This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
IBM Tivoli Directory Server version 6.1 BSI-DSZ-CC-0428-2008 |
JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 Certificate Number: 2017/105 |
|
---|---|---|
name | IBM Tivoli Directory Server version 6.1 | JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 |
category | Key Management Systems | Network and Network-Related Devices and Systems |
scheme | DE | AU |
not_valid_after | 01.09.2019 | 07.02.2022 |
not_valid_before | 22.04.2008 | 07.02.2017 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0428a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T043_Junos%2015.1X49%20for%20SRX%20platforms%20-%20NDPP-FW-VPN-IPS_%20Certification%20Report%20v1.0.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0428b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper-ISSX1056-2-Junos15.1X49-NDPP-FW-IPS-ST-SRX-v1.0%20(1).pdf |
manufacturer | IBM Informationssysteme Deutschland GmbH | Juniper Networks, Inc. |
manufacturer_web | https://www.ibm.com/de/ | https://www.juniper.net/ |
security_level | ALC_FLR.1, EAL4+ | {} |
dgst | 1d46d5a8d694c0f5 | 5fef5dbf556048cf |
heuristics/cert_id | BSI-DSZ-CC-0428-2008 | Certificate Number: 2017/105 |
heuristics/cert_lab | BSI | [] |
heuristics/cpe_matches | cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.51:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.57:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.43:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.64:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.69:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.56:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.74:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.71:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.53:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.40:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.72:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.65:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.58:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.50:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.73:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.61:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.60:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.52:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.42:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.59:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.44:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.66:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.62:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.68:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.54:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.49:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.41:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.55:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.70:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.67:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:* | cpe:2.3:o:juniper:junos:15.1x49-d60:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:* |
heuristics/related_cves | CVE-2015-1976, CVE-2015-1959, CVE-2015-1972, CVE-2015-2019, CVE-2015-0138, CVE-2010-4217, CVE-2011-1820, CVE-2012-2191, CVE-2008-2943, CVE-2015-1977, CVE-2015-1975, CVE-2014-6100, CVE-2012-2203, CVE-2012-0726, CVE-2015-1978, CVE-2015-1974, CVE-2012-0743, CVE-2011-1206 | CVE-2017-2302, CVE-2022-22244, CVE-2017-2314, CVE-2020-1602, CVE-2020-1631, CVE-2017-2313, CVE-2004-0468, CVE-2020-1609, CVE-2022-22246, CVE-2015-5360, CVE-2023-22406, CVE-2022-22208, CVE-2023-28979, CVE-2016-4922, CVE-2019-0036, CVE-2017-2348, CVE-2016-1264, CVE-2023-44176, CVE-2024-39558, CVE-2021-31372, CVE-2020-1643, CVE-2023-44186, CVE-2018-0017, CVE-2018-0031, CVE-2017-2303, CVE-2018-0022, CVE-2024-39511, CVE-2021-0215, CVE-2023-4481, CVE-2019-0039, CVE-2020-1639, CVE-2024-30397, CVE-2017-2347, CVE-2019-0047, CVE-2023-22391, CVE-2023-0026, CVE-2023-44178, CVE-2019-0037, CVE-2020-10188, CVE-2019-0053, CVE-2018-0055, CVE-2024-39514, CVE-2023-44184, CVE-2018-0007, CVE-2023-22395, CVE-2023-44182, CVE-2022-22241, CVE-2017-10621, CVE-2024-39556, CVE-2020-1641, CVE-2023-44194, CVE-2019-0073, CVE-2020-1605, CVE-2017-2301, CVE-2023-22407, CVE-2015-7752, CVE-2022-22215, CVE-2020-1656, CVE-2018-0019, CVE-2018-0062, CVE-2019-0012, CVE-2018-0003, CVE-2023-44197, CVE-2014-6450, CVE-2022-22245, CVE-2023-28975, CVE-2018-15505, CVE-2024-21591, CVE-2025-21590, CVE-2020-1684, CVE-2022-22181, CVE-2023-44177, CVE-2018-0061, CVE-2022-22224, CVE-2017-2345, CVE-2017-10613, CVE-2023-36841, CVE-2023-44185, CVE-2024-39555, CVE-2020-1600, CVE-2022-22238, CVE-2018-0029, CVE-2022-22156, CVE-2024-21594, CVE-2015-7751, CVE-2024-39517, CVE-2017-10602, CVE-2019-0061, CVE-2023-44175, CVE-2019-0013, CVE-2023-36839, CVE-2018-0004, CVE-2022-22242, CVE-2017-10618, CVE-2018-0060, CVE-2017-2312, CVE-2015-5362, CVE-2023-28963, CVE-2018-0052, CVE-2023-44201, CVE-2022-22173, CVE-2023-36842, CVE-2023-28964, CVE-2021-31362, CVE-2018-0051, CVE-2022-22243, CVE-2017-2344, CVE-2023-36843, CVE-2023-36840, CVE-2022-22197, CVE-2022-22220, CVE-2024-30380, CVE-2024-39528, CVE-2023-28962, CVE-2020-1657, CVE-2021-31355, CVE-2018-0021, CVE-2024-39549, CVE-2019-0035, CVE-2020-1630, CVE-2020-1637 |
heuristics/extracted_sars | ADV_IMP.1, ATE_IND.2, ALC_FLR.1, AVA_SOF.1, ADV_HLD.2, AVA_VLA.2, ADV_RCR.1, ADV_LLD.1, ATE_COV.2, AGD_USR.1, AVA_MSU.2, ADV_SPM.1, AGD_SPM.1, ADV_FSP.2, AGD_ADM.1, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_FUN.1 | AGD_OPE.1, ADV_FSP.1, AVA_VAN.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ATE_IND.1 |
heuristics/extracted_versions | 6.1 | 15.1 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0283-2006 | {} |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0283-2006 | {} |
heuristics/protection_profiles | {} | d7508f508083d040, bb67fb1b4f10e7a5, ac9abe3d5c5a31f0, f21e576d983cc1d7 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0.pdf |
pdf_data/report_filename | 0428a.pdf | EFS-T043_Junos 15.1X49 for SRX platforms - NDPP-FW-VPN-IPS_ Certification Report v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 0428b.pdf | Juniper-ISSX1056-2-Junos15.1X49-NDPP-FW-IPS-ST-SRX-v1.0 (1).pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |