Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Symfoware Server Enterprise Extended Edition 7.0.2
JISEC-CC-CRP-C0061
Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series and LN Series Platforms
Certificate Number: 2015/91
name Symfoware Server Enterprise Extended Edition 7.0.2 Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series and LN Series Platforms
category Databases Network and Network-Related Devices and Systems
scheme JP AU
not_valid_after 07.10.2013 24.04.2020
not_valid_before 31.10.2006 08.07.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0061_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR_2015_91_Junos12.1%20X46%20D20_SRX_LN_series.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Junos12.1%20X46%20D20_SRX_LN_series.pdf
manufacturer Fujitsu Limited Juniper Networks, Inc.
manufacturer_web https://www.fujitsu.com/ https://www.juniper.net/
security_level EAL1 {}
dgst 99f7dcbd9b823ee5 d78e1273aaa17a85
heuristics/cert_id JISEC-CC-CRP-C0061 Certificate Number: 2015/91
heuristics/cpe_matches {} cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2013-4689, CVE-2024-39555, CVE-2022-22242, CVE-2023-36840, CVE-2014-3818, CVE-2022-22214, CVE-2022-22244, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2024-30380, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2024-39514, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-4686, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2022-22181, CVE-2022-22163, CVE-2022-22162, CVE-2024-39556, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2023-44197, CVE-2023-44201, CVE-2022-22220, CVE-2013-6014, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2014-2713, CVE-2014-2711, CVE-2021-31362, CVE-2025-21590, CVE-2014-3819, CVE-2023-44176, CVE-2022-22245, CVE-2014-3816, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2014-6380, CVE-2014-6379
heuristics/extracted_sars {} ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 7.0.2 12.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0144
  • certification_date: 01.01.2008
  • claim: EAL4
  • enhanced:
    • assurance_level: EAL4
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symfoware Server offers the security functions of the user control, the resource control, and the audit log, etc. to protect the data base from malicious access in addition to the function for such a data base access. Symfoware Server runs on Red Hat Enterprise Linux 5(for Intel Itanium).
    • evaluation_facility: Information Technology Security Center
    • product: Symfoware Server Enterprise Extended Edition
    • product_type: IT Product (Database)
    • toe_version: 9.0.1
    • vendor: Fujitsu Limited
  • expiration_date: 01.10.2013
  • supplier: Fujitsu Limited
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0144_it7181.html
  • toe_japan_name: Symfoware Server Enterprise Extended Edition 9.0.1
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles {} bb67fb1b4f10e7a5, d7508f508083d040, ac9abe3d5c5a31f0
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf
pdf_data/report_filename c0061_ecvr.pdf CR_2015_91_Junos12.1 X46 D20_SRX_LN_series.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0061: 1
  • AU:
    • Certification Report 2015/91: 1
  • FR:
    • Certification Report 2015/91: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 5
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2014-0160: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Flow Control Identification and Authentication – note that Telnet and FTP are considered to be out of scope Security Management Protection of the TSF TOE Access Trusted Path/Channel Stateful: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20061102205911+09'00'
  • /ModDate: D:20061102205911+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 11633
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: ACA
  • /Company: Department of Defence
  • /CreationDate: D:20150710095921+10'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /ModDate: D:20150710095925+10'00'
  • /Objective-Classification: [Inherited - Restricted]
  • /Objective-CreationStamp: D:20150708
  • /Objective-Id: R22745842
  • /Objective-IsApproved: 0
  • /Objective-IsPublished: 0
  • /Objective-ModificationStamp: D:20150710
  • /Objective-Owner: Caulfield, Terence (MR)(ASD)
  • /Objective-Parent: Certification
  • /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFS-T
  • /Objective-State: Being Edited
  • /Objective-Title: EFS-T039 Certification Report Final v 1.0
  • /Objective-Version: 0.4
  • /Objective-VersionNumber: 4
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /SourceModified: D:20150709235723
  • /Title:
  • pdf_file_size_bytes: 91117
  • pdf_hyperlinks: https://www.juniper.net/customers/csc/management
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename ST_Junos12.1 X46 D20_SRX_LN_series.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 3
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT.1: 6
    • FCS_SSH_EXT: 1
    • FCS_SSH_EXT.1: 5
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
  • FDP:
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 8
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 6
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_RUL_EXT.1: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 2
    • FPT_TST_EXT.1.2: 2
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.4.1: 1
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.ADDRESS_FILTERING: 3
    • O.AUTHENTICATION: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 2
    • O.DISPLAY_BANNER: 2
    • O.FAIL_SECURE: 2
    • O.PORT_FILTERING: 2
    • O.PROTECTED_COMMUNICATIONS: 2
    • O.RELATED_CONNECTION_FILTERING: 2
    • O.RESIDUAL_INFORMATION_CLEARING: 2
    • O.SESSION_LOCK: 2
    • O.STATEFUL_INSPECTION: 2
    • O.SYSTEM_MONITORING: 2
    • O.TOE_ADMINISTRATION: 3
    • O.TSF_SELF_TEST: 2
    • O.VERIFIABLE_UPDATES: 2
  • OE:
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_DOS: 1
    • T.NETWORK_MISUSE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/vendor
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-: 1
  • DES:
    • 3DES:
      • TDEA: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 6
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 4
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 4
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 14
    • IKEv1: 15
    • IKEv2: 12
  • IPsec:
    • IPsec: 20
  • SSH:
    • SSH: 54
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
    • PRNG: 1
  • RNG:
    • RBG: 2
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 6
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 9
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 10
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 2
    • NIST SP 800-57: 2
  • RFC:
    • RFC 2409: 2
    • RFC 2460: 3
    • RFC 2560: 1
    • RFC 2986: 1
    • RFC 3513: 2
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 2
    • RFC 4251: 1
    • RFC 4252: 1
    • RFC 4253: 2
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4306: 2
    • RFC 4443: 2
    • RFC 4868: 4
    • RFC 4945: 2
    • RFC 5280: 2
    • RFC 5735: 2
    • RFC 5759: 1
    • RFC 6379: 1
    • RFC 768: 3
    • RFC 791: 2
    • RFC 792: 2
    • RFC 793: 3
    • RFC 959: 2
    • RFC4253: 2
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • FTP), and Secure Socket Layer (SSL) are out of scope. Document Version 1.9 @©Juniper Networks, Inc: 1
    • out of scope: 1
    • to exchange information. Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope. Document Version 1.9 @©Juniper Networks, Inc. Page 13 of 74 Security Target: Juniper: 1
pdf_data/st_metadata
  • /AAPL:Keywords: ['']
  • /Author:
  • /CreationDate: D:20150612002801Z00'00'
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20150612002801Z00'00'
  • /Producer: Mac OS X 10.9.5 Quartz PDFContext
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 898014
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage False True
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different