This page was not yet optimized for use on mobile
devices.
Hewlett-Packard Tru64 UNIX V5.1A
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 01.02.2004 |
| Valid until | 05.03.2013 |
| Scheme | 🇬🇧 UK |
| Manufacturer | Hewlett-Packard Company |
| Category | Operating Systems |
| Security level | EAL1 |
Heuristics summary
Certificate ID: CRP199
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Security level
EAL1, EAL7Certificates
CERTIFICATION REPORT No. P199Certification process
out of scope, The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user, respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOEStandards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
| Title | tru64_cr_1_0.doc |
|---|---|
| Author | racook |
| Creation date | D:20040213085521Z |
| Modification date | D:20131204151403Z |
| Pages | 24 |
| Creator | tru64_cr_1_0 - Microsoft Word |
| Producer | Acrobat PDFWriter 5.0 for Windows NT |
Security target
Extracted keywords
Symmetric Algorithms
E2Security level
EAL1, EAL3Claims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.INSTALL, O.PHYSICAL, O.CREDEN, A.NETWORK, A.CONNECT, A.PEER, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADM, A.COOPSecurity Assurance Requirements (SAR)
ACM_CAP.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.3.1, FAU_GEN.1.2, FAU_SAR.1.2, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1, FIA_UID.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UID.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_REV, FMT_SMR.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.1, FMT_MTD.1, FPT_AMT.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_STM.1, FPT_STM.1.1, FPT_AMT.1.1, FPT_SEP.1.2Standards
ISO/IEC 15408, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
| Title | Tru64ST Issue 1.0.rtf |
|---|---|
| Author | racook |
| Creation date | D:20040218114941 |
| Pages | 39 |
| Creator | Tru64ST Issue 1.0 - Microsoft Word |
| Producer | Acrobat PDFWriter 5.0 for Windows NT |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CRP199Extracted SARs
ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1CPE matches
- cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*
- cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2000-1031 | MEDIUM | 4.6 | 6.4 | 11.12.2000 | ||
| CVE-2002-1604 | HIGH | 7.5 | 6.4 | 02.09.2002 | ||
| CVE-2002-1605 | HIGH | 7.5 | 6.4 | 02.09.2002 | ||
| CVE-2002-1606 | MEDIUM | 4.6 | 6.4 | 30.08.2002 | ||
| CVE-2002-1607 | MEDIUM | 4.6 | 6.4 | 31.08.2002 | ||
| CVE-2002-1608 | MEDIUM | 4.6 | 6.4 | 31.08.2002 | ||
| CVE-2002-1609 | MEDIUM | 4.6 | 6.4 | 30.08.2002 | ||
| CVE-2002-1610 | LOW | 2.1 | 2.9 | 30.08.2002 | ||
| CVE-2002-1611 | MEDIUM | 4.6 | 6.4 | 30.08.2002 | ||
| CVE-2002-1612 | HIGH | 7.2 | 10.0 | 13.09.2002 | ||
| CVE-2002-1613 | HIGH | 7.2 | 10.0 | 10.09.2002 | ||
| CVE-2002-1614 | HIGH | 7.2 | 10.0 | 09.09.2002 | ||
| CVE-2002-1615 | HIGH | 7.2 | 10.0 | 13.09.2002 | ||
| CVE-2002-1616 | HIGH | 7.2 | 10.0 | 01.08.2002 | ||
| CVE-2002-1617 | HIGH | 7.2 | 10.0 | 31.12.2002 | ||
| CVE-2002-1784 | MEDIUM | 5.0 | 2.9 | 31.12.2002 | ||
| CVE-2003-0221 | HIGH | 7.2 | 10.0 | 12.05.2003 | ||
| CVE-2003-1496 | HIGH | 10.0 | 10.0 | 31.12.2003 | ||
| CVE-2004-0657 | MEDIUM | 5.0 | 2.9 | 06.08.2004 | ||
| CVE-2004-2678 | MEDIUM | 5.1 | 6.4 | 31.12.2004 | ||
| CVE-2005-0719 | LOW | 2.1 | 2.9 | 09.03.2005 | ||
| CVE-2005-2993 | LOW | 1.7 | 2.9 | 20.09.2005 | ||
| CVE-2005-3670 | HIGH | 7.8 | 6.9 | 18.11.2005 | ||
| CVE-2006-5452 | MEDIUM | 4.6 | 6.4 | 23.10.2006 | ||
| CVE-2006-6418 | HIGH | 7.2 | 10.0 | 10.12.2006 | ||
| CVE-2007-0805 | LOW | 2.1 | 2.9 | 07.02.2007 | ||
| CVE-2007-2553 | HIGH | 7.2 | 10.0 | 09.05.2007 | ||
| CVE-2007-2791 | HIGH | 10.0 | 10.0 | 22.05.2007 | ||
| CVE-2007-6519 | MEDIUM | 4.9 | 6.9 | 24.12.2007 | ||
| CVE-2008-4414 | HIGH | 7.2 | 10.0 | 07.11.2008 | ||
Showing 5 out of 30.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "d58d29b92347f137",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP199",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2007-2553",
"CVE-2003-1496",
"CVE-2006-5452",
"CVE-2002-1605",
"CVE-2002-1608",
"CVE-2004-2678",
"CVE-2002-1604",
"CVE-2005-2993",
"CVE-2000-1031",
"CVE-2002-1617",
"CVE-2005-3670",
"CVE-2005-0719",
"CVE-2002-1614",
"CVE-2008-4414",
"CVE-2003-0221",
"CVE-2002-1606",
"CVE-2002-1612",
"CVE-2002-1611",
"CVE-2002-1615",
"CVE-2002-1607",
"CVE-2006-6418",
"CVE-2002-1784",
"CVE-2002-1610",
"CVE-2007-6519",
"CVE-2002-1616",
"CVE-2004-0657",
"CVE-2007-2791",
"CVE-2002-1609",
"CVE-2002-1613",
"CVE-2007-0805"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hewlett-Packard Company",
"manufacturer_web": "https://www.hp.com",
"name": "Hewlett-Packard Tru64 UNIX V5.1A",
"not_valid_after": "2013-03-05",
"not_valid_before": "2004-02-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP199.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P199": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL1": 18,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE\u2019s user": 1,
"out of scope": 2,
"respond to requests for Telnet \u0026 FTP services. The network, including clients of FTP \u0026 Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "racook",
"/CreationDate": "D:20040213085521Z",
"/Creator": "tru64_cr_1_0 - Microsoft Word",
"/ModDate": "D:20131204151403Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "tru64_cr_1_0.doc",
"pdf_file_size_bytes": 84416,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "Tru64STIssue1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT": 6,
"A.COOP": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NETWORK": 6,
"A.NO_EVIL_ADM": 1,
"A.PEER": 5,
"A.PROTECT": 1
},
"O": {
"O.AUDITING": 1,
"O.AUTHORIZATION": 1,
"O.CREDEN": 1,
"O.DISCRETIONARY_ACCESS": 1,
"O.ENFORCEMENT": 1,
"O.INSTALL": 3,
"O.MANAGE": 1,
"O.PHYSICAL": 2,
"O.RESIDUAL_INFORMATION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.1": 1
},
"ADO": {
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.1": 1,
"ADV_RCR.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ATE": {
"ATE_IND.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 12,
"EAL3": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 1,
"FAU_GEN.2.1": 2,
"FAU_SAR.1": 1,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 1,
"FAU_SAR.2.1": 2,
"FAU_SAR.3": 2,
"FAU_SAR.3.1": 2,
"FAU_SEL.1": 2,
"FAU_SEL.1.1": 2,
"FAU_STG.1": 1,
"FAU_STG.1.1": 2,
"FAU_STG.1.2": 1,
"FAU_STG.3": 2,
"FAU_STG.3.1": 2
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_RIP": 3
},
"FIA": {
"FIA_ATD.1": 2,
"FIA_ATD.1.1": 3,
"FIA_SOS.1": 1,
"FIA_SOS.1.1": 3,
"FIA_UAU.1": 2,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.7": 1,
"FIA_UAU.7.1": 2,
"FIA_UID.1": 2,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MSA.1": 2,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 1,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD": 14,
"FMT_MTD.1": 1,
"FMT_REV": 12,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 4,
"FMT_SMR.1.2": 3
},
"FPT": {
"FPT_AMT.1": 2,
"FPT_AMT.1.1": 2,
"FPT_RVM.1": 1,
"FPT_RVM.1.1": 2,
"FPT_SEP.1": 1,
"FPT_SEP.1.1": 2,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 1,
"FPT_STM.1.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"ISO": {
"ISO/IEC 15408": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"E2": {
"E2": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "racook",
"/CreationDate": "D:20040218114941",
"/Creator": "Tru64ST Issue 1.0 - Microsoft Word",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "Tru64ST Issue 1.0.rtf",
"pdf_file_size_bytes": 158515,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP199.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tru64STIssue1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56",
"txt_hash": "652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec",
"txt_hash": "4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41"
}
},
"status": "archived"
}