | 24.08.2022 20:15 | ||
CVE-2022-32858 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32860 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-32862 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32864 | MEDIUM | 5.5 | 3.6 | 20.09.2022 21:15 | ||
CVE-2022-32865 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32866 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32867 | LOW | 2.4 | 1.4 | 01.11.2022 20:15 | ||
CVE-2022-32870 | LOW | 2.4 | 1.4 | 01.11.2022 20:15 | ||
CVE-2022-32875 | MEDIUM | 5.0 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32876 | LOW | 3.3 | 1.4 | 14.08.2023 23:15 | ||
CVE-2022-32877 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32879 | LOW | 2.4 | 1.4 | 01.11.2022 20:15 | ||
CVE-2022-32881 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32882 | CRITICAL | 9.8 | 5.9 | 20.09.2022 21:15 | ||
CVE-2022-32883 | MEDIUM | 5.5 | 3.6 | 20.09.2022 21:15 | ||
CVE-2022-32888 | HIGH | 8.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32890 | HIGH | 8.6 | 4.0 | 01.11.2022 20:15 | ||
CVE-2022-32892 | HIGH | 8.6 | 4.0 | 01.11.2022 20:15 | ||
CVE-2022-32894 | HIGH | 7.8 | 5.9 | 24.08.2022 20:15 | ||
CVE-2022-32895 | MEDIUM | 4.7 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32896 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2022-32897 | HIGH | 7.8 | 5.9 | 10.06.2024 20:15 | ||
CVE-2022-32898 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32899 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32900 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2022-32902 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2022-32904 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32905 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32908 | HIGH | 7.8 | 5.9 | 20.09.2022 21:15 | ||
CVE-2022-32910 | HIGH | 7.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32911 | HIGH | 7.8 | 5.9 | 20.09.2022 21:15 | ||
CVE-2022-32913 | LOW | 3.3 | 1.4 | 01.11.2022 20:15 | ||
CVE-2022-32914 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32915 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32917 | HIGH | 7.8 | 5.9 | 20.09.2022 21:15 | ||
CVE-2022-32918 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32919 | MEDIUM | 4.7 | 1.4 | 10.01.2024 22:15 | ||
CVE-2022-32922 | HIGH | 8.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32923 | MEDIUM | 6.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32924 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32926 | MEDIUM | 6.7 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32928 | MEDIUM | 5.3 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32931 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2022-32933 | MEDIUM | 5.3 | 1.4 | 10.06.2024 20:15 | ||
CVE-2022-32934 | HIGH | 8.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32935 | MEDIUM | 4.6 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32936 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-32938 | MEDIUM | 5.3 | 1.4 | 01.11.2022 20:15 | ||
CVE-2022-32940 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32941 | CRITICAL | 9.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32942 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-32944 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-32945 | MEDIUM | 4.3 | 1.4 | 15.12.2022 19:15 | ||
CVE-2022-32947 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-35252 | LOW | 3.7 | 1.4 | 23.09.2022 14:15 | ||
CVE-2022-35260 | MEDIUM | 6.5 | 3.6 | 05.12.2022 22:15 | ||
CVE-2022-37434 | CRITICAL | 9.8 | 5.9 | 05.08.2022 07:15 | ||
CVE-2022-3970 | HIGH | 8.8 | 5.9 | 13.11.2022 08:15 | ||
CVE-2022-40303 | HIGH | 7.5 | 3.6 | 23.11.2022 00:15 | ||
CVE-2022-40304 | HIGH | 7.8 | 5.9 | 23.11.2022 18:15 | ||
CVE-2022-42788 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42789 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42790 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42791 | HIGH | 7.0 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42793 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42795 | HIGH | 8.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42796 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42798 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42799 | MEDIUM | 6.1 | 2.7 | 01.11.2022 20:15 | ||
CVE-2022-42800 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42803 | HIGH | 7.0 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42806 | HIGH | 7.0 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42807 | MEDIUM | 4.3 | 1.4 | 23.06.2023 18:15 | ||
CVE-2022-42808 | CRITICAL | 9.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42809 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42810 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42811 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42813 | CRITICAL | 9.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42814 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42815 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42816 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2022-42818 | MEDIUM | 5.9 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42819 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42820 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42821 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42823 | HIGH | 8.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42824 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42825 | MEDIUM | 5.5 | 3.6 | 01.11.2022 20:15 | ||
CVE-2022-42826 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2022-42827 | HIGH | 7.8 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42828 | HIGH | 8.8 | 5.9 | 14.08.2023 23:15 | ||
CVE-2022-42829 | MEDIUM | 6.7 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42830 | MEDIUM | 6.7 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42831 | MEDIUM | 6.4 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42832 | MEDIUM | 6.4 | 5.9 | 01.11.2022 20:15 | ||
CVE-2022-42833 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2022-42834 | LOW | 3.3 | 1.4 | 23.06.2023 18:15 | ||
CVE-2022-42838 | LOW | 3.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2022-42839 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2022-42840 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42841 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42842 | CRITICAL | 9.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42845 | HIGH | 7.2 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42847 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42853 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42855 | HIGH | 7.1 | 5.2 | 15.12.2022 19:15 | ||
CVE-2022-42856 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42858 | HIGH | 7.8 | 5.9 | 10.04.2023 19:15 | ||
CVE-2022-42859 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42860 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2022-42861 | HIGH | 8.8 | 6.0 | 15.12.2022 19:15 | ||
CVE-2022-42862 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42863 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42864 | HIGH | 7.0 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42865 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42866 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42867 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42916 | HIGH | 7.5 | 3.6 | 29.10.2022 02:15 | ||
CVE-2022-46689 | HIGH | 7.0 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46690 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46691 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46692 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-46693 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46695 | MEDIUM | 6.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-46696 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46697 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46698 | MEDIUM | 6.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-46699 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46703 | MEDIUM | 5.5 | 3.6 | 10.04.2023 19:15 | ||
CVE-2022-46704 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2022-46705 | MEDIUM | 4.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2022-46706 | HIGH | 7.8 | 5.9 | 14.08.2023 23:15 | ||
CVE-2022-46710 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2022-46712 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2022-46713 | MEDIUM | 4.7 | 3.6 | 27.02.2023 20:15 | ||
CVE-2022-46716 | HIGH | 7.5 | 3.6 | 10.04.2023 19:15 | ||
CVE-2022-46718 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2022-46720 | HIGH | 8.6 | 6.0 | 08.05.2023 20:15 | ||
CVE-2022-46721 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2022-46722 | MEDIUM | 5.5 | 3.6 | 14.08.2023 23:15 | ||
CVE-2022-46723 | CRITICAL | 9.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2022-47915 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2022-47965 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2022-48504 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2022-48505 | MEDIUM | 5.5 | 3.6 | 28.06.2023 02:15 | ||
CVE-2022-48577 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2022-48578 | HIGH | 7.1 | 5.2 | 10.06.2024 20:15 | ||
CVE-2022-48683 | HIGH | 7.8 | 5.9 | 10.06.2024 20:15 | ||
CVE-2023-22809 | HIGH | 7.8 | 5.9 | 18.01.2023 17:15 | ||
CVE-2023-23495 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-23496 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23497 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23499 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23501 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23503 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23505 | LOW | 3.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2023-23506 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23508 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23510 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23513 | CRITICAL | 9.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23516 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-23517 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23518 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23519 | HIGH | 7.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23520 | MEDIUM | 5.9 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23522 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23523 | LOW | 3.3 | 1.4 | 08.05.2023 20:15 | ||
CVE-2023-23524 | HIGH | 7.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23525 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-23526 | CRITICAL | 9.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-23527 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23530 | HIGH | 8.6 | 6.0 | 27.02.2023 20:15 | ||
CVE-2023-23531 | HIGH | 8.6 | 6.0 | 27.02.2023 20:15 | ||
CVE-2023-23532 | HIGH | 8.8 | 6.0 | 08.05.2023 20:15 | ||
CVE-2023-23533 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23534 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23535 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23536 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-23537 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23538 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23540 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-23542 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-23543 | LOW | 3.6 | 1.4 | 08.05.2023 20:15 | ||
CVE-2023-27928 | LOW | 3.3 | 1.4 | 08.05.2023 20:15 | ||
CVE-2023-27929 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27931 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27932 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27933 | MEDIUM | 6.7 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27934 | HIGH | 8.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27935 | HIGH | 8.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27936 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27937 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27941 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27942 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27943 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27944 | HIGH | 8.6 | 6.0 | 08.05.2023 20:15 | ||
CVE-2023-27946 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27951 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27952 | MEDIUM | 4.7 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27953 | CRITICAL | 9.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-27955 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27958 | CRITICAL | 9.1 | 5.2 | 08.05.2023 20:15 | ||
CVE-2023-27961 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-27962 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28180 | MEDIUM | 6.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28181 | HIGH | 7.8 | 5.9 | 08.05.2023 20:15 | ||
CVE-2023-28182 | MEDIUM | 6.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28185 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-28189 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28190 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28191 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-28192 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28197 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-28200 | MEDIUM | 5.5 | 3.6 | 08.05.2023 20:15 | ||
CVE-2023-28205 | HIGH | 8.8 | 5.9 | 10.04.2023 19:15 | ||
CVE-2023-28206 | HIGH | 8.6 | 6.0 | 10.04.2023 19:15 | ||
CVE-2023-28319 | HIGH | 7.5 | 3.6 | 26.05.2023 21:15 | ||
CVE-2023-28320 | MEDIUM | 5.9 | 3.6 | 26.05.2023 21:15 | ||
CVE-2023-28321 | MEDIUM | 5.9 | 3.6 | 26.05.2023 21:15 | ||
CVE-2023-28322 | LOW | 3.7 | 1.4 | 26.05.2023 21:15 | ||
CVE-2023-29497 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-2953 | HIGH | 7.5 | 3.6 | 30.05.2023 22:15 | ||
CVE-2023-30774 | MEDIUM | 5.5 | 3.6 | 19.05.2023 15:15 | ||
CVE-2023-32352 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32355 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32357 | HIGH | 7.1 | 5.2 | 23.06.2023 18:15 | ||
CVE-2023-32360 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32361 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-32363 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32364 | HIGH | 8.6 | 6.0 | 27.07.2023 01:15 | ||
CVE-2023-32366 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-32369 | MEDIUM | 6.0 | 4.0 | 23.06.2023 18:15 | ||
CVE-2023-32373 | HIGH | 8.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32377 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-32378 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-32380 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32381 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-32382 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32383 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-32384 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32385 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32386 | LOW | 3.3 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32387 | CRITICAL | 9.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32388 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32392 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32395 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32396 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-32397 | HIGH | 7.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32398 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32401 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-32403 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32405 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32407 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32410 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32411 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32412 | CRITICAL | 9.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32413 | HIGH | 7.0 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32418 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-32421 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-32429 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-32433 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-32434 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32436 | HIGH | 7.1 | 5.2 | 10.01.2024 22:15 | ||
CVE-2023-32441 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-32443 | HIGH | 8.1 | 5.2 | 27.07.2023 01:15 | ||
CVE-2023-32444 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-34241 | HIGH | 7.1 | 5.2 | 22.06.2023 23:15 | ||
CVE-2023-34425 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-35074 | HIGH | 8.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-35983 | MEDIUM | 5.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-35984 | MEDIUM | 4.3 | 3.4 | 27.09.2023 15:18 | ||
CVE-2023-35990 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-35993 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-36854 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-37285 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-37448 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-38259 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38261 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38403 | HIGH | 7.5 | 3.6 | 17.07.2023 21:15 | ||
CVE-2023-38421 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38565 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38571 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38586 | CRITICAL | 10.0 | 6.0 | 27.09.2023 15:18 | ||
CVE-2023-38590 | HIGH | 8.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38593 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38596 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-38598 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38601 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38602 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38603 | HIGH | 7.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38604 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38605 | LOW | 3.3 | 1.4 | 06.09.2023 21:15 | ||
CVE-2023-38606 | MEDIUM | 5.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-38607 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-38610 | HIGH | 7.1 | 5.2 | 10.01.2024 22:15 | ||
CVE-2023-38612 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-38615 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-38616 | HIGH | 7.0 | 5.9 | 06.09.2023 21:15 | ||
CVE-2023-39233 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-39434 | HIGH | 8.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-40383 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-40384 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40385 | MEDIUM | 6.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40386 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40388 | MEDIUM | 4.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40389 | MEDIUM | 5.5 | 3.6 | 10.06.2024 20:15 | ||
CVE-2023-40390 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-40391 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40392 | LOW | 3.3 | 1.4 | 06.09.2023 21:15 | ||
CVE-2023-40393 | HIGH | 7.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40397 | CRITICAL | 9.8 | 5.9 | 06.09.2023 21:15 | ||
CVE-2023-40398 | HIGH | 8.8 | 6.0 | 29.07.2024 21:15 | ||
CVE-2023-40399 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40400 | CRITICAL | 9.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40402 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40407 | HIGH | 7.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40411 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40414 | CRITICAL | 9.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-40417 | MEDIUM | 5.4 | 2.5 | 27.09.2023 15:19 | ||
CVE-2023-40422 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40424 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40426 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40429 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40430 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40432 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40433 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40434 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40436 | CRITICAL | 9.1 | 5.2 | 27.09.2023 15:19 | ||
CVE-2023-40437 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40438 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40439 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-40441 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40442 | LOW | 3.3 | 1.4 | 12.09.2023 00:15 | ||
CVE-2023-40448 | HIGH | 8.6 | 4.0 | 27.09.2023 15:19 | ||
CVE-2023-40450 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40455 | CRITICAL | 10.0 | 6.0 | 27.09.2023 15:19 | ||
CVE-2023-40541 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41060 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-41064 | HIGH | 7.8 | 5.9 | 07.09.2023 18:15 | ||
CVE-2023-41065 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-41066 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41067 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41074 | HIGH | 8.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41075 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-41078 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41079 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41979 | MEDIUM | 4.7 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41980 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41986 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41987 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-41990 | HIGH | 7.8 | 5.9 | 12.09.2023 00:15 | ||
CVE-2023-41993 | HIGH | 8.8 | 5.9 | 21.09.2023 19:15 | ||
CVE-2023-41994 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-41995 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-42826 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42828 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42829 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42830 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-42831 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42832 | HIGH | 7.0 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42833 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42865 | MEDIUM | 6.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42866 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42869 | HIGH | 7.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42870 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42871 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42872 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42876 | HIGH | 7.1 | 5.2 | 10.01.2024 22:15 | ||
CVE-2023-42881 | HIGH | 7.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2023-42913 | HIGH | 8.8 | 5.9 | 28.03.2024 16:15 | ||
CVE-2023-42925 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42929 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42933 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42934 | MEDIUM | 4.2 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42943 | MEDIUM | 5.5 | 3.6 | 29.07.2024 21:15 | ||
CVE-2023-42948 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42949 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42957 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-4733 | HIGH | 7.8 | 5.9 | 04.09.2023 14:15 | ||
CVE-2023-4734 | HIGH | 7.8 | 5.9 | 02.09.2023 18:15 | ||
CVE-2023-4750 | HIGH | 7.8 | 5.9 | 04.09.2023 14:15 | ||
CVE-2023-4752 | HIGH | 7.8 | 5.9 | 04.09.2023 14:15 | ||
CVE-2023-4781 | HIGH | 7.8 | 5.9 | 05.09.2023 19:15 | ||
CVE-2024-23203 | HIGH | 7.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23204 | HIGH | 7.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23206 | MEDIUM | 6.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23209 | HIGH | 8.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23222 | HIGH | 8.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23237 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-23261 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-23299 | HIGH | 8.6 | 6.0 | 10.06.2024 20:15 | ||
CVE-2024-27792 | MEDIUM | 5.5 | 3.6 | 10.06.2024 20:15 | ||
CVE-2024-27795 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27799 | LOW | 3.3 | 1.4 | 10.06.2024 21:15 | ||
CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27802 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27809 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27817 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27831 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27836 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27849 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-27853 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27855 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27858 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27861 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27871 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27872 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27873 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27875 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27882 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27883 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27885 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-27887 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40770 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40775 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40778 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40786 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40791 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40792 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40794 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40796 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40797 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40798 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40801 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40803 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40804 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40806 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40807 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40810 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-40812 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40816 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40823 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40826 | MEDIUM | 6.1 | 4.2 | 17.09.2024 00:15 | ||
CVE-2024-40827 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40831 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40832 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40833 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40834 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40837 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40838 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40842 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40843 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40844 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40845 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40846 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40847 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40848 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40855 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-40856 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40859 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40866 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44122 | HIGH | 8.8 | 6.0 | 28.10.2024 21:15 | ||
CVE-2024-44123 | LOW | 2.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44125 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44126 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44128 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44129 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44130 | MEDIUM | 4.4 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44131 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44133 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44134 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44135 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44137 | MEDIUM | 4.6 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44146 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44148 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44149 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44151 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44152 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44153 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44154 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44156 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44158 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44159 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44161 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44163 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44164 | HIGH | 7.1 | 5.2 | 17.09.2024 00:15 | ||
CVE-2024-44165 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44166 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44168 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44174 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44175 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44177 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44178 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44181 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44182 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44184 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44186 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44188 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44189 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44190 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44203 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44205 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44206 | MEDIUM | 5.4 | 2.5 | 24.10.2024 17:15 | ||
CVE-2024-44208 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44213 | MEDIUM | 5.9 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44218 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44222 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44236 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44247 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44253 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44264 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44265 | LOW | 2.4 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44267 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44270 | HIGH | 8.6 | 4.0 | 28.10.2024 21:15 | ||
CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44281 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44284 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44287 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44289 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44294 | MEDIUM | 6.5 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 |
Similar certificates
References ?
No references are available for this certificate.
Updates ?
-
12.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2024-44247', 'CVE-2024-44264', 'CVE-2024-44302', 'CVE-2024-44281', 'CVE-2024-44253', 'CVE-2024-44282', 'CVE-2024-44267', 'CVE-2024-44273', 'CVE-2024-44233', 'CVE-2024-44218', 'CVE-2024-27849', 'CVE-2024-44213', 'CVE-2024-44287', 'CVE-2024-44234', 'CVE-2024-44203', 'CVE-2024-44270', 'CVE-2024-44215', 'CVE-2024-44236', 'CVE-2024-44255', 'CVE-2024-44269', 'CVE-2024-44265', 'CVE-2024-44239', 'CVE-2024-44254', 'CVE-2024-44222', 'CVE-2024-44232', 'CVE-2024-44175', 'CVE-2024-44284']}
values added.
- The related_cves property was updated, with the
-
30.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2024-44185', 'CVE-2024-44289', 'CVE-2024-40855', 'CVE-2024-44155', 'CVE-2024-44126', 'CVE-2024-44294', 'CVE-2024-44156', 'CVE-2024-44297', 'CVE-2024-44159', 'CVE-2024-44122', 'CVE-2024-40810', 'CVE-2024-44174', 'CVE-2024-44206', 'CVE-2024-44208', 'CVE-2024-44144', 'CVE-2024-44123', 'CVE-2024-44205', 'CVE-2024-44137', 'CVE-2024-40792']}
values added.
- The related_cves property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2023-40417', 'CVE-2024-44163', 'CVE-2023-41065', 'CVE-2023-27943', 'CVE-2023-38603', 'CVE-2023-28320', 'CVE-2022-42826', 'CVE-2023-32388', 'CVE-2024-40857', 'CVE-2023-41060', 'CVE-2023-41987', 'CVE-2024-27863', 'CVE-2024-40795', 'CVE-2023-32357', 'CVE-2023-35993', 'CVE-2023-27932', 'CVE-2023-27942', 'CVE-2024-44149', 'CVE-2024-44198', 'CVE-2024-27884', 'CVE-2023-42949', 'CVE-2023-23534', 'CVE-2024-40827', 'CVE-2024-40791', 'CVE-2023-32397', 'CVE-2024-27853', 'CVE-2023-38593', 'CVE-2023-23527', 'CVE-2024-40847', 'CVE-2024-27873', 'CVE-2024-27831', 'CVE-2023-40455', 'CVE-2024-40856', 'CVE-2023-42876', 'CVE-2023-32360', 'CVE-2023-27955', 'CVE-2024-40798', 'CVE-2024-27805', 'CVE-2023-41074', 'CVE-2023-32411', 'CVE-2023-41993', 'CVE-2024-44131', 'CVE-2023-28322', 'CVE-2023-36854', 'CVE-2024-23204', 'CVE-2023-28190', 'CVE-2022-42860', 'CVE-2024-40776', 'CVE-2023-38604', 'CVE-2024-23206', 'CVE-2023-41995', 'CVE-2023-23516', 'CVE-2023-37285', 'CVE-2023-40438', 'CVE-2024-44191', 'CVE-2022-42828', 'CVE-2023-28182', 'CVE-2023-32382', 'CVE-2024-40842', 'CVE-2024-40823', 'CVE-2023-32398', 'CVE-2023-38571', 'CVE-2024-40780', 'CVE-2024-44186', 'CVE-2023-38607', 'CVE-2024-40835', 'CVE-2023-32385', 'CVE-2023-40442', 'CVE-2024-44164', 'CVE-2023-32392', 'CVE-2024-27887', 'CVE-2023-40383', 'CVE-2023-41075', 'CVE-2023-32364', 'CVE-2023-42929', 'CVE-2023-23495', 'CVE-2023-32429', 'CVE-2023-28189', 'CVE-2023-34425', 'CVE-2023-42828', 'CVE-2023-40384', 'CVE-2023-23537', 'CVE-2023-40390', 'CVE-2023-38612', 'CVE-2023-40407', 'CVE-2023-42826', 'CVE-2024-23203', 'CVE-2024-27860', 'CVE-2024-44178', 'CVE-2023-32387', 'CVE-2023-42870', 'CVE-2023-27934', 'CVE-2024-40837', 'CVE-2023-40424', 'CVE-2023-23533', 'CVE-2024-23261', 'CVE-2023-27952', 'CVE-2023-40436', 'CVE-2024-40818', 'CVE-2023-27936', 'CVE-2023-42925', 'CVE-2022-48578', 'CVE-2023-42865', 'CVE-2023-32441', 'CVE-2024-44168', 'CVE-2023-40385', 'CVE-2023-37448', 'CVE-2024-44183', 'CVE-2024-40774', 'CVE-2023-32413', 'CVE-2023-27935', 'CVE-2024-40804', 'CVE-2023-41986', 'CVE-2024-44151', 'CVE-2023-40450', 'CVE-2023-41079', 'CVE-2024-44188', 'CVE-2023-28319', 'CVE-2023-40386', 'CVE-2024-44166', 'CVE-2024-27800', 'CVE-2023-32421', 'CVE-2022-26699', 'CVE-2023-42831', 'CVE-2023-28191', 'CVE-2023-32378', 'CVE-2023-32407', 'CVE-2023-28321', 'CVE-2024-27809', 'CVE-2023-40448', 'CVE-2023-32363', 'CVE-2024-44187', 'CVE-2024-40850', 'CVE-2024-40831', 'CVE-2024-40807', 'CVE-2023-40398', 'CVE-2023-42943', 'CVE-2024-40843', 'CVE-2023-32444', 'CVE-2023-40441', 'CVE-2023-41066', 'CVE-2023-35074', 'CVE-2024-44181', 'CVE-2023-28197', 'CVE-2023-30774', 'CVE-2024-27883', 'CVE-2023-40393', 'CVE-2023-42866', 'CVE-2023-32401', 'CVE-2024-40785', 'CVE-2023-38605', 'CVE-2023-27941', 'CVE-2023-32369', 'CVE-2023-40426', 'CVE-2023-41990', 'CVE-2023-40414', 'CVE-2023-40437', 'CVE-2023-40389', 'CVE-2023-23532', 'CVE-2023-23525', 'CVE-2023-23540', 'CVE-2024-44133', 'CVE-2023-23526', 'CVE-2024-40815', 'CVE-2023-38403', 'CVE-2024-40779', 'CVE-2024-23222', 'CVE-2024-40812', 'CVE-2023-35984', 'CVE-2001-0102', 'CVE-2023-29497', 'CVE-2024-27875', 'CVE-2024-44165', 'CVE-2023-27944', 'CVE-2023-32352', 'CVE-2023-32395', 'CVE-2023-28181', 'CVE-2023-32355', 'CVE-2023-38615', 'CVE-2024-40822', 'CVE-2023-40400', 'CVE-2024-44161', 'CVE-2023-35983', 'CVE-2023-40399', 'CVE-2023-42948', 'CVE-2023-40388', 'CVE-2024-23299', 'CVE-2023-40439', 'CVE-2023-38596', 'CVE-2024-44182', 'CVE-2023-32377', 'CVE-2024-40775', 'CVE-2024-44190', 'CVE-2023-40391', 'CVE-2023-28200', 'CVE-2023-32405', 'CVE-2023-41980', 'CVE-2023-38610', 'CVE-2023-38602', 'CVE-2023-27951', 'CVE-2024-40848', 'CVE-2023-38565', 'CVE-2023-22809', 'CVE-2024-40789', 'CVE-2024-40809', 'CVE-2023-23542', 'CVE-2023-40541', 'CVE-2024-27817', 'CVE-2023-41078', 'CVE-2023-42833', 'CVE-2023-27962', 'CVE-2023-38590', 'CVE-2024-40866', 'CVE-2023-41064', 'CVE-2024-40787', 'CVE-2023-32373', 'CVE-2024-40793', 'CVE-2024-27823', 'CVE-2023-23538', 'CVE-2023-32366', 'CVE-2023-40397', 'CVE-2023-40402', 'CVE-2023-38586', 'CVE-2023-42957', 'CVE-2023-27953', 'CVE-2024-40803', 'CVE-2023-23535', 'CVE-2024-27836', 'CVE-2024-40806', 'CVE-2024-40833', 'CVE-2023-40411', 'CVE-2023-34241', 'CVE-2023-42829', 'CVE-2024-27792', 'CVE-2024-40832', 'CVE-2023-40429', 'CVE-2024-27855', 'CVE-2024-44170', 'CVE-2024-27802', 'CVE-2024-44130', 'CVE-2023-35990', 'CVE-2023-4733', 'CVE-2023-41067', 'CVE-2023-27946', 'CVE-2023-42872', 'CVE-2024-23209', 'CVE-2024-27885', 'CVE-2023-23536', 'CVE-2023-32418', 'CVE-2023-23543', 'CVE-2023-41979', 'CVE-1999-0590', 'CVE-2022-32933', 'CVE-2023-32412', 'CVE-2023-4734', 'CVE-2024-44148', 'CVE-2023-27958', 'CVE-2023-27937', 'CVE-2023-27961', 'CVE-2023-4750', 'CVE-2024-44152', 'CVE-2024-44176', 'CVE-2023-32396', 'CVE-2024-27872', 'CVE-2024-40838', 'CVE-2023-32403', 'CVE-2023-40434', 'CVE-2023-27933', 'CVE-2022-46722', 'CVE-2024-27795', 'CVE-2023-42933', 'CVE-2024-44134', 'CVE-2023-28180', 'CVE-2023-42934', 'CVE-2023-27931', 'CVE-2023-38601', 'CVE-2023-38598', 'CVE-2023-40432', 'CVE-2023-23523', 'CVE-2023-32381', 'CVE-2023-32380', 'CVE-2023-40430', 'CVE-2023-32433', 'CVE-2023-27928', 'CVE-2024-40826', 'CVE-2023-42830', 'CVE-2023-42832', 'CVE-2024-27882', 'CVE-2024-27799', 'CVE-2023-27929', 'CVE-2024-40778', 'CVE-2024-44128', 'CVE-2024-40770', 'CVE-2023-28192', 'CVE-2023-28185', 'CVE-2023-32443', 'CVE-2023-38606', 'CVE-2024-40797', 'CVE-2023-32386', 'CVE-2023-32436', 'CVE-2024-40816', 'CVE-2023-39434', 'CVE-2023-38261', 'CVE-2023-32384', 'CVE-2023-40422', 'CVE-2024-27871', 'CVE-2024-40796', 'CVE-2024-44177', 'CVE-2023-4752', 'CVE-2023-38421', 'CVE-2024-27806', 'CVE-2022-46718', 'CVE-2024-27858', 'CVE-2023-39233', 'CVE-2024-44189', 'CVE-2023-32434', 'CVE-2022-32897', 'CVE-2023-40392', 'CVE-2023-42881', 'CVE-2023-32383', 'CVE-2023-42913', 'CVE-2024-40786', 'CVE-2023-40433', 'CVE-2023-4781', 'CVE-2024-44146', 'CVE-2023-38616', 'CVE-2024-44184', 'CVE-2023-42869', 'CVE-2023-32361', 'CVE-2023-41994', 'CVE-2023-32410', 'CVE-2024-23237', 'CVE-2024-27861', 'CVE-2024-40788', 'CVE-2023-38259', 'CVE-2022-3970', 'CVE-2024-44129', 'CVE-2024-40844', 'CVE-2023-2953', 'CVE-2024-44158', 'CVE-2024-40834', 'CVE-2024-40799', 'CVE-2022-32876', 'CVE-2023-42871', 'CVE-2024-40794']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-46721', 'CVE-2024-44135', 'CVE-2024-44153', 'CVE-2022-42807', 'CVE-2024-40860', 'CVE-2022-48505', 'CVE-2024-40801', 'CVE-2024-40846', 'CVE-2022-48577', 'CVE-2022-47965', 'CVE-2022-42839', 'CVE-2024-40859', 'CVE-2024-44125', 'CVE-2022-46710', 'CVE-2022-42834', 'CVE-2022-22630', 'CVE-2022-48683', 'CVE-2022-46706', 'CVE-2022-32931', 'CVE-2024-27880', 'CVE-2022-42816', 'CVE-2022-47915', 'CVE-2024-40845', 'CVE-2022-32919', 'CVE-2022-46720', 'CVE-2022-48504', 'CVE-2024-44154']}
values added.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '716753fe1fe962c4c86de512f989268ddc94cfa82d8635da20c26d1705858d2c', 'txt_hash': '3952ed730fb7b70f0c13977a1c6537692e66679a72d1bde06873bc2293281f1b'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '716753fe1fe962c4c86de512f989268ddc94cfa82d8635da20c26d1705858d2c', 'txt_hash': '3952ed730fb7b70f0c13977a1c6537692e66679a72d1bde06873bc2293281f1b'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1844932, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 49, '/Title': '[ST] MacBook_M1_macOS11_SecurityTarget_v1.6', '/Producer': 'macOS Version 12.3.1 (Build 21E258) Quartz PDFContext', '/Author': 'ThanhHaLe', '/Creator': 'Word', '/CreationDate': "D:20220608091744Z00'00'", '/ModDate': "D:20220608091744Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 1844932, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 49, '/Title': '[ST] MacBook_M1_macOS11_SecurityTarget_v1.6', '/Producer': 'macOS Version 12.3.1 (Build 21E258) Quartz PDFContext', '/Author': 'ThanhHaLe', '/Creator': 'Word', '/CreationDate': "D:20220608091744Z00'00'", '/ModDate': "D:20220608091744Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 3, 'ADV_ARC.1': 3, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR': 1, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2, 'ALC_FLR.3': 3}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 25, 'FDP_ACC.2': 4, 'FDP_ACF': 23, 'FDP_ACF.1': 12, 'FDP_ITT.1': 4, 'FDP_ITT.1.1': 1, 'FDP_ETC': 8, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 4, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 13, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 9, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 11, 'FDP_IFC.1': 9, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 11, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL.1': 3, 'FIA_AFL': 7, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 16, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 8, 'FPT_RPL.1': 6}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 17, 'D.SEP_SE': 3}, 'T': {'T.COR-': 1, 'T.PHYSI-': 1, 'T.RE-': 1, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIM-': 1, 'T.USURP': 2, 'T.SKIMMING': 1, 'T.RECOVER': 1, 'T.CORRUPT': 1, 'T.PHYSICAL': 1}, 'A': {'A.DEVICE_AUTH': 3, 'A.PERSO': 3, 'A.WATCH_USER': 3, 'A.NO_EXTERNAL_KEY-': 2, 'A.NO_EVIL_ROOT_USER': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 9}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- covery': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 3, 'ADV_ARC.1': 3, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR': 1, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2, 'ALC_FLR.3': 3}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 25, 'FDP_ACC.2': 4, 'FDP_ACF': 23, 'FDP_ACF.1': 12, 'FDP_ITT.1': 4, 'FDP_ITT.1.1': 1, 'FDP_ETC': 8, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 4, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 13, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 9, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 11, 'FDP_IFC.1': 9, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 11, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL.1': 3, 'FIA_AFL': 7, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 16, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 8, 'FPT_RPL.1': 6}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 17, 'D.SEP_SE': 3}, 'T': {'T.COR-': 1, 'T.PHYSI-': 1, 'T.RE-': 1, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIM-': 1, 'T.USURP': 2, 'T.SKIMMING': 1, 'T.RECOVER': 1, 'T.CORRUPT': 1, 'T.PHYSICAL': 1}, 'A': {'A.DEVICE_AUTH': 3, 'A.PERSO': 3, 'A.WATCH_USER': 3, 'A.NO_EXTERNAL_KEY-': 2, 'A.NO_EVIL_ROOT_USER': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 9}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- covery': 1}}}
. - The st_filename property was set to
anssi-cible-cc-2022_44en.pdf
. - The cert_filename property was set to
anssi-cible-cc-2022_44en.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0600c12fdefbd2602661018938b19729fc633d31b710d12c9bf0528a9a57e3f2', 'txt_hash': 'a1150c3e02dd92edb6baf35bbeb54222d51f13ac490ff9a51ec986355ca581c4'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 507900, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': '[email protected]', '/Category': 'Version 20E241', '/Comments': 'ANSSI-CC-CER-F-07_v31.3', '/Company': 'APPLE INC.', '/CreationDate': "D:20221010165312+02'00'", '/Creator': 'Acrobat PDFMaker 21 pour Word', '/Keywords': '[ANSSI Crypto]', '/ModDate': "D:20221010165314+02'00'", '/Producer': 'Adobe PDF Library 21.11.71', '/SourceModified': 'D:20221010145254', '/Subject': 'Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1', '/Title': 'ANSSI-CC-2022/44', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/']}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2022/44': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 3, 'EAL4': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2022_44.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2022/44
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_44.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_44en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Mobility",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_44en.pdf",
"dgst": "b251d68216f0fcb3",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2022/44",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:11.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:11.3:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"11.3.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-40775",
"CVE-2022-26726",
"CVE-2022-1621",
"CVE-2024-44264",
"CVE-2021-30871",
"CVE-2023-28191",
"CVE-2024-44267",
"CVE-2023-39233",
"CVE-2021-30821",
"CVE-2024-44213",
"CVE-2022-46690",
"CVE-2023-38593",
"CVE-2021-30909",
"CVE-2022-42831",
"CVE-2024-40846",
"CVE-2021-30796",
"CVE-2024-27884",
"CVE-2022-42800",
"CVE-2024-44168",
"CVE-2022-32876",
"CVE-2022-26698",
"CVE-2021-30958",
"CVE-2021-30947",
"CVE-2021-30901",
"CVE-2024-44206",
"CVE-2021-30879",
"CVE-2022-46712",
"CVE-2021-30672",
"CVE-2023-27929",
"CVE-2022-32875",
"CVE-2022-42827",
"CVE-2024-23209",
"CVE-2024-40770",
"CVE-2023-38603",
"CVE-2024-44222",
"CVE-2021-30895",
"CVE-2022-32813",
"CVE-2023-40438",
"CVE-2021-30874",
"CVE-2023-40388",
"CVE-2024-44161",
"CVE-2023-32386",
"CVE-2022-0685",
"CVE-2021-30938",
"CVE-2023-41065",
"CVE-2021-30671",
"CVE-2021-30842",
"CVE-2021-30831",
"CVE-2024-27795",
"CVE-2020-36223",
"CVE-2024-44215",
"CVE-2024-44270",
"CVE-2022-32857",
"CVE-2021-4193",
"CVE-2024-27872",
"CVE-2022-0729",
"CVE-2023-38586",
"CVE-2022-42795",
"CVE-2023-38259",
"CVE-2024-40831",
"CVE-2024-44247",
"CVE-2021-30786",
"CVE-2022-22584",
"CVE-2023-28190",
"CVE-2022-32858",
"CVE-2023-38616",
"CVE-2021-30907",
"CVE-2021-30706",
"CVE-2021-30756",
"CVE-2021-44790",
"CVE-2023-40439",
"CVE-2022-26723",
"CVE-2021-30927",
"CVE-2022-32820",
"CVE-2021-30881",
"CVE-2023-40384",
"CVE-2021-30976",
"CVE-2020-36224",
"CVE-2021-4192",
"CVE-2021-30912",
"CVE-2023-32429",
"CVE-2024-40823",
"CVE-2024-44128",
"CVE-2021-4187",
"CVE-2022-26755",
"CVE-2024-40806",
"CVE-2023-23536",
"CVE-2023-28320",
"CVE-2023-23517",
"CVE-2022-32221",
"CVE-2024-27831",
"CVE-2021-30969",
"CVE-2023-40414",
"CVE-2023-40393",
"CVE-2023-35990",
"CVE-2022-22662",
"CVE-2021-30946",
"CVE-2022-0128",
"CVE-2022-32853",
"CVE-2023-32377",
"CVE-2024-40816",
"CVE-2022-0530",
"CVE-2022-26757",
"CVE-2022-32849",
"CVE-2023-27932",
"CVE-2024-40847",
"CVE-2022-32924",
"CVE-2022-32807",
"CVE-2023-40429",
"CVE-2023-23531",
"CVE-2024-44144",
"CVE-2022-42860",
"CVE-2023-40442",
"CVE-2022-32936",
"CVE-2022-32860",
"CVE-2021-30833",
"CVE-2022-42810",
"CVE-2023-42830",
"CVE-2024-44130",
"CVE-2022-46718",
"CVE-2021-31010",
"CVE-2021-30724",
"CVE-2024-40799",
"CVE-2021-30937",
"CVE-2024-40845",
"CVE-2023-27931",
"CVE-2023-32363",
"CVE-2024-44208",
"CVE-2021-30923",
"CVE-2024-44255",
"CVE-2024-27809",
"CVE-2021-30919",
"CVE-2022-32819",
"CVE-2022-26714",
"CVE-2021-30693",
"CVE-2021-30701",
"CVE-2021-30740",
"CVE-2021-30977",
"CVE-2022-42789",
"CVE-2021-30964",
"CVE-2023-32360",
"CVE-2021-30883",
"CVE-2021-30818",
"CVE-2022-48505",
"CVE-2022-32900",
"CVE-2022-42806",
"CVE-2022-42847",
"CVE-2021-30905",
"CVE-2021-30886",
"CVE-2021-30776",
"CVE-2024-40796",
"CVE-2024-44156",
"CVE-2024-40832",
"CVE-2022-32938",
"CVE-2023-28197",
"CVE-2022-32851",
"CVE-2021-30922",
"CVE-2023-42829",
"CVE-2022-22593",
"CVE-2022-32827",
"CVE-2023-32398",
"CVE-2021-31006",
"CVE-2023-32412",
"CVE-2023-42948",
"CVE-2022-26756",
"CVE-2022-22589",
"CVE-2022-2000",
"CVE-2022-26746",
"CVE-2023-32397",
"CVE-2024-44178",
"CVE-2022-42811",
"CVE-2024-44181",
"CVE-2024-44188",
"CVE-2024-27805",
"CVE-2021-30798",
"CVE-2022-26721",
"CVE-2023-32392",
"CVE-2023-41078",
"CVE-2022-47915",
"CVE-2021-4136",
"CVE-2024-44198",
"CVE-2021-22925",
"CVE-2021-30774",
"CVE-2022-42824",
"CVE-2023-28181",
"CVE-2023-40390",
"CVE-2023-40448",
"CVE-2024-44131",
"CVE-2022-26751",
"CVE-2022-1616",
"CVE-2022-42813",
"CVE-2024-44203",
"CVE-2024-40809",
"CVE-2021-30746",
"CVE-2021-30766",
"CVE-2023-23527",
"CVE-2022-42865",
"CVE-2024-44253",
"CVE-2024-40798",
"CVE-2021-30765",
"CVE-2021-31007",
"CVE-2021-30669",
"CVE-2024-44153",
"CVE-2022-42864",
"CVE-2023-32410",
"CVE-2023-41067",
"CVE-2024-23222",
"CVE-2021-30678",
"CVE-2022-22663",
"CVE-2021-30851",
"CVE-2024-44239",
"CVE-2022-26704",
"CVE-2021-30789",
"CVE-2021-30966",
"CVE-2023-41066",
"CVE-2022-42833",
"CVE-2023-38602",
"CVE-2024-27885",
"CVE-2021-30846",
"CVE-2023-32352",
"CVE-2023-4733",
"CVE-2024-40860",
"CVE-2023-23518",
"CVE-2020-36226",
"CVE-2022-26728",
"CVE-2022-42858",
"CVE-2022-46698",
"CVE-2024-44205",
"CVE-2022-42916",
"CVE-2024-44287",
"CVE-2023-32407",
"CVE-2021-30781",
"CVE-2022-0943",
"CVE-2023-32405",
"CVE-2022-26712",
"CVE-2021-30984",
"CVE-2022-32911",
"CVE-2021-30755",
"CVE-2022-1725",
"CVE-2021-30809",
"CVE-2022-32847",
"CVE-2022-32867",
"CVE-2024-44184",
"CVE-2024-23261",
"CVE-2021-30707",
"CVE-2022-42834",
"CVE-2021-30873",
"CVE-2023-40441",
"CVE-2023-40397",
"CVE-2021-31013",
"CVE-2021-30853",
"CVE-2021-30685",
"CVE-2022-1619",
"CVE-2022-32812",
"CVE-2023-41995",
"CVE-2022-42832",
"CVE-2022-35260",
"CVE-2022-26731",
"CVE-2021-30691",
"CVE-2023-42826",
"CVE-2021-30772",
"CVE-2022-32839",
"CVE-2022-22651",
"CVE-2023-23538",
"CVE-2023-42881",
"CVE-2024-40837",
"CVE-2024-44269",
"CVE-2023-32444",
"CVE-2022-0351",
"CVE-2022-1851",
"CVE-2024-40797",
"CVE-2022-26748",
"CVE-2023-40434",
"CVE-2022-47965",
"CVE-2021-30877",
"CVE-2024-40794",
"CVE-2023-42933",
"CVE-2024-40843",
"CVE-2022-32899",
"CVE-2021-30751",
"CVE-2023-28200",
"CVE-2022-1898",
"CVE-2021-30709",
"CVE-2022-32941",
"CVE-2022-42862",
"CVE-2021-30803",
"CVE-2021-30828",
"CVE-2021-30933",
"CVE-2024-44174",
"CVE-2021-30760",
"CVE-2021-30880",
"CVE-2021-30696",
"CVE-2022-32833",
"CVE-2022-46723",
"CVE-2021-4166",
"CVE-2021-30725",
"CVE-2023-32366",
"CVE-2022-32854",
"CVE-2021-30719",
"CVE-2021-30971",
"CVE-2020-36227",
"CVE-2022-35252",
"CVE-2023-23497",
"CVE-2021-30973",
"CVE-2024-40826",
"CVE-2022-26776",
"CVE-2023-38261",
"CVE-2021-30753",
"CVE-2021-30736",
"CVE-2022-2126",
"CVE-2022-32888",
"CVE-2022-1620",
"CVE-2022-32913",
"CVE-2023-35074",
"CVE-2023-40417",
"CVE-2021-30811",
"CVE-2022-0158",
"CVE-2021-30737",
"CVE-2021-30780",
"CVE-2021-30723",
"CVE-2023-23543",
"CVE-2021-30694",
"CVE-2021-1821",
"CVE-2024-44165",
"CVE-2021-30844",
"CVE-2022-42796",
"CVE-2023-42925",
"CVE-2023-42828",
"CVE-2021-30942",
"CVE-2023-32434",
"CVE-2023-23519",
"CVE-2023-41980",
"CVE-2021-30910",
"CVE-2022-42856",
"CVE-2022-1897",
"CVE-2023-23501",
"CVE-2021-30968",
"CVE-2024-44134",
"CVE-2022-26770",
"CVE-2022-2042",
"CVE-2023-35983",
"CVE-2021-30841",
"CVE-2023-27946",
"CVE-2024-40778",
"CVE-2023-23530",
"CVE-2022-42829",
"CVE-2023-23525",
"CVE-2021-30960",
"CVE-2024-44284",
"CVE-2024-40789",
"CVE-2021-30889",
"CVE-2022-22674",
"CVE-2022-32942",
"CVE-2022-22631",
"CVE-2021-30963",
"CVE-2023-37448",
"CVE-2022-46693",
"CVE-2023-32355",
"CVE-2023-38612",
"CVE-2024-44265",
"CVE-2021-30713",
"CVE-2021-30733",
"CVE-2023-23496",
"CVE-2024-44289",
"CVE-2024-44159",
"CVE-2022-0318",
"CVE-2024-40866",
"CVE-2023-27935",
"CVE-2023-40437",
"CVE-2021-30785",
"CVE-2022-46716",
"CVE-2021-30744",
"CVE-2021-30945",
"CVE-2022-22625",
"CVE-2022-32811",
"CVE-2022-46696",
"CVE-2023-23540",
"CVE-2022-42807",
"CVE-2023-38421",
"CVE-2021-30959",
"CVE-2023-40399",
"CVE-2024-40835",
"CVE-2022-32918",
"CVE-2023-4781",
"CVE-2024-44163",
"CVE-2021-22947",
"CVE-2022-42791",
"CVE-2023-38565",
"CVE-2022-32931",
"CVE-2022-42818",
"CVE-2023-28182",
"CVE-2021-22946",
"CVE-2021-30708",
"CVE-2022-26768",
"CVE-2023-27937",
"CVE-2023-32385",
"CVE-2024-40815",
"CVE-2024-40810",
"CVE-2021-30797",
"CVE-2022-22664",
"CVE-2023-23533",
"CVE-2022-42808",
"CVE-2022-42842",
"CVE-2021-30778",
"CVE-2021-30710",
"CVE-2024-23204",
"CVE-2024-40857",
"CVE-2024-27849",
"CVE-2024-40807",
"CVE-2022-2294",
"CVE-2021-30717",
"CVE-2024-44297",
"CVE-2022-32922",
"CVE-2023-28185",
"CVE-2022-22675",
"CVE-2022-32865",
"CVE-2022-22586",
"CVE-2021-30712",
"CVE-2022-46720",
"CVE-2021-30727",
"CVE-2022-48578",
"CVE-2021-30767",
"CVE-2023-32381",
"CVE-2024-44186",
"CVE-2024-44175",
"CVE-2022-42838",
"CVE-2021-30702",
"CVE-2021-30813",
"CVE-2021-30888",
"CVE-2021-30799",
"CVE-2022-32914",
"CVE-2023-23506",
"CVE-2021-30823",
"CVE-2022-46713",
"CVE-2022-32898",
"CVE-2022-26730",
"CVE-2021-30865",
"CVE-2022-46691",
"CVE-2022-46722",
"CVE-2023-32383",
"CVE-2023-42929",
"CVE-2021-30980",
"CVE-2024-44191",
"CVE-2022-1769",
"CVE-2023-42831",
"CVE-2021-30728",
"CVE-2024-27799",
"CVE-2022-32208",
"CVE-2022-42866",
"CVE-2023-38604",
"CVE-2021-30704",
"CVE-2021-30931",
"CVE-2024-40842",
"CVE-2024-44125",
"CVE-2023-23495",
"CVE-2021-30779",
"CVE-2022-42793",
"CVE-2022-42821",
"CVE-2022-0696",
"CVE-2021-30738",
"CVE-2021-30775",
"CVE-2023-40389",
"CVE-2023-41986",
"CVE-2021-36690",
"CVE-2001-0102",
"CVE-2023-41987",
"CVE-2024-40833",
"CVE-2024-44135",
"CVE-2023-38571",
"CVE-2022-1927",
"CVE-2021-30852",
"CVE-2022-42861",
"CVE-2022-42855",
"CVE-2022-32870",
"CVE-2022-22719",
"CVE-2022-3970",
"CVE-2023-41994",
"CVE-2021-30908",
"CVE-2022-46699",
"CVE-2022-22579",
"CVE-2024-40793",
"CVE-2021-30689",
"CVE-2021-30867",
"CVE-2022-32785",
"CVE-2024-44281",
"CVE-2023-42870",
"CVE-2023-42943",
"CVE-2024-40827",
"CVE-2023-23503",
"CVE-2023-42957",
"CVE-2024-44123",
"CVE-2022-40303",
"CVE-2023-38607",
"CVE-2023-27936",
"CVE-2022-22672",
"CVE-2023-28189",
"CVE-2022-46721",
"CVE-2020-9846",
"CVE-2022-32825",
"CVE-2023-27958",
"CVE-2024-27875",
"CVE-2023-32373",
"CVE-2024-40791",
"CVE-2022-42809",
"CVE-2024-44232",
"CVE-2022-22597",
"CVE-2023-42934",
"CVE-2021-30824",
"CVE-2023-42833",
"CVE-2023-41979",
"CVE-2024-44254",
"CVE-2021-30995",
"CVE-2021-30855",
"CVE-2021-30930",
"CVE-2023-30774",
"CVE-2022-32890",
"CVE-2024-27823",
"CVE-2024-44158",
"CVE-2022-0714",
"CVE-2023-23516",
"CVE-2023-38598",
"CVE-2022-46706",
"CVE-2023-40430",
"CVE-2020-36230",
"CVE-2021-30749",
"CVE-2022-26706",
"CVE-2021-30858",
"CVE-2024-44182",
"CVE-2021-30866",
"CVE-2024-44122",
"CVE-2022-22616",
"CVE-2022-32902",
"CVE-2021-30695",
"CVE-2024-44126",
"CVE-2023-23535",
"CVE-2024-44189",
"CVE-2023-32395",
"CVE-2022-32794",
"CVE-2024-27853",
"CVE-2022-0554",
"CVE-2022-42815",
"CVE-2023-23523",
"CVE-2024-27883",
"CVE-2023-32382",
"CVE-2022-32894",
"CVE-2021-30838",
"CVE-2023-23524",
"CVE-2022-42814",
"CVE-2022-32926",
"CVE-2022-42859",
"CVE-2022-22585",
"CVE-2021-31004",
"CVE-2020-36225",
"CVE-2022-0156",
"CVE-2022-37434",
"CVE-2022-32904",
"CVE-2022-0572",
"CVE-2021-30899",
"CVE-2023-32380",
"CVE-2023-32396",
"CVE-2022-32866",
"CVE-2021-30868",
"CVE-2021-30682",
"CVE-2022-22639",
"CVE-2021-30949",
"CVE-2022-26691",
"CVE-2022-22578",
"CVE-2022-42799",
"CVE-2023-23520",
"CVE-2023-32411",
"CVE-2022-46710",
"CVE-2024-44218",
"CVE-2023-27943",
"CVE-2021-30788",
"CVE-2024-40859",
"CVE-2023-23522",
"CVE-2024-40834",
"CVE-2022-32834",
"CVE-2022-1968",
"CVE-2021-30916",
"CVE-2022-32877",
"CVE-2023-27928",
"CVE-2023-2953",
"CVE-2023-23505",
"CVE-2022-26699",
"CVE-2022-26737",
"CVE-2024-44151",
"CVE-2024-40795",
"CVE-2023-32441",
"CVE-2022-46689",
"CVE-2023-4734",
"CVE-2023-42866",
"CVE-2021-30830",
"CVE-2023-27942",
"CVE-2024-27863",
"CVE-2021-30679",
"CVE-2021-30721",
"CVE-2021-23841",
"CVE-2022-32882",
"CVE-2022-26701",
"CVE-2022-32823",
"CVE-2021-30748",
"CVE-2023-40391",
"CVE-2022-40304",
"CVE-2021-30805",
"CVE-2021-30897",
"CVE-2021-30807",
"CVE-2021-30917",
"CVE-2021-30849",
"CVE-2022-32786",
"CVE-2024-27860",
"CVE-2024-44154",
"CVE-2024-40856",
"CVE-2021-30665",
"CVE-2023-32436",
"CVE-2022-32832",
"CVE-2021-30926",
"CVE-2023-27955",
"CVE-2022-22657",
"CVE-2022-42867",
"CVE-2024-40822",
"CVE-2021-45444",
"CVE-2023-32421",
"CVE-2021-30981",
"CVE-2023-38606",
"CVE-2024-27792",
"CVE-2013-0340",
"CVE-2022-26738",
"CVE-2022-32945",
"CVE-2021-30722",
"CVE-2023-42872",
"CVE-2021-30832",
"CVE-2024-40792",
"CVE-2023-32418",
"CVE-2023-42949",
"CVE-2024-40812",
"CVE-2024-44273",
"CVE-2023-23532",
"CVE-2022-22599",
"CVE-2021-30884",
"CVE-2024-40779",
"CVE-2021-30819",
"CVE-2022-32207",
"CVE-2022-32831",
"CVE-2023-40411",
"CVE-2023-38596",
"CVE-2023-34241",
"CVE-2021-30845",
"CVE-2021-30792",
"CVE-2022-42790",
"CVE-2022-42825",
"CVE-2024-44164",
"CVE-2021-30857",
"CVE-2022-32928",
"CVE-2022-0629",
"CVE-2022-1622",
"CVE-2022-32879",
"CVE-2023-23526",
"CVE-2024-40776",
"CVE-2021-30688",
"CVE-2023-42871",
"CVE-2022-28739",
"CVE-2024-44234",
"CVE-2024-27800",
"CVE-2023-40432",
"CVE-2024-40788",
"CVE-2021-30677",
"CVE-2023-27951",
"CVE-2023-27941",
"CVE-2024-23203",
"CVE-2021-30784",
"CVE-2022-46697",
"CVE-2024-27817",
"CVE-2024-44148",
"CVE-2023-32364",
"CVE-2022-48504",
"CVE-2024-44233",
"CVE-2022-22626",
"CVE-2024-27880",
"CVE-2021-30848",
"CVE-1999-0590",
"CVE-2020-36221",
"CVE-2023-27934",
"CVE-2022-22720",
"CVE-2022-32910",
"CVE-2021-30892",
"CVE-2023-23542",
"CVE-2023-28192",
"CVE-2022-22594",
"CVE-2021-30777",
"CVE-2022-22582",
"CVE-2024-40801",
"CVE-2023-38590",
"CVE-2024-40787",
"CVE-2022-32940",
"CVE-2023-32369",
"CVE-2022-48577",
"CVE-2023-41990",
"CVE-2023-38403",
"CVE-2021-36976",
"CVE-2023-28206",
"CVE-2021-30758",
"CVE-2020-36229",
"CVE-2022-22627",
"CVE-2023-41079",
"CVE-2022-26715",
"CVE-2023-27962",
"CVE-2021-30903",
"CVE-2022-32790",
"CVE-2022-42803",
"CVE-2023-23510",
"CVE-2023-28319",
"CVE-2022-26718",
"CVE-2021-30913",
"CVE-2022-42823",
"CVE-2021-30787",
"CVE-2023-41075",
"CVE-2023-32388",
"CVE-2022-1381",
"CVE-2021-30731",
"CVE-2021-30790",
"CVE-2022-32815",
"CVE-2021-30687",
"CVE-2021-30941",
"CVE-2023-27961",
"CVE-2022-42845",
"CVE-2022-1720",
"CVE-2024-40780",
"CVE-2023-36854",
"CVE-2021-30676",
"CVE-2022-46703",
"CVE-2022-1420",
"CVE-2022-42819",
"CVE-2022-22665",
"CVE-2023-32384",
"CVE-2024-23299",
"CVE-2024-23206",
"CVE-2023-37285",
"CVE-2022-32805",
"CVE-2021-30920",
"CVE-2021-30925",
"CVE-2021-30835",
"CVE-2022-26766",
"CVE-2022-32883",
"CVE-2021-30928",
"CVE-2022-1942",
"CVE-2021-30864",
"CVE-2022-32826",
"CVE-2022-32935",
"CVE-2023-41060",
"CVE-2023-42869",
"CVE-2021-30924",
"CVE-2024-40855",
"CVE-2023-35993",
"CVE-2024-27858",
"CVE-2022-0261",
"CVE-2023-32357",
"CVE-2022-42828",
"CVE-2023-42913",
"CVE-2023-23499",
"CVE-2023-32403",
"CVE-2022-32934",
"CVE-2021-30900",
"CVE-2022-32814",
"CVE-2022-26697",
"CVE-2021-30911",
"CVE-2021-30759",
"CVE-2022-32892",
"CVE-2024-27806",
"CVE-2022-48683",
"CVE-2021-30972",
"CVE-2021-30686",
"CVE-2021-30915",
"CVE-2023-28321",
"CVE-2024-27802",
"CVE-2023-40436",
"CVE-2022-42820",
"CVE-2022-46692",
"CVE-2023-22809",
"CVE-2021-30975",
"CVE-2024-44137",
"CVE-2021-30735",
"CVE-2018-25032",
"CVE-2023-42876",
"CVE-2023-42865",
"CVE-2024-27873",
"CVE-2023-38605",
"CVE-2021-30827",
"CVE-2021-30718",
"CVE-2024-40786",
"CVE-2021-30720",
"CVE-2022-42853",
"CVE-2022-32881",
"CVE-2022-42839",
"CVE-2024-40774",
"CVE-2021-30965",
"CVE-2021-30847",
"CVE-2021-30716",
"CVE-2022-42788",
"CVE-2022-32205",
"CVE-2023-40402",
"CVE-2022-32787",
"CVE-2022-32797",
"CVE-2021-30996",
"CVE-2021-30859",
"CVE-2023-32361",
"CVE-2021-30982",
"CVE-2024-44185",
"CVE-2022-32864",
"CVE-2023-32401",
"CVE-2024-27855",
"CVE-2021-30680",
"CVE-2024-44133",
"CVE-2023-39434",
"CVE-2023-29497",
"CVE-2022-32947",
"CVE-2024-40838",
"CVE-2022-46695",
"CVE-2022-42826",
"CVE-2021-30834",
"CVE-2021-30771",
"CVE-2022-42798",
"CVE-2023-27944",
"CVE-2021-30683",
"CVE-2023-4752",
"CVE-2021-30739",
"CVE-2022-1733",
"CVE-2022-26769",
"CVE-2022-32843",
"CVE-2021-30715",
"CVE-2022-42816",
"CVE-2023-23513",
"CVE-2024-44236",
"CVE-2022-42840",
"CVE-2021-30726",
"CVE-2022-22721",
"CVE-2022-22583",
"CVE-2022-26763",
"CVE-2022-32944",
"CVE-2023-38601",
"CVE-2021-30814",
"CVE-2022-32896",
"CVE-2022-26767",
"CVE-2021-30808",
"CVE-2024-40848",
"CVE-2022-2125",
"CVE-2024-27836",
"CVE-2023-41064",
"CVE-2021-30850",
"CVE-2022-29458",
"CVE-2021-30829",
"CVE-2022-32923",
"CVE-2024-44166",
"CVE-2022-32838",
"CVE-2022-32933",
"CVE-2024-44282",
"CVE-2022-26720",
"CVE-2023-28322",
"CVE-2024-27882",
"CVE-2024-27861",
"CVE-2023-42832",
"CVE-2022-32917",
"CVE-2022-22633",
"CVE-2023-4750",
"CVE-2021-30734",
"CVE-2022-1629",
"CVE-2022-26688",
"CVE-2022-0319",
"CVE-2022-26761",
"CVE-2024-27871",
"CVE-2023-23508",
"CVE-2021-30861",
"CVE-2022-32800",
"CVE-2022-32919",
"CVE-2021-30935",
"CVE-2023-32443",
"CVE-2023-27952",
"CVE-2021-30939",
"CVE-2021-30698",
"CVE-2021-30955",
"CVE-2022-32915",
"CVE-2024-27887",
"CVE-2024-40804",
"CVE-2022-46705",
"CVE-2023-40455",
"CVE-2023-28180",
"CVE-2021-30876",
"CVE-2021-30768",
"CVE-2021-30840",
"CVE-2022-46704",
"CVE-2022-32848",
"CVE-2024-44187",
"CVE-2021-30673",
"CVE-2024-44152",
"CVE-2023-27953",
"CVE-2022-32895",
"CVE-2021-44224",
"CVE-2024-44177",
"CVE-2023-35984",
"CVE-2024-44155",
"CVE-2021-4173",
"CVE-2023-23534",
"CVE-2024-44129",
"CVE-2021-30793",
"CVE-2022-32897",
"CVE-2021-30783",
"CVE-2022-22617",
"CVE-2022-1674",
"CVE-2023-40424",
"CVE-2021-30703",
"CVE-2024-40785",
"CVE-2023-40407",
"CVE-2024-44294",
"CVE-2021-30940",
"CVE-2022-32781",
"CVE-2022-42863",
"CVE-2022-32905",
"CVE-2022-1735",
"CVE-2022-22630",
"CVE-2023-40392",
"CVE-2024-40844",
"CVE-2021-30668",
"CVE-2021-30692",
"CVE-2020-36222",
"CVE-2023-40400",
"CVE-2023-40450",
"CVE-2021-30890",
"CVE-2022-22600",
"CVE-2024-44149",
"CVE-2023-40541",
"CVE-2021-30684",
"CVE-2021-30887",
"CVE-2022-32862",
"CVE-2022-26745",
"CVE-2022-42841",
"CVE-2024-40803",
"CVE-2023-41074",
"CVE-2023-40433",
"CVE-2021-30791",
"CVE-2021-30700",
"CVE-2023-32413",
"CVE-2021-30906",
"CVE-2021-30817",
"CVE-2023-27933",
"CVE-2024-40818",
"CVE-2024-23237",
"CVE-2024-40850",
"CVE-2021-30929",
"CVE-2023-40422",
"CVE-2023-23537",
"CVE-2024-44170",
"CVE-2022-42830",
"CVE-2021-30979",
"CVE-2022-2124",
"CVE-2021-30904",
"CVE-2021-30697",
"CVE-2024-44190",
"CVE-2023-40398",
"CVE-2024-44302",
"CVE-2021-30860",
"CVE-2023-38615",
"CVE-2023-41993",
"CVE-2023-32433",
"CVE-2022-32908",
"CVE-2023-28205",
"CVE-2021-30795",
"CVE-2022-22587",
"CVE-2024-44146",
"CVE-2021-30990",
"CVE-2023-40426",
"CVE-2023-32387",
"CVE-2020-36228",
"CVE-2024-44176",
"CVE-2023-34425",
"CVE-2023-40383",
"CVE-2021-30961",
"CVE-2022-26722",
"CVE-2021-30957",
"CVE-2021-30843",
"CVE-2023-40385",
"CVE-2021-30836",
"CVE-2023-32378",
"CVE-2021-30681",
"CVE-2021-30705",
"CVE-2023-38610",
"CVE-2024-44183",
"CVE-2023-40386",
"CVE-2021-30950"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 ex\u00e9cutant macOS Big Sur 11.3.1",
"not_valid_after": "2027-09-28",
"not_valid_before": "2022-09-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "anssi-cible-cc-2022_44en.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DEVICE_AUTH": 3,
"A.NO_EVIL_ROOT_USER": 2,
"A.NO_EXTERNAL_KEY-": 2,
"A.PERSO": 3,
"A.WATCH_USER": 3
},
"D": {
"D.OS": 17,
"D.SEP_SE": 3
},
"T": {
"T.COR-": 1,
"T.CORRUPT": 1,
"T.PHYSI-": 1,
"T.PHYSICAL": 1,
"T.RE-": 1,
"T.RECOVER": 1,
"T.REPLAY": 2,
"T.SILENT": 2,
"T.SKIM-": 1,
"T.SKIMMING": 1,
"T.USURP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 3,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR": 1,
"ALC_FLR.3": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 11,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 8,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 9,
"FDP_ITC": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 4,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 7,
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 16,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 8,
"FPT_RPL.1": 6
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 2,
"pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- covery": 1,
"preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 9
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "ThanhHaLe",
"/CreationDate": "D:20220608091744Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20220608091744Z00\u002700\u0027",
"/Producer": "macOS Version 12.3.1 (Build 21E258) Quartz PDFContext",
"/Title": "[ST] MacBook_M1_macOS11_SecurityTarget_v1.6",
"pdf_file_size_bytes": 1844932,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 49
},
"report_filename": "anssi-cc-2022_44.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2022/44": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 3,
"EAL4": 1
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 2
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "[email protected]",
"/Category": "Version 20E241",
"/Comments": "ANSSI-CC-CER-F-07_v31.3",
"/Company": "APPLE INC.",
"/CreationDate": "D:20221010165312+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 21 pour Word",
"/Keywords": "[ANSSI Crypto]",
"/ModDate": "D:20221010165314+02\u002700\u0027",
"/Producer": "Adobe PDF Library 21.11.71",
"/SourceModified": "D:20221010145254",
"/Subject": "Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 ex\u00e9cutant macOS Big Sur 11.3.1",
"/Title": "ANSSI-CC-2022/44",
"pdf_file_size_bytes": 507900,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "anssi-cible-cc-2022_44en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DEVICE_AUTH": 3,
"A.NO_EVIL_ROOT_USER": 2,
"A.NO_EXTERNAL_KEY-": 2,
"A.PERSO": 3,
"A.WATCH_USER": 3
},
"D": {
"D.OS": 17,
"D.SEP_SE": 3
},
"T": {
"T.COR-": 1,
"T.CORRUPT": 1,
"T.PHYSI-": 1,
"T.PHYSICAL": 1,
"T.RE-": 1,
"T.RECOVER": 1,
"T.REPLAY": 2,
"T.SILENT": 2,
"T.SKIM-": 1,
"T.SKIMMING": 1,
"T.USURP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 3,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR": 1,
"ALC_FLR.3": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 11,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 8,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 9,
"FDP_ITC": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 4,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 7,
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 16,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 8,
"FPT_RPL.1": 6
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 2,
"pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RE- COVER Card Re- covery": 1,
"preferences for the device, operating system and applications. The Secure Element of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 9
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ThanhHaLe",
"/CreationDate": "D:20220608091744Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20220608091744Z00\u002700\u0027",
"/Producer": "macOS Version 12.3.1 (Build 21E258) Quartz PDFContext",
"/Title": "[ST] MacBook_M1_macOS11_SecurityTarget_v1.6",
"pdf_file_size_bytes": 1844932,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 49
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_44.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"ADV_FSP.3",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_44en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "716753fe1fe962c4c86de512f989268ddc94cfa82d8635da20c26d1705858d2c",
"txt_hash": "3952ed730fb7b70f0c13977a1c6537692e66679a72d1bde06873bc2293281f1b"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0600c12fdefbd2602661018938b19729fc633d31b710d12c9bf0528a9a57e3f2",
"txt_hash": "a1150c3e02dd92edb6baf35bbeb54222d51f13ac490ff9a51ec986355ca581c4"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "716753fe1fe962c4c86de512f989268ddc94cfa82d8635da20c26d1705858d2c",
"txt_hash": "3952ed730fb7b70f0c13977a1c6537692e66679a72d1bde06873bc2293281f1b"
}
},
"status": "active"
}