Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Electronic Engineering Systems, Inc. (EESI) SuperNet 2000 EAL4/r1
None
Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
Certificate Number: 2011/72
name Electronic Engineering Systems, Inc. (EESI) SuperNet 2000 EAL4/r1 Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
category Data Protection Other Devices and Systems
scheme US AU
not_valid_after 07.09.2012 13.07.2017
not_valid_before 01.10.2000 16.02.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10290-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10290-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf
manufacturer Electronic Engineering Systems, Inc. Microsoft Corporation
manufacturer_web https://www.eescom.com/ https://www.microsoft.com
security_level EAL4 EAL4+, ALC_FLR.3
dgst b25c6f7e00cc0a1f be0c7f67702ea646
heuristics/cert_id Certificate Number: 2011/72
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*
heuristics/related_cves {} CVE-2018-8154, CVE-2013-5072, CVE-2020-17144, CVE-2018-0940, CVE-2016-0138, CVE-2014-6319, CVE-2013-0418, CVE-2000-0216, CVE-2018-8302, CVE-2019-0817, CVE-2019-0724, CVE-2019-1084, CVE-2012-4791, CVE-2021-26857, CVE-1999-1322, CVE-2018-0924, CVE-2019-1136, CVE-2017-8621, CVE-2018-8151, CVE-2021-26858, CVE-2020-0688
heuristics/extracted_sars ALC_LCD.1, ADV_IMP.1, ADV_HLD.2, AGD_USR.1, AVA_VLA.2, ALC_DVS.1, ADV_LLD.1, ADV_RCR.1, ALC_TAT.1, AVA_MSU.2, ADV_FSP.2, ATE_DPT.1, AGD_ADM.1, ATE_IND.2, ADV_SPM.1, ATE_COV.2, AVA_SOF.1, ATE_FUN.1 ADV_IMP.1, ASE_OBJ.2, ADV_ARC.1, ATE_IND.2, ATE_DPT.1, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_DVS.1, ALC_CMS.4, ASE_ECD.1, AVA_VAN.3, ALC_FLR.3, AGD_OPE.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, ADV_TDS.3, AGD_PRE.1, ALC_TAT.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4
heuristics/extracted_versions 2000 64, 2010
pdf_data/report_filename st_vid10290-vr.pdf EFS-T024 CR SP1.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: TTAP-VR-0016
    • cert_item: SuperNet 2000 EAL4/r1
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2011/72: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 18
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_SOF.1: 1
  • ALC:
    • ALC_FLR.3: 9
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 29
    • Microsoft Corporation: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2010-3332: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20001020061448Z
  • /Creator: FrameMaker 5.5.6p145
  • /ModDate: D:20070508143528-04'00'
  • /Producer: Acrobat Distiller 4.05 for Windows
  • /Title: Untitled Document
  • pdf_file_size_bytes: 46770
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 9
pdf_data/st_filename st_vid10290-st.pdf E14_EAL4_ASE_1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 7
    • EAL4: 12
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 4
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 12
    • ACM_CAP.4: 21
    • ACM_SCP.2: 9
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 9
  • ADV:
    • ADV_FSP.1: 2
    • ADV_FSP.2: 13
    • ADV_HLD.2: 17
    • ADV_IMP.1: 9
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 12
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 10
    • ALC_LCD.1: 10
    • ALC_TAT.1: 11
  • ASE:
    • ASE_DES: 2
    • ASE_ENV: 2
    • ASE_OBJ: 2
    • ASE_PPC: 2
    • ASE_REQ: 2
    • ASE_TSS: 2
  • ATE:
    • ATE_COV.2: 9
    • ATE_DPT.1: 8
    • ATE_FUN.1: 13
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 16
    • AVA_SOF: 2
    • AVA_SOF.1: 9
    • AVA_VLA.2: 14
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 2
    • ASE_OBJ.2: 2
    • ASE_REQ: 2
    • ASE_REQ.2: 2
    • ASE_SPD: 2
    • ASE_SPD.1: 2
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MSA: 2
    • FMT_MSA.1: 11
    • FMT_MSA.3: 10
    • FMT_SMR: 1
    • FMT_SMR.1: 17
  • FPT:
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 7
    • FDP_ACF: 24
    • FDP_ACF.1: 5
    • FDP_IFC: 39
    • FDP_IFC.1: 12
    • FDP_IFF: 70
    • FDP_IFF.1: 10
  • FIA:
    • FIA_ATD.1: 3
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 9
    • A.ELECTRICAL: 1
    • A.KEY: 1
    • A.KEYS: 3
    • A.MODIFY: 2
    • A.NOEVIL: 1
    • A.PHYSICAL: 4
    • A.SECURITY-AWARE: 4
    • A.TRUSTED: 4
  • O:
    • O.BYPASS: 4
    • O.CONF: 2
    • O.CONFIGURATION: 14
    • O.DETECT: 4
    • O.E: 8
    • O.FLOPPY: 4
    • O.INDICATE: 2
    • O.INSTALL: 2
    • O.ISOLATE: 4
    • O.MODIFY: 4
    • O.RESTRICTED_ACCESS: 4
    • O.SELECT: 4
  • T:
    • T.CABINET_COMPROMISE: 3
    • T.CONFIGURATION: 4
    • T.DSS_COMPROMISE: 2
    • T.E: 8
    • T.NETWORK_ISOLATE: 2
    • T.SENSITIVE: 2
    • T.SPOOF: 2
    • T.SWITCH_FAILURE: 3
  • A:
    • A.BLOCKLIST: 2
    • A.COM_PROT: 2
    • A.INSTALL: 2
    • A.NO_EVIL_ADM: 1
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 2
    • A.PLATFORM: 2
  • O:
    • O.CONBLK: 6
    • O.DAC: 14
    • O.MAIL_FLOW: 5
    • O.REDUCE_SPAM: 6
    • O.RESTDIST: 7
    • O.WIPE: 5
  • OE:
    • OE.BLOCKLIST: 2
    • OE.COM_PROT: 2
    • OE.INSTALL: 3
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 18
  • OSP:
    • OSP.MAIL_FLOW: 3
    • OSP.WIPE: 3
  • T:
    • T.AUTH_DAC: 5
    • T.DL_MISUSE: 4
    • T.SPAM: 7
    • T.UNAUTHUSE: 2
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 10
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 2821: 9
    • RFC 2822: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The: 1
pdf_data/st_metadata
  • /Author: SMMonac
  • /CreationDate: D:20001025051504Z
  • /Creator: Microsoft Word - SecurityTarget-r.FINAL-V2.0
  • /ModDate: D:20070508143245-04'00'
  • /Producer: Acrobat PDFWriter 4.05 for Windows NT
  • /Title: SecurityTarget-r.FINAL-V2.0.doc
  • pdf_file_size_bytes: 2136655
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /Author: Aaron Doggett (stratsec)
  • /CreationDate: D:20101223114445+11'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20101223114445+11'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: EAL4 Security Target
  • /Title: Exchange 2010
  • pdf_file_size_bytes: 861830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different