This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Xerox WorkCentre M35/M45/M55 and WorkCentre Pro 35/45/55 Advanced Multifunction System with Image Overwrite Security Service Maintenance Pack 2 CCEVS-VR-0093-2004 |
Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2 2022-36-INF-4306 |
|
---|---|---|
name | Xerox WorkCentre M35/M45/M55 and WorkCentre Pro 35/45/55 Advanced Multifunction System with Image Overwrite Security Service Maintenance Pack 2 | Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2 |
category | Multi-Function Devices | Databases |
scheme | US | ES |
status | archived | active |
not_valid_after | 07.09.2012 | 15.05.2029 |
not_valid_before | 11.02.2005 | 15.05.2024 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_Certificado.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10022-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36-INF-4306.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10022-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_ST.pdf |
manufacturer | Xerox Corporation | Microsoft Corporation |
manufacturer_web | https://www.xerox.com | https://www.microsoft.com |
security_level | EAL2 | EAL2+, ALC_FLR.3 |
dgst | 2b06d8484363c0f0 | 3995c890eb3f0843 |
heuristics/cert_id | CCEVS-VR-0093-2004 | 2022-36-INF-4306 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:h:xerox:workcentre_m45:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m45:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m35:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m55:2.28.11.000:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m35:2.97.20.032:*:*:*:*:*:*:*, cpe:2.3:h:xerox:workcentre_m55:2.97.20.032:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2005-0703, CVE-2005-1179 | {} |
heuristics/extracted_sars | AGD_ADM.1, ADV_FSP.1, ADV_HLD.1, AVA_VLA.2, ATE_COV.1, AGD_USR.1, ATE_IND.2, ADV_RCR.1, ATE_HLD.1, ATE_FUN.1, AVA_SOF.1 | ADV_ARC.1, ATE_IND.2, AGD_PRE.1, AGD_OPE.1, ASE_REQ.2, ADV_TDS.1, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ALC_FLR.3, ATE_COV.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.2, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1 |
heuristics/extracted_versions | 55, 2, 45, 35 | 16.0.4105.2 |
heuristics/protection_profiles | {} | 1fb4ce8c09d6a2f8 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[CPPDBMS13] cPP_DBMS_V1.3.pdf |
pdf_data/cert_filename | 2022-36_Certificado.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid10022-vr.pdf | 2022-36-INF-4306.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10022-st.pdf | 2022-36_ST.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |