This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Junos OS 19.3R1 for MX10003 and EX9253 Certificate Number: 2020/132 |
Citrix XenDesktop Version 5.6 Platinum Edition CRP271 |
|
---|---|---|
name | Juniper Junos OS 19.3R1 for MX10003 and EX9253 | Citrix XenDesktop Version 5.6 Platinum Edition |
category | Network and Network-Related Devices and Systems | Access Control Devices and Systems |
scheme | AU | UK |
status | active | archived |
not_valid_after | 11.01.2026 | 05.01.2016 |
not_valid_before | 11.01.2021 | 30.11.2012 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T009%20Cert%202020_132_OS.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T009-Certification_Report_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP271%20v1.0%20for%20Citrix%20XenDesktop%205.6.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%2019.3R1%20for%20MX10003%20and%20EX9253%20Security%20Target%20v1.8.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST271%20v1-1%20for%20Citrix%20XenDesktop%205.6.pdf |
manufacturer | Juniper Networks, Inc. | Citrix Systems, Inc. |
manufacturer_web | https://www.juniper.net/ | https://www.citrix.com |
security_level | {} | EAL2+, ALC_FLR.2 |
dgst | 14b523ad2390d47e | b2f82e211fa2ac3f |
heuristics/cert_id | Certificate Number: 2020/132 | CRP271 |
heuristics/cpe_matches | {} | cpe:2.3:a:citrix:xendesktop:5.6:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2014-4700, CVE-2016-6493, CVE-2012-6314 |
heuristics/direct_transitive_cves | {} | CVE-2014-4700, CVE-2016-6493, CVE-2016-4810 |
heuristics/indirect_transitive_cves | {} | CVE-2014-4700, CVE-2016-6493, CVE-2016-4810 |
heuristics/extracted_sars | ASE_TSS.1, ALC_CMS.1, ASE_REQ.1, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ASE_INT.1, ALC_CMC.1, ASE_OBJ.1, AGD_OPE.1, ADV_FSP.1, ASE_SPD.1, ASE_ECD.1 | ATE_IND.2, ASE_CCL.1, ALC_CMS.2, AGD_OPE.1, ASE_SPD.1, AVA_VAN.2, ASE_OBJ.2, ADV_ARC.1, ALC_CMC.2, ATE_FUN.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.1, ADV_TDS.1, ASE_ECD.1 |
heuristics/extracted_versions | 19.3 | 5.6 |
heuristics/report_references/directly_referenced_by | {} | CRP281 |
heuristics/report_references/directly_referencing | {} | CRP256 |
heuristics/report_references/indirectly_referenced_by | {} | CRP282, CRP281 |
heuristics/report_references/indirectly_referencing | {} | CRP256 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf | {} |
pdf_data/cert_filename | EFT-T009 Cert 2020_132_OS.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | EFT-T009-Certification_Report_V1.0.pdf | CRP271 v1.0 for Citrix XenDesktop 5.6.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper Junos 19.3R1 for MX10003 and EX9253 Security Target v1.8.pdf | ST271 v1-1 for Citrix XenDesktop 5.6.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |