This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
HP Network Automation Ultimate Edition 10.10 383-4-327 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 |
|
---|---|---|
name | HP Network Automation Ultimate Edition 10.10 | Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
category | Other Devices and Systems | Detection Devices and Systems |
scheme | CA | US |
not_valid_after | 24.09.2020 | 01.11.2014 |
not_valid_before | 24.09.2015 | 01.10.2012 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-327%20cert%20v1.0e.docx | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-327%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-327%20HP%20Network%20Automation%20ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
manufacturer | Hewlett-Packard Development Company, L.P. | Tenable Network Security, Inc. |
manufacturer_web | https://www.hp.com | https://www.tenable.com/ |
dgst | 9a81df02ead53896 | 7a9d9dd29e76bfba |
heuristics/cert_id | 383-4-327 | CCEVS-VR-VID-10443-2012 |
heuristics/cert_lab | CANADA | US |
heuristics/cpe_matches | cpe:2.3:a:hp:network_automation:10.10:*:*:*:*:*:*:* | cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
heuristics/related_cves | CVE-2018-6492, CVE-2016-8511, CVE-2017-5811, CVE-2017-5813, CVE-2017-5810, CVE-2016-4386, CVE-2016-4385, CVE-2018-6493, CVE-2017-5812, CVE-2017-5814 | CVE-2022-33757, CVE-2021-45960, CVE-2016-1000028, CVE-2018-1148, CVE-2021-20106, CVE-2022-32973, CVE-2022-22826, CVE-2018-20843, CVE-2018-1147, CVE-2018-1141, CVE-2022-22822, CVE-2022-3499, CVE-2024-0955, CVE-2022-32974, CVE-2019-1559, CVE-2016-1000029, CVE-2022-0778, CVE-2016-4055, CVE-2020-5765, CVE-2022-22825, CVE-2019-3923, CVE-2022-22823, CVE-2021-3449, CVE-2019-3962, CVE-2021-46143, CVE-2021-20079, CVE-2021-20135, CVE-2021-3450, CVE-2018-5407, CVE-2019-3982, CVE-2017-5179, CVE-2024-0971, CVE-2023-3253, CVE-2020-5774, CVE-2023-3252, CVE-2022-28291, CVE-2023-6178, CVE-2022-22824, CVE-2023-3251, CVE-2022-22827, CVE-2023-6062, CVE-2022-4313, CVE-2022-23990, CVE-2016-9260, CVE-2022-23852, CVE-2017-18214, CVE-2019-3961 |
heuristics/extracted_sars | ALC_FLR.2 | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | 10.10 | 4.4, 5.0.1, 2.0.1, 3.6, 2.1 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | 44cdd911811b36d2 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
pdf_data/cert_filename | 383-4-327 cert v1.0e.docx | |
pdf_data/report_filename | 383-4-327 CR v1.0e.pdf | st_vid10443-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10443-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto | ||
pdf_data/st_keywords/asymmetric_crypto | ||
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function | ||
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id | ||
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/download_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |