This page was not yet optimized for use on mobile
devices.
SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 27.02.2013 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | SUSE Linux Products Gmbh |
| Category | Operating Systems |
| Security level | ALC_FLR.3, EAL4+ |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0787-2013
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, Twofish, Serpent, Triple-DESAsymmetric Algorithms
RSA 1024, DSAHash functions
SHA512Protocols
SSHv2, SSHRandomness
RNGSecurity level
EAL 4, EAL1, EAL4, EAL4+, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0067-2010, BSI-CC-PP-0067-Certificates
BSI-DSZ-CC-0787-2013Evaluation facilities
atsecCertification process
Report, Version 4, 2013-02-15, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Configuration list for the TOE: [CM.OBS] Configuration List OBS, 2012-08-29, [CM.SAR, List CC Related Items, 2012-09-04, [CMLIST] SUSE Configuration Management Lists, 2012-08-21, (confidential document) [10] Guidance documentation for the TOE, Version 1.0, 2012-09-28, Common Criteria EAL4+ Evaluated, Guide for SUSE LINUX Enterprise Server 11 SP2, (confidential document) 9 specifically • AIS 20, Version 2, Funktionalitätsklassen und Evaluationsmethodologie fürStandards
FIPS PUB 197, FIPS PUB 46-3, AIS 20, AIS 31, AIS 32, RFC 4253Technical reports
BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0787-2013 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, OSPP, SUSE Linux Enterprise Server 11 Service Pack 2" |
| Author | Federal Office for Information Security |
| Creation date | D:20130306111651+01'00' |
| Modification date | D:20130306154502+01'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0787-2013 |
|---|---|
| Certified item | SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization |
| Certification lab | BSI |
| Developer | SUSE Linux Products GmbH |
References
Incoming- BSI-DSZ-CC-0852-2013 - archived - SUSE Linux Enterprise Server 11 Service Pack 2 on IBM System z
Security target
Extracted keywords
Symmetric Algorithms
AES128, AES256, AES, AES-128, Twofish, Serpent, TDES, Triple-DESAsymmetric Algorithms
Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MACProtocols
SSH, SSHv2, SSL, TLS, VPNRandomness
RNGLibraries
OpenSSL, libgcryptBlock cipher modes
CBC, CTRSecurity level
EAL4, EAL4 augmentedClaims
O.AUDITING, O.CRYPTO, O.DISCRETIONARY, O.NETWORK, O.SUBJECT, O.MANAGE, O.TRUSTED_CHANNEL, O.COMP, O.CP, T.ACCESS, T.RESTRICT, T.IA, T.INFOFLOW, T.COMM, A.CONNECT, A.PHYSICAL, A.MANAGE, A.AUTHUSER, A.TRAINEDUSER, A.DETECT, A.PEER, OE.ADMIN, OE.REMOTE, OE.INSTALL, OE.MAINTENANCE, OE.PHYSICAL, OE.RECOVER, OE.TRUSTED, OE.INFO_PROTECTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_CDP, FDP_CDP.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_RIP.2, FDP_RIP.3, FDP_ACC.2, FDP_ETC.2, FDP_IFC.1, FDP_CDP.1.1, FDP_UCT, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.2.1, FDP_RIP.3.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1, FDP_UID.2, FDP_TDC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_USB.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.2.1, FIA_USB.2.2, FIA_USB.2.3, FIA_USB.2.4, FIA_UID.2.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MSA.4, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MSA.4.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_TDC.1, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FTA_SSL.1, FTA_SSL.2, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certificates
BSI-DSZ-CC-0787Evaluation facilities
atsecCertification process
out of scope, PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation, as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also, DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to storeStandards
FIPS 140-2, FIPS PUB 186-3, FIPS 186-3, AIS 20, AIS 31, RFC 2460, RFC 3484, RFC 3542, RFC 4213, RFC4253, RFC 4253, RFC 4252, RFC 791, RFC 793, RFC 768, RFC 792File metadata
| Title | SUSE Linux Enterprise Server 11 SP2 including KVM virtualization (version 1.1 as of 2013-01-17 ) |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Security Target, Common Criteria, Linux Distribution" |
| Author | Stephan Mueller (generated by CCTool version 2.7.2) |
| Creation date | D:20130118132358Z |
| Modification date | D:20130306101641+01'00' |
| Pages | 100 |
| Creator | Unknown |
| Producer | XEP 4.18 build 20100322 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0787-2013Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3CPE matches
- cpe:2.3:o:suse:linux_enterprise:11.0:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2011-1083 | MEDIUM | 4.9 | 6.9 | 04.04.2011 | ||
| CVE-2011-3172 | CRITICAL | 9.8 | 5.9 | 08.06.2018 | ||
| CVE-2011-3970 | MEDIUM | 4.3 | 2.9 | 09.02.2012 | ||
| CVE-2012-0507 | HIGH | 10.0 | 10.0 | 07.06.2012 | ||
| CVE-2012-0879 | MEDIUM | 5.5 | 3.6 | 17.05.2012 | ||
| CVE-2012-1090 | MEDIUM | 5.5 | 3.6 | 17.05.2012 | ||
| CVE-2012-1097 | HIGH | 7.8 | 5.9 | 17.05.2012 | ||
| CVE-2012-1146 | MEDIUM | 5.5 | 3.6 | 17.05.2012 | ||
| CVE-2012-1717 | LOW | 2.1 | 2.9 | 16.06.2012 | ||
| CVE-2012-1823 | CRITICAL | 9.8 | 5.9 | 11.05.2012 | ||
| CVE-2012-1970 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-1972 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-1973 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-1974 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-1975 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-1976 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3515 | HIGH | 7.2 | 10.0 | 23.11.2012 | ||
| CVE-2012-3867 | MEDIUM | 4.3 | 2.9 | 06.08.2012 | ||
| CVE-2012-3956 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3957 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3959 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3960 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3961 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3963 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3967 | HIGH | 9.3 | 10.0 | 29.08.2012 | ||
| CVE-2012-3968 | HIGH | 10.0 | 10.0 | 29.08.2012 | ||
| CVE-2012-3972 | MEDIUM | 5.0 | 2.9 | 29.08.2012 | ||
| CVE-2012-3976 | MEDIUM | 4.3 | 2.9 | 29.08.2012 | ||
| CVE-2012-3982 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-3983 | HIGH | 10.0 | 10.0 | 10.10.2012 | ||
| CVE-2012-3984 | MEDIUM | 6.8 | 6.4 | 10.10.2012 | ||
| CVE-2012-3985 | MEDIUM | 4.3 | 2.9 | 10.10.2012 | ||
| CVE-2012-3986 | MEDIUM | 4.3 | 2.9 | 10.10.2012 | ||
| CVE-2012-3988 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-3989 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-3990 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-3991 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-3992 | MEDIUM | 4.3 | 2.9 | 10.10.2012 | ||
| CVE-2012-3994 | MEDIUM | 4.3 | 2.9 | 10.10.2012 | ||
| CVE-2012-3995 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4179 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4180 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4182 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4183 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4184 | MEDIUM | 4.3 | 2.9 | 10.10.2012 | ||
| CVE-2012-4185 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4186 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4187 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4188 | HIGH | 9.3 | 10.0 | 10.10.2012 | ||
| CVE-2012-4193 | MEDIUM | 6.8 | 6.4 | 12.10.2012 | ||
| CVE-2012-4194 | MEDIUM | 4.3 | 2.9 | 29.10.2012 | ||
| CVE-2012-4195 | MEDIUM | 4.3 | 2.9 | 29.10.2012 | ||
| CVE-2012-4196 | MEDIUM | 6.4 | 4.9 | 29.10.2012 | ||
| CVE-2012-4201 | MEDIUM | 4.3 | 2.9 | 21.11.2012 | ||
| CVE-2012-4202 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4204 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4205 | MEDIUM | 6.8 | 6.4 | 21.11.2012 | ||
| CVE-2012-4207 | MEDIUM | 4.3 | 2.9 | 21.11.2012 | ||
| CVE-2012-4208 | MEDIUM | 4.3 | 2.9 | 21.11.2012 | ||
| CVE-2012-4209 | MEDIUM | 4.3 | 2.9 | 21.11.2012 | ||
| CVE-2012-4212 | HIGH | 10.0 | 10.0 | 21.11.2012 | ||
| CVE-2012-4213 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4214 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4215 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4216 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4217 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-4218 | HIGH | 10.0 | 10.0 | 21.11.2012 | ||
| CVE-2012-5612 | MEDIUM | 6.5 | 6.4 | 03.12.2012 | ||
| CVE-2012-5829 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-5830 | HIGH | 8.8 | 5.9 | 21.11.2012 | ||
| CVE-2012-5833 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-5835 | HIGH | 10.0 | 10.0 | 21.11.2012 | ||
| CVE-2012-5836 | HIGH | 7.5 | 6.4 | 21.11.2012 | ||
| CVE-2012-5838 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-5839 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-5840 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-5841 | MEDIUM | 4.3 | 2.9 | 21.11.2012 | ||
| CVE-2012-5842 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-5843 | HIGH | 9.3 | 10.0 | 21.11.2012 | ||
| CVE-2012-6639 | HIGH | 8.8 | 5.9 | 25.11.2019 | ||
| CVE-2013-0170 | MEDIUM | 6.8 | 6.4 | 08.02.2013 | ||
| CVE-2013-0744 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0745 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0746 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0747 | MEDIUM | 6.8 | 6.4 | 13.01.2013 | ||
| CVE-2013-0748 | MEDIUM | 4.3 | 2.9 | 13.01.2013 | ||
| CVE-2013-0749 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0750 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0752 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0753 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0754 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0755 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0756 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0757 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0758 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0759 | MEDIUM | 5.0 | 2.9 | 13.01.2013 | ||
| CVE-2013-0760 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0761 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0762 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0763 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0764 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0766 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0767 | HIGH | 10.0 | 10.0 | 13.01.2013 | ||
| CVE-2013-0768 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0769 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0770 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0771 | HIGH | 9.3 | 10.0 | 13.01.2013 | ||
| CVE-2013-0800 | MEDIUM | 6.8 | 6.4 | 03.04.2013 | ||
| CVE-2013-1690 | HIGH | 8.8 | 5.9 | 26.06.2013 | ||
| CVE-2013-1861 | MEDIUM | 5.0 | 2.9 | 28.03.2013 | ||
| CVE-2013-2465 | HIGH | 10.0 | 10.0 | 18.06.2013 | ||
| CVE-2013-3301 | HIGH | 7.2 | 10.0 | 29.04.2013 | ||
| CVE-2013-3783 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3793 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3794 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3801 | MEDIUM | 5.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3802 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3804 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3805 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3808 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3809 | MEDIUM | 4.0 | 2.9 | 17.07.2013 | ||
| CVE-2013-3812 | LOW | 3.5 | 2.9 | 17.07.2013 | ||
| CVE-2013-4002 | HIGH | 7.1 | 6.9 | 23.07.2013 | ||
| CVE-2013-4480 | HIGH | 7.5 | 6.4 | 18.11.2013 | ||
| CVE-2013-5609 | CRITICAL | 9.8 | 5.9 | 11.12.2013 | ||
| CVE-2013-5610 | HIGH | 10.0 | 10.0 | 11.12.2013 | ||
| CVE-2013-5611 | MEDIUM | 5.8 | 4.9 | 11.12.2013 | ||
| CVE-2013-5612 | MEDIUM | 4.3 | 2.9 | 11.12.2013 | ||
| CVE-2013-5613 | CRITICAL | 9.8 | 5.9 | 11.12.2013 | ||
| CVE-2013-5614 | MEDIUM | 4.3 | 2.9 | 11.12.2013 | ||
| CVE-2013-5615 | CRITICAL | 9.8 | 5.9 | 11.12.2013 | ||
| CVE-2013-5616 | CRITICAL | 9.8 | 5.9 | 11.12.2013 | ||
| CVE-2013-5618 | CRITICAL | 9.8 | 5.9 | 11.12.2013 | ||
| CVE-2013-5619 | HIGH | 7.5 | 6.4 | 11.12.2013 | ||
| CVE-2013-6501 | MEDIUM | 4.6 | 6.4 | 30.03.2015 | ||
| CVE-2013-6672 | MEDIUM | 4.3 | 2.9 | 11.12.2013 | ||
| CVE-2013-6673 | MEDIUM | 5.9 | 3.6 | 11.12.2013 | ||
| CVE-2014-0069 | HIGH | 7.2 | 10.0 | 28.02.2014 | ||
| CVE-2014-0181 | LOW | 2.1 | 2.9 | 27.04.2014 | ||
| CVE-2014-0196 | MEDIUM | 6.9 | 10.0 | 07.05.2014 | ||
| CVE-2014-1477 | CRITICAL | 9.8 | 5.9 | 06.02.2014 | ||
| CVE-2014-1479 | HIGH | 7.5 | 3.6 | 06.02.2014 | ||
| CVE-2014-1480 | MEDIUM | 4.3 | 2.9 | 06.02.2014 | ||
| CVE-2014-1481 | HIGH | 7.5 | 3.6 | 06.02.2014 | ||
| CVE-2014-1482 | HIGH | 8.8 | 5.9 | 06.02.2014 | ||
| CVE-2014-1483 | MEDIUM | 5.0 | 2.9 | 06.02.2014 | ||
| CVE-2014-1484 | MEDIUM | 5.0 | 2.9 | 06.02.2014 | ||
| CVE-2014-1485 | HIGH | 7.5 | 6.4 | 06.02.2014 | ||
| CVE-2014-1486 | CRITICAL | 9.8 | 5.9 | 06.02.2014 | ||
| CVE-2014-1487 | HIGH | 7.5 | 3.6 | 06.02.2014 | ||
| CVE-2014-1488 | HIGH | 10.0 | 10.0 | 06.02.2014 | ||
| CVE-2014-1489 | MEDIUM | 4.3 | 2.9 | 06.02.2014 | ||
| CVE-2014-1490 | HIGH | 9.3 | 10.0 | 06.02.2014 | ||
| CVE-2014-1491 | MEDIUM | 4.3 | 2.9 | 06.02.2014 | ||
| CVE-2014-1493 | CRITICAL | 9.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1494 | HIGH | 9.3 | 10.0 | 19.03.2014 | ||
| CVE-2014-1496 | MEDIUM | 5.5 | 3.6 | 19.03.2014 | ||
| CVE-2014-1497 | HIGH | 8.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1498 | MEDIUM | 5.0 | 2.9 | 19.03.2014 | ||
| CVE-2014-1499 | MEDIUM | 4.3 | 2.9 | 19.03.2014 | ||
| CVE-2014-1500 | MEDIUM | 5.0 | 2.9 | 19.03.2014 | ||
| CVE-2014-1501 | MEDIUM | 5.8 | 4.9 | 19.03.2014 | ||
| CVE-2014-1502 | MEDIUM | 6.8 | 6.4 | 19.03.2014 | ||
| CVE-2014-1504 | LOW | 2.6 | 2.9 | 19.03.2014 | ||
| CVE-2014-1505 | HIGH | 7.5 | 3.6 | 19.03.2014 | ||
| CVE-2014-1508 | CRITICAL | 9.1 | 5.2 | 19.03.2014 | ||
| CVE-2014-1509 | HIGH | 8.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1510 | CRITICAL | 9.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1511 | CRITICAL | 9.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1512 | HIGH | 10.0 | 10.0 | 19.03.2014 | ||
| CVE-2014-1513 | HIGH | 8.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1514 | CRITICAL | 9.8 | 5.9 | 19.03.2014 | ||
| CVE-2014-1737 | HIGH | 7.2 | 10.0 | 11.05.2014 | ||
| CVE-2014-1738 | LOW | 2.1 | 2.9 | 11.05.2014 | ||
| CVE-2014-1739 | LOW | 2.1 | 2.9 | 23.06.2014 | ||
| CVE-2014-1947 | HIGH | 7.8 | 5.9 | 17.02.2020 | ||
| CVE-2014-2484 | MEDIUM | 6.5 | 6.4 | 17.07.2014 | ||
| CVE-2014-2494 | MEDIUM | 4.0 | 2.9 | 17.07.2014 | ||
| CVE-2014-2497 | MEDIUM | 4.3 | 2.9 | 21.03.2014 | ||
| CVE-2014-2706 | HIGH | 7.1 | 6.9 | 14.04.2014 | ||
| CVE-2014-3153 | HIGH | 7.8 | 5.9 | 07.06.2014 | ||
| CVE-2014-3467 | MEDIUM | 5.0 | 2.9 | 05.06.2014 | ||
| CVE-2014-3468 | HIGH | 7.5 | 6.4 | 05.06.2014 | ||
| CVE-2014-3469 | MEDIUM | 5.0 | 2.9 | 05.06.2014 | ||
| CVE-2014-3601 | MEDIUM | 4.3 | 6.9 | 01.09.2014 | ||
| CVE-2014-4027 | LOW | 2.3 | 2.9 | 23.06.2014 | ||
| CVE-2014-4038 | MEDIUM | 4.4 | 6.4 | 17.06.2014 | ||
| CVE-2014-4039 | LOW | 2.1 | 2.9 | 17.06.2014 | ||
| CVE-2014-4207 | MEDIUM | 4.0 | 2.9 | 17.07.2014 | ||
| CVE-2014-4214 | LOW | 3.3 | 2.9 | 17.07.2014 | ||
| CVE-2014-4243 | LOW | 2.8 | 2.9 | 17.07.2014 | ||
| CVE-2014-4258 | MEDIUM | 6.5 | 6.4 | 17.07.2014 | ||
| CVE-2014-4260 | MEDIUM | 5.5 | 4.9 | 17.07.2014 | ||
| CVE-2014-4667 | MEDIUM | 5.0 | 2.9 | 03.07.2014 | ||
| CVE-2014-4943 | MEDIUM | 6.9 | 10.0 | 19.07.2014 | ||
| CVE-2014-5077 | HIGH | 7.1 | 6.9 | 01.08.2014 | ||
| CVE-2014-6271 | CRITICAL | 9.8 | 5.9 | 24.09.2014 | ||
| CVE-2014-7169 | CRITICAL | 9.8 | 5.9 | 25.09.2014 | ||
| CVE-2014-9761 | CRITICAL | 9.8 | 5.9 | 19.04.2016 | ||
| CVE-2014-9853 | MEDIUM | 5.5 | 3.6 | 17.03.2017 | ||
| CVE-2014-9854 | HIGH | 7.5 | 3.6 | 17.03.2017 | ||
| CVE-2015-0272 | MEDIUM | 5.0 | 2.9 | 17.11.2015 | ||
| CVE-2015-0433 | MEDIUM | 4.0 | 2.9 | 16.04.2015 | ||
| CVE-2015-0441 | MEDIUM | 4.0 | 2.9 | 16.04.2015 | ||
| CVE-2015-0484 | MEDIUM | 6.8 | 6.4 | 16.04.2015 | ||
| CVE-2015-0492 | HIGH | 9.3 | 10.0 | 16.04.2015 | ||
| CVE-2015-0499 | LOW | 3.5 | 2.9 | 16.04.2015 | ||
| CVE-2015-0501 | MEDIUM | 5.7 | 6.9 | 16.04.2015 | ||
| CVE-2015-0505 | LOW | 3.5 | 2.9 | 16.04.2015 | ||
| CVE-2015-0797 | MEDIUM | 6.8 | 6.4 | 14.05.2015 | ||
| CVE-2015-1283 | MEDIUM | 6.8 | 6.4 | 23.07.2015 | ||
| CVE-2015-1781 | MEDIUM | 6.8 | 6.4 | 28.09.2015 | ||
| CVE-2015-1931 | MEDIUM | 5.5 | 3.6 | 29.09.2022 | ||
| CVE-2015-2568 | MEDIUM | 5.0 | 2.9 | 16.04.2015 | ||
| CVE-2015-2571 | MEDIUM | 4.0 | 2.9 | 16.04.2015 | ||
| CVE-2015-2573 | MEDIUM | 4.0 | 2.9 | 16.04.2015 | ||
| CVE-2015-2575 | MEDIUM | 4.9 | 4.9 | 16.04.2015 | ||
| CVE-2015-2576 | LOW | 2.1 | 2.9 | 16.04.2015 | ||
| CVE-2015-2695 | MEDIUM | 5.0 | 2.9 | 09.11.2015 | ||
| CVE-2015-2734 | HIGH | 10.0 | 10.0 | 06.07.2015 | ||
| CVE-2015-2737 | HIGH | 10.0 | 10.0 | 06.07.2015 | ||
| CVE-2015-2738 | HIGH | 10.0 | 10.0 | 06.07.2015 | ||
| CVE-2015-3209 | HIGH | 7.5 | 6.4 | 15.06.2015 | ||
| CVE-2015-4106 | MEDIUM | 4.6 | 6.4 | 03.06.2015 | ||
| CVE-2015-4495 | HIGH | 8.8 | 5.9 | 08.08.2015 | ||
| CVE-2015-4830 | MEDIUM | 4.0 | 2.9 | 21.10.2015 | ||
| CVE-2015-4902 | MEDIUM | 5.0 | 2.9 | 22.10.2015 | ||
| CVE-2015-5006 | LOW | 2.1 | 2.9 | 07.12.2015 | ||
| CVE-2015-5041 | CRITICAL | 9.1 | 5.2 | 06.06.2016 | ||
| CVE-2015-5154 | HIGH | 7.2 | 10.0 | 12.08.2015 | ||
| CVE-2015-5239 | MEDIUM | 6.5 | 3.6 | 23.01.2020 | ||
| CVE-2015-5300 | HIGH | 7.5 | 3.6 | 21.07.2017 | ||
| CVE-2015-5707 | MEDIUM | 4.6 | 6.4 | 19.10.2015 | ||
| CVE-2015-7547 | HIGH | 8.1 | 5.9 | 18.02.2016 | ||
| CVE-2015-7976 | MEDIUM | 4.3 | 1.4 | 30.01.2017 | ||
| CVE-2015-8551 | MEDIUM | 6.0 | 4.0 | 13.04.2016 | ||
| CVE-2015-8567 | HIGH | 7.7 | 4.0 | 13.04.2017 | ||
| CVE-2015-8776 | CRITICAL | 9.1 | 5.2 | 19.04.2016 | ||
| CVE-2015-8778 | CRITICAL | 9.8 | 5.9 | 19.04.2016 | ||
| CVE-2015-8779 | CRITICAL | 9.8 | 5.9 | 19.04.2016 | ||
| CVE-2016-0264 | MEDIUM | 5.6 | 3.4 | 24.05.2016 | ||
| CVE-2016-0642 | MEDIUM | 4.7 | 4.2 | 21.04.2016 | ||
| CVE-2016-0651 | MEDIUM | 5.5 | 3.6 | 21.04.2016 | ||
| CVE-2016-0718 | CRITICAL | 9.8 | 5.9 | 26.05.2016 | ||
| CVE-2016-1000030 | CRITICAL | 9.8 | 5.9 | 05.09.2018 | ||
| CVE-2016-1285 | MEDIUM | 6.8 | 4.0 | 09.03.2016 | ||
| CVE-2016-1286 | HIGH | 8.6 | 4.0 | 09.03.2016 | ||
| CVE-2016-2782 | MEDIUM | 4.6 | 3.6 | 27.04.2016 | ||
| CVE-2016-3427 | CRITICAL | 9.8 | 5.9 | 21.04.2016 | ||
| CVE-2016-3715 | MEDIUM | 5.5 | 3.6 | 05.05.2016 | ||
| CVE-2016-3718 | MEDIUM | 5.5 | 3.6 | 05.05.2016 | ||
| CVE-2016-4953 | HIGH | 7.5 | 3.6 | 05.07.2016 | ||
| CVE-2016-4954 | HIGH | 7.5 | 3.6 | 05.07.2016 | ||
| CVE-2016-4955 | MEDIUM | 5.9 | 3.6 | 05.07.2016 | ||
| CVE-2016-4956 | MEDIUM | 5.3 | 1.4 | 05.07.2016 | ||
| CVE-2016-4957 | HIGH | 7.5 | 3.6 | 05.07.2016 | ||
| CVE-2016-5244 | HIGH | 7.5 | 3.6 | 27.06.2016 | ||
| CVE-2016-5772 | CRITICAL | 9.8 | 5.9 | 07.08.2016 | ||
| CVE-2017-1000366 | HIGH | 7.8 | 5.9 | 19.06.2017 | ||
| CVE-2017-13077 | MEDIUM | 6.8 | 5.2 | 17.10.2017 | ||
| CVE-2017-13078 | MEDIUM | 5.3 | 3.6 | 17.10.2017 | ||
| CVE-2017-13079 | MEDIUM | 5.3 | 3.6 | 17.10.2017 | ||
| CVE-2017-13080 | MEDIUM | 5.3 | 3.6 | 17.10.2017 | ||
| CVE-2017-13081 | MEDIUM | 5.3 | 3.6 | 17.10.2017 | ||
| CVE-2017-13082 | HIGH | 8.1 | 5.2 | 17.10.2017 | ||
| CVE-2017-13084 | MEDIUM | 6.8 | 5.2 | 17.10.2017 | ||
| CVE-2017-13086 | MEDIUM | 6.8 | 5.2 | 17.10.2017 | ||
| CVE-2017-13087 | MEDIUM | 5.3 | 3.6 | 17.10.2017 | ||
| CVE-2017-13088 | MEDIUM | 5.3 | 3.6 | 17.10.2017 | ||
| CVE-2017-14491 | CRITICAL | 9.8 | 5.9 | 04.10.2017 | ||
| CVE-2017-14798 | HIGH | 7.0 | 5.9 | 01.03.2018 | ||
| CVE-2017-15115 | HIGH | 7.8 | 5.9 | 15.11.2017 | ||
| CVE-2017-17558 | MEDIUM | 6.6 | 5.9 | 12.12.2017 | ||
| CVE-2017-17805 | HIGH | 7.8 | 5.9 | 20.12.2017 | ||
| CVE-2017-17806 | HIGH | 7.8 | 5.9 | 20.12.2017 | ||
| CVE-2017-18017 | CRITICAL | 9.8 | 5.9 | 03.01.2018 | ||
| CVE-2017-5753 | MEDIUM | 5.6 | 4.0 | 04.01.2018 | ||
| CVE-2018-10195 | HIGH | 7.1 | 5.2 | 02.06.2021 | ||
| CVE-2018-17962 | HIGH | 7.5 | 3.6 | 09.10.2018 | ||
| CVE-2018-18873 | MEDIUM | 5.5 | 3.6 | 31.10.2018 | ||
| CVE-2018-19052 | HIGH | 7.5 | 3.6 | 07.11.2018 | ||
| CVE-2018-19208 | MEDIUM | 6.5 | 3.6 | 12.11.2018 | ||
| CVE-2018-19539 | MEDIUM | 6.5 | 3.6 | 26.11.2018 | ||
| CVE-2018-19540 | HIGH | 8.8 | 5.9 | 26.11.2018 | ||
| CVE-2018-19541 | HIGH | 8.8 | 5.9 | 26.11.2018 | ||
| CVE-2018-19542 | MEDIUM | 6.5 | 3.6 | 26.11.2018 | ||
| CVE-2018-19543 | HIGH | 7.8 | 5.9 | 26.11.2018 | ||
| CVE-2018-19655 | HIGH | 8.8 | 5.9 | 29.11.2018 | ||
| CVE-2018-6556 | LOW | 3.3 | 1.4 | 10.08.2018 | ||
| CVE-2020-15705 | MEDIUM | 6.4 | 5.9 | 29.07.2020 | ||
| CVE-2020-15706 | MEDIUM | 6.4 | 5.9 | 29.07.2020 | ||
| CVE-2020-15707 | MEDIUM | 6.4 | 5.9 | 29.07.2020 | ||
| CVE-2020-8013 | LOW | 2.5 | 1.4 | 02.03.2020 | ||
| CVE-2021-45082 | HIGH | 7.8 | 5.9 | 19.02.2022 | ||
| CVE-2022-27239 | HIGH | 7.8 | 5.9 | 27.04.2022 | ||
Showing 5 out of 295.
Similar certificates
| Name | Certificate ID | |
|---|---|---|
| SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-e... | BSI-DSZ-CC-0292-2005 | Compare |
| SUSE Linux Enterprise Server 11 Service Pack 2 on IBM System z | BSI-DSZ-CC-0852-2013 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "cac91660b0d1f7c7",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0787-2013",
"cert_lab": [
"BSI"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise:11.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"
]
},
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2015-5300",
"CVE-2016-4953",
"CVE-2012-4217",
"CVE-2014-1510",
"CVE-2013-0762",
"CVE-2014-1737",
"CVE-2012-3988",
"CVE-2014-1509",
"CVE-2013-0768",
"CVE-2013-3809",
"CVE-2012-3972",
"CVE-2013-5612",
"CVE-2016-4956",
"CVE-2016-1285",
"CVE-2013-5619",
"CVE-2018-19541",
"CVE-2016-0264",
"CVE-2018-10195",
"CVE-2015-3209",
"CVE-2016-3715",
"CVE-2012-5843",
"CVE-2014-1480",
"CVE-2014-1504",
"CVE-2012-4182",
"CVE-2012-5842",
"CVE-2015-0797",
"CVE-2017-5753",
"CVE-2012-5836",
"CVE-2012-4185",
"CVE-2014-4038",
"CVE-2012-5830",
"CVE-2014-3601",
"CVE-2012-3985",
"CVE-2013-0763",
"CVE-2012-0879",
"CVE-2016-4955",
"CVE-2012-4213",
"CVE-2013-3808",
"CVE-2012-3959",
"CVE-2014-1494",
"CVE-2012-3957",
"CVE-2014-1500",
"CVE-2015-2571",
"CVE-2015-0501",
"CVE-2012-3995",
"CVE-2014-3153",
"CVE-2013-0755",
"CVE-2014-1497",
"CVE-2013-0759",
"CVE-2014-4243",
"CVE-2013-0800",
"CVE-2012-3984",
"CVE-2017-13087",
"CVE-2017-13079",
"CVE-2012-4193",
"CVE-2013-5614",
"CVE-2014-1489",
"CVE-2014-1499",
"CVE-2013-3804",
"CVE-2012-3515",
"CVE-2011-3172",
"CVE-2014-0181",
"CVE-2012-1090",
"CVE-2015-0441",
"CVE-2012-5839",
"CVE-2012-3961",
"CVE-2017-13081",
"CVE-2012-3982",
"CVE-2013-0752",
"CVE-2013-1690",
"CVE-2014-2706",
"CVE-2018-6556",
"CVE-2014-1738",
"CVE-2016-1000030",
"CVE-2016-4957",
"CVE-2013-0771",
"CVE-2017-17806",
"CVE-2014-1479",
"CVE-2015-2575",
"CVE-2018-19539",
"CVE-2015-5154",
"CVE-2012-4209",
"CVE-2013-2465",
"CVE-2013-0770",
"CVE-2018-19208",
"CVE-2013-5616",
"CVE-2018-19542",
"CVE-2013-3301",
"CVE-2015-4830",
"CVE-2014-4258",
"CVE-2013-5613",
"CVE-2015-2695",
"CVE-2018-17962",
"CVE-2012-1972",
"CVE-2014-1514",
"CVE-2013-0747",
"CVE-2016-0642",
"CVE-2018-18873",
"CVE-2015-4902",
"CVE-2012-4195",
"CVE-2014-1477",
"CVE-2012-4207",
"CVE-2012-3956",
"CVE-2017-14798",
"CVE-2014-1511",
"CVE-2015-0433",
"CVE-2012-4183",
"CVE-2012-5841",
"CVE-2015-8779",
"CVE-2014-1491",
"CVE-2015-0484",
"CVE-2015-2573",
"CVE-2014-1501",
"CVE-2015-0499",
"CVE-2015-8776",
"CVE-2012-4180",
"CVE-2014-7169",
"CVE-2017-17805",
"CVE-2013-0769",
"CVE-2014-2484",
"CVE-2015-2734",
"CVE-2014-1505",
"CVE-2012-5833",
"CVE-2015-8551",
"CVE-2013-0749",
"CVE-2013-0760",
"CVE-2012-4188",
"CVE-2014-0196",
"CVE-2012-3967",
"CVE-2014-1486",
"CVE-2012-3986",
"CVE-2014-0069",
"CVE-2017-13078",
"CVE-2012-3983",
"CVE-2014-6271",
"CVE-2013-5609",
"CVE-2014-4039",
"CVE-2012-1146",
"CVE-2015-5006",
"CVE-2013-0757",
"CVE-2017-14491",
"CVE-2014-9854",
"CVE-2014-9761",
"CVE-2013-0745",
"CVE-2016-3427",
"CVE-2012-1973",
"CVE-2015-5041",
"CVE-2014-9853",
"CVE-2014-4207",
"CVE-2013-3793",
"CVE-2012-4216",
"CVE-2012-3994",
"CVE-2014-4027",
"CVE-2012-3968",
"CVE-2014-4260",
"CVE-2012-3990",
"CVE-2012-3992",
"CVE-2012-4184",
"CVE-2013-3794",
"CVE-2012-3960",
"CVE-2012-0507",
"CVE-2014-4214",
"CVE-2017-13086",
"CVE-2014-1481",
"CVE-2013-5618",
"CVE-2014-1490",
"CVE-2014-1487",
"CVE-2014-1508",
"CVE-2017-1000366",
"CVE-2013-4002",
"CVE-2015-7547",
"CVE-2015-2568",
"CVE-2012-3976",
"CVE-2013-4480",
"CVE-2012-4202",
"CVE-2014-2494",
"CVE-2015-5707",
"CVE-2014-1498",
"CVE-2022-27239",
"CVE-2014-1512",
"CVE-2013-0754",
"CVE-2020-15706",
"CVE-2012-1097",
"CVE-2014-1483",
"CVE-2012-5838",
"CVE-2014-1496",
"CVE-2014-1488",
"CVE-2017-13088",
"CVE-2015-0505",
"CVE-2020-8013",
"CVE-2012-4194",
"CVE-2014-4943",
"CVE-2013-5611",
"CVE-2013-0766",
"CVE-2014-1482",
"CVE-2012-4214",
"CVE-2014-3468",
"CVE-2014-4667",
"CVE-2017-13077",
"CVE-2012-5829",
"CVE-2016-1286",
"CVE-2013-0753",
"CVE-2012-5612",
"CVE-2015-1283",
"CVE-2013-0761",
"CVE-2012-4186",
"CVE-2013-6673",
"CVE-2012-4215",
"CVE-2016-0718",
"CVE-2012-5840",
"CVE-2012-3989",
"CVE-2020-15707",
"CVE-2015-1781",
"CVE-2016-5244",
"CVE-2015-1931",
"CVE-2012-4201",
"CVE-2015-2738",
"CVE-2014-3469",
"CVE-2013-0758",
"CVE-2017-15115",
"CVE-2018-19540",
"CVE-2012-4218",
"CVE-2017-13080",
"CVE-2013-0170",
"CVE-2013-0746",
"CVE-2013-0764",
"CVE-2012-1970",
"CVE-2013-3801",
"CVE-2012-1974",
"CVE-2014-1493",
"CVE-2013-3802",
"CVE-2014-1739",
"CVE-2015-8567",
"CVE-2012-1976",
"CVE-2013-0750",
"CVE-2012-1717",
"CVE-2012-5835",
"CVE-2015-8778",
"CVE-2016-2782",
"CVE-2021-45082",
"CVE-2012-4196",
"CVE-2016-5772",
"CVE-2015-5239",
"CVE-2012-4208",
"CVE-2012-4212",
"CVE-2012-3991",
"CVE-2015-0492",
"CVE-2018-19543",
"CVE-2012-4204",
"CVE-2013-5615",
"CVE-2017-13084",
"CVE-2013-3783",
"CVE-2014-1484",
"CVE-2018-19655",
"CVE-2013-6672",
"CVE-2015-4495",
"CVE-2013-6501",
"CVE-2015-2576",
"CVE-2015-0272",
"CVE-2016-3718",
"CVE-2011-1083",
"CVE-2016-0651",
"CVE-2012-4187",
"CVE-2017-18017",
"CVE-2012-6639",
"CVE-2011-3970",
"CVE-2013-3805",
"CVE-2015-7976",
"CVE-2016-4954",
"CVE-2015-2737",
"CVE-2014-1502",
"CVE-2012-1975",
"CVE-2017-17558",
"CVE-2018-19052",
"CVE-2015-4106",
"CVE-2013-3812",
"CVE-2014-1485",
"CVE-2020-15705",
"CVE-2017-13082",
"CVE-2013-0756",
"CVE-2012-3867",
"CVE-2012-4179",
"CVE-2014-2497",
"CVE-2014-1947",
"CVE-2012-4205",
"CVE-2013-0748",
"CVE-2014-3467",
"CVE-2014-5077",
"CVE-2013-0767",
"CVE-2013-0744",
"CVE-2012-1823",
"CVE-2012-3963",
"CVE-2013-1861",
"CVE-2013-5610",
"CVE-2014-1513"
]
},
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"11",
"2"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2012-3972",
"CVE-2016-0264",
"CVE-2015-3209",
"CVE-2012-5843",
"CVE-2012-5836",
"CVE-2014-4038",
"CVE-2014-1494",
"CVE-2014-1500",
"CVE-2015-0501",
"CVE-2013-0755",
"CVE-2023-29552",
"CVE-2014-1489",
"CVE-2015-0382",
"CVE-2015-0441",
"CVE-2015-0391",
"CVE-2017-13081",
"CVE-2013-0752",
"CVE-2018-6556",
"CVE-2016-1000030",
"CVE-2013-0771",
"CVE-2014-2978",
"CVE-2017-17806",
"CVE-2015-2575",
"CVE-2015-5154",
"CVE-2018-19208",
"CVE-2015-0192",
"CVE-2013-5616",
"CVE-2018-19542",
"CVE-2014-4258",
"CVE-2018-18873",
"CVE-2012-4195",
"CVE-2017-14798",
"CVE-2015-0499",
"CVE-2012-4180",
"CVE-2014-7169",
"CVE-2017-17805",
"CVE-2013-0769",
"CVE-2015-8551",
"CVE-2014-2977",
"CVE-2014-0069",
"CVE-2017-13078",
"CVE-2014-6520",
"CVE-2015-5006",
"CVE-2017-14491",
"CVE-2015-0381",
"CVE-2015-5041",
"CVE-2015-2808",
"CVE-2012-4216",
"CVE-2012-3968",
"CVE-2014-4214",
"CVE-2017-13086",
"CVE-2015-7547",
"CVE-2012-3976",
"CVE-2015-5707",
"CVE-2020-15706",
"CVE-2016-9957",
"CVE-2014-1488",
"CVE-2014-6463",
"CVE-2020-6426",
"CVE-2013-0761",
"CVE-2012-4215",
"CVE-2016-0718",
"CVE-2012-5840",
"CVE-2014-6505",
"CVE-2016-0668",
"CVE-2013-0750",
"CVE-2012-5835",
"CVE-2020-5504",
"CVE-2012-4208",
"CVE-2015-0492",
"CVE-2014-6478",
"CVE-2014-1484",
"CVE-2015-3340",
"CVE-2014-6564",
"CVE-2013-6501",
"CVE-2017-18017",
"CVE-2015-7976",
"CVE-2014-6559",
"CVE-2015-0374",
"CVE-2012-3963",
"CVE-2014-1513",
"CVE-2015-5300",
"CVE-2016-3714",
"CVE-2012-4217",
"CVE-2014-1510",
"CVE-2014-1737",
"CVE-2014-6495",
"CVE-2013-5619",
"CVE-2018-10195",
"CVE-2012-4182",
"CVE-2012-5842",
"CVE-2015-0797",
"CVE-2012-4185",
"CVE-2012-5830",
"CVE-2013-0763",
"CVE-2012-3959",
"CVE-2015-2571",
"CVE-2012-3995",
"CVE-2014-3153",
"CVE-2013-0800",
"CVE-2017-13087",
"CVE-2013-5614",
"CVE-2014-1499",
"CVE-2012-3961",
"CVE-2013-1690",
"CVE-2014-2706",
"CVE-2014-6464",
"CVE-2012-4209",
"CVE-2013-0770",
"CVE-2013-3301",
"CVE-2015-2695",
"CVE-2013-0747",
"CVE-2014-6530",
"CVE-2015-0484",
"CVE-2015-2573",
"CVE-2015-8776",
"CVE-2014-6555",
"CVE-2015-2734",
"CVE-2014-1505",
"CVE-2013-0760",
"CVE-2012-4188",
"CVE-2018-16874",
"CVE-2014-1486",
"CVE-2012-3986",
"CVE-2018-12116",
"CVE-2014-6271",
"CVE-2014-7815",
"CVE-2012-1146",
"CVE-2013-0745",
"CVE-2014-8160",
"CVE-2012-3990",
"CVE-2012-3960",
"CVE-2014-1487",
"CVE-2013-5618",
"CVE-2014-6484",
"CVE-2014-2494",
"CVE-2014-1498",
"CVE-2014-1496",
"CVE-2020-8013",
"CVE-2014-4943",
"CVE-2014-3468",
"CVE-2012-5829",
"CVE-2012-5612",
"CVE-2015-1283",
"CVE-2013-6673",
"CVE-2012-3989",
"CVE-2016-5244",
"CVE-2020-15707",
"CVE-2013-0758",
"CVE-2017-13080",
"CVE-2013-0170",
"CVE-2014-6568",
"CVE-2012-1974",
"CVE-2021-45082",
"CVE-2020-6449",
"CVE-2015-5239",
"CVE-2012-4196",
"CVE-2012-4204",
"CVE-2013-6672",
"CVE-2018-16873",
"CVE-2016-9959",
"CVE-2015-4495",
"CVE-2015-2576",
"CVE-2015-0432",
"CVE-2011-1083",
"CVE-2016-0651",
"CVE-2011-3970",
"CVE-2013-3805",
"CVE-2014-1502",
"CVE-2013-3812",
"CVE-2020-15705",
"CVE-2013-0756",
"CVE-2013-0767",
"CVE-2016-1602",
"CVE-2016-4953",
"CVE-2014-1509",
"CVE-2016-1285",
"CVE-2016-4956",
"CVE-2016-3715",
"CVE-2014-1480",
"CVE-2017-5753",
"CVE-2012-4213",
"CVE-2013-3808",
"CVE-2012-3957",
"CVE-2014-0221",
"CVE-2014-1497",
"CVE-2013-3804",
"CVE-2011-3172",
"CVE-2012-1090",
"CVE-2012-5839",
"CVE-2014-9584",
"CVE-2015-4000",
"CVE-2014-1738",
"CVE-2014-1479",
"CVE-2020-6424",
"CVE-2018-19539",
"CVE-2014-6496",
"CVE-2013-5613",
"CVE-2016-9958",
"CVE-2018-17962",
"CVE-2012-1972",
"CVE-2014-1514",
"CVE-2019-18902",
"CVE-2015-4902",
"CVE-2014-6551",
"CVE-2014-1511",
"CVE-2015-0433",
"CVE-2014-1491",
"CVE-2012-5833",
"CVE-2014-9585",
"CVE-2014-0196",
"CVE-2012-3967",
"CVE-2012-3983",
"CVE-2013-5609",
"CVE-2014-4039",
"CVE-2013-0757",
"CVE-2016-3427",
"CVE-2012-1973",
"CVE-2014-4207",
"CVE-2014-9853",
"CVE-2012-3994",
"CVE-2014-6507",
"CVE-2014-6469",
"CVE-2012-4184",
"CVE-2013-3794",
"CVE-2015-6855",
"CVE-2002-20001",
"CVE-2014-1508",
"CVE-2013-4002",
"CVE-2015-2568",
"CVE-2012-4202",
"CVE-2022-27239",
"CVE-2014-1512",
"CVE-2013-0754",
"CVE-2012-1097",
"CVE-2015-8126",
"CVE-2017-13088",
"CVE-2015-0505",
"CVE-2012-4194",
"CVE-2013-5611",
"CVE-2013-0766",
"CVE-2014-1482",
"CVE-2014-4667",
"CVE-2017-13077",
"CVE-2013-0753",
"CVE-2012-4186",
"CVE-2015-1781",
"CVE-2015-1931",
"CVE-2015-2738",
"CVE-2012-4201",
"CVE-2014-3469",
"CVE-2017-15115",
"CVE-2018-19540",
"CVE-2013-0764",
"CVE-2014-4287",
"CVE-2013-3801",
"CVE-2014-1739",
"CVE-2015-8778",
"CVE-2016-5772",
"CVE-2012-4212",
"CVE-2012-3991",
"CVE-2018-19543",
"CVE-2013-5615",
"CVE-2017-13084",
"CVE-2014-6474",
"CVE-2016-3718",
"CVE-2012-4187",
"CVE-2016-4954",
"CVE-2015-2737",
"CVE-2012-1975",
"CVE-2017-13082",
"CVE-2012-3867",
"CVE-2012-4179",
"CVE-2014-2497",
"CVE-2014-1947",
"CVE-2014-5077",
"CVE-2019-18897",
"CVE-2020-6428",
"CVE-2013-0762",
"CVE-2012-3988",
"CVE-2013-0768",
"CVE-2013-3809",
"CVE-2013-5612",
"CVE-2018-19541",
"CVE-2015-2696",
"CVE-2014-1504",
"CVE-2015-2697",
"CVE-2014-3601",
"CVE-2012-3985",
"CVE-2012-0879",
"CVE-2016-4955",
"CVE-2013-0759",
"CVE-2014-4243",
"CVE-2012-3984",
"CVE-2017-13079",
"CVE-2012-4193",
"CVE-2012-3515",
"CVE-2014-0181",
"CVE-2012-3982",
"CVE-2016-4957",
"CVE-2014-3470",
"CVE-2018-12122",
"CVE-2013-2465",
"CVE-2015-4830",
"CVE-2016-0642",
"CVE-2014-1477",
"CVE-2012-4207",
"CVE-2016-5118",
"CVE-2012-3956",
"CVE-2012-4183",
"CVE-2015-8779",
"CVE-2012-5841",
"CVE-2014-1501",
"CVE-2020-6427",
"CVE-2014-2484",
"CVE-2014-3673",
"CVE-2013-0749",
"CVE-2020-6429",
"CVE-2014-9854",
"CVE-2014-9761",
"CVE-2013-3793",
"CVE-2014-4027",
"CVE-2014-4260",
"CVE-2012-3992",
"CVE-2012-0507",
"CVE-2014-1481",
"CVE-2014-1490",
"CVE-2017-1000366",
"CVE-2013-4480",
"CVE-2014-1483",
"CVE-2012-5838",
"CVE-2012-4214",
"CVE-2020-6422",
"CVE-2016-1286",
"CVE-2016-2324",
"CVE-2012-4218",
"CVE-2013-0746",
"CVE-2016-2315",
"CVE-2019-15624",
"CVE-2012-1970",
"CVE-2014-1493",
"CVE-2013-3802",
"CVE-2015-8567",
"CVE-2012-1976",
"CVE-2012-1717",
"CVE-2016-2782",
"CVE-2014-6494",
"CVE-2013-3783",
"CVE-2018-19655",
"CVE-2014-0198",
"CVE-2015-0272",
"CVE-2019-18901",
"CVE-2012-6639",
"CVE-2017-17558",
"CVE-2018-19052",
"CVE-2015-4106",
"CVE-2014-1485",
"CVE-2010-5298",
"CVE-2014-9116",
"CVE-2012-4205",
"CVE-2013-0748",
"CVE-2014-3467",
"CVE-2013-0744",
"CVE-2012-1823",
"CVE-2013-5610",
"CVE-2013-1861",
"CVE-2019-18903",
"CVE-2015-2590"
]
},
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"70cdc8b0cf910af7"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2015-5300",
"CVE-2016-4953",
"CVE-2012-4217",
"CVE-2014-1510",
"CVE-2013-0762",
"CVE-2014-1737",
"CVE-2012-3988",
"CVE-2014-1509",
"CVE-2013-0768",
"CVE-2013-3809",
"CVE-2012-3972",
"CVE-2013-5612",
"CVE-2016-4956",
"CVE-2016-1285",
"CVE-2013-5619",
"CVE-2018-19541",
"CVE-2016-0264",
"CVE-2018-10195",
"CVE-2015-3209",
"CVE-2016-3715",
"CVE-2012-5843",
"CVE-2014-1480",
"CVE-2014-1504",
"CVE-2012-4182",
"CVE-2012-5842",
"CVE-2015-0797",
"CVE-2017-5753",
"CVE-2012-5836",
"CVE-2012-4185",
"CVE-2014-4038",
"CVE-2012-5830",
"CVE-2014-3601",
"CVE-2012-3985",
"CVE-2013-0763",
"CVE-2012-0879",
"CVE-2016-4955",
"CVE-2012-4213",
"CVE-2013-3808",
"CVE-2012-3959",
"CVE-2014-1494",
"CVE-2012-3957",
"CVE-2014-1500",
"CVE-2015-2571",
"CVE-2015-0501",
"CVE-2012-3995",
"CVE-2014-3153",
"CVE-2013-0755",
"CVE-2014-1497",
"CVE-2013-0759",
"CVE-2014-4243",
"CVE-2013-0800",
"CVE-2012-3984",
"CVE-2017-13087",
"CVE-2017-13079",
"CVE-2012-4193",
"CVE-2013-5614",
"CVE-2014-1489",
"CVE-2014-1499",
"CVE-2013-3804",
"CVE-2012-3515",
"CVE-2011-3172",
"CVE-2014-0181",
"CVE-2012-1090",
"CVE-2015-0441",
"CVE-2012-5839",
"CVE-2012-3961",
"CVE-2017-13081",
"CVE-2012-3982",
"CVE-2013-0752",
"CVE-2013-1690",
"CVE-2014-2706",
"CVE-2018-6556",
"CVE-2014-1738",
"CVE-2016-1000030",
"CVE-2016-4957",
"CVE-2013-0771",
"CVE-2017-17806",
"CVE-2014-1479",
"CVE-2015-2575",
"CVE-2018-19539",
"CVE-2015-5154",
"CVE-2012-4209",
"CVE-2013-2465",
"CVE-2013-0770",
"CVE-2018-19208",
"CVE-2013-5616",
"CVE-2018-19542",
"CVE-2013-3301",
"CVE-2015-4830",
"CVE-2014-4258",
"CVE-2013-5613",
"CVE-2015-2695",
"CVE-2018-17962",
"CVE-2012-1972",
"CVE-2014-1514",
"CVE-2013-0747",
"CVE-2016-0642",
"CVE-2018-18873",
"CVE-2015-4902",
"CVE-2012-4195",
"CVE-2014-1477",
"CVE-2012-4207",
"CVE-2012-3956",
"CVE-2017-14798",
"CVE-2014-1511",
"CVE-2015-0433",
"CVE-2012-4183",
"CVE-2012-5841",
"CVE-2015-8779",
"CVE-2014-1491",
"CVE-2015-0484",
"CVE-2015-2573",
"CVE-2014-1501",
"CVE-2015-0499",
"CVE-2015-8776",
"CVE-2012-4180",
"CVE-2014-7169",
"CVE-2017-17805",
"CVE-2013-0769",
"CVE-2014-2484",
"CVE-2015-2734",
"CVE-2014-1505",
"CVE-2012-5833",
"CVE-2015-8551",
"CVE-2013-0749",
"CVE-2013-0760",
"CVE-2012-4188",
"CVE-2014-0196",
"CVE-2012-3967",
"CVE-2014-1486",
"CVE-2012-3986",
"CVE-2014-0069",
"CVE-2017-13078",
"CVE-2012-3983",
"CVE-2014-6271",
"CVE-2013-5609",
"CVE-2014-4039",
"CVE-2012-1146",
"CVE-2015-5006",
"CVE-2013-0757",
"CVE-2017-14491",
"CVE-2014-9854",
"CVE-2014-9761",
"CVE-2013-0745",
"CVE-2016-3427",
"CVE-2012-1973",
"CVE-2015-5041",
"CVE-2014-9853",
"CVE-2014-4207",
"CVE-2013-3793",
"CVE-2012-4216",
"CVE-2012-3994",
"CVE-2014-4027",
"CVE-2012-3968",
"CVE-2014-4260",
"CVE-2012-3990",
"CVE-2012-3992",
"CVE-2012-4184",
"CVE-2013-3794",
"CVE-2012-3960",
"CVE-2012-0507",
"CVE-2014-4214",
"CVE-2017-13086",
"CVE-2014-1481",
"CVE-2013-5618",
"CVE-2014-1490",
"CVE-2014-1487",
"CVE-2014-1508",
"CVE-2017-1000366",
"CVE-2013-4002",
"CVE-2015-7547",
"CVE-2015-2568",
"CVE-2012-3976",
"CVE-2013-4480",
"CVE-2012-4202",
"CVE-2014-2494",
"CVE-2015-5707",
"CVE-2014-1498",
"CVE-2022-27239",
"CVE-2014-1512",
"CVE-2013-0754",
"CVE-2020-15706",
"CVE-2012-1097",
"CVE-2014-1483",
"CVE-2012-5838",
"CVE-2014-1496",
"CVE-2014-1488",
"CVE-2017-13088",
"CVE-2015-0505",
"CVE-2020-8013",
"CVE-2012-4194",
"CVE-2014-4943",
"CVE-2013-5611",
"CVE-2013-0766",
"CVE-2014-1482",
"CVE-2012-4214",
"CVE-2014-3468",
"CVE-2014-4667",
"CVE-2017-13077",
"CVE-2012-5829",
"CVE-2016-1286",
"CVE-2013-0753",
"CVE-2012-5612",
"CVE-2015-1283",
"CVE-2013-0761",
"CVE-2012-4186",
"CVE-2013-6673",
"CVE-2012-4215",
"CVE-2016-0718",
"CVE-2012-5840",
"CVE-2012-3989",
"CVE-2020-15707",
"CVE-2015-1781",
"CVE-2016-5244",
"CVE-2015-1931",
"CVE-2012-4201",
"CVE-2015-2738",
"CVE-2014-3469",
"CVE-2013-0758",
"CVE-2017-15115",
"CVE-2018-19540",
"CVE-2012-4218",
"CVE-2017-13080",
"CVE-2013-0170",
"CVE-2013-0746",
"CVE-2013-0764",
"CVE-2012-1970",
"CVE-2013-3801",
"CVE-2012-1974",
"CVE-2014-1493",
"CVE-2013-3802",
"CVE-2014-1739",
"CVE-2015-8567",
"CVE-2012-1976",
"CVE-2013-0750",
"CVE-2012-1717",
"CVE-2012-5835",
"CVE-2015-8778",
"CVE-2016-2782",
"CVE-2021-45082",
"CVE-2012-4196",
"CVE-2016-5772",
"CVE-2015-5239",
"CVE-2012-4208",
"CVE-2012-4212",
"CVE-2012-3991",
"CVE-2015-0492",
"CVE-2018-19543",
"CVE-2012-4204",
"CVE-2013-5615",
"CVE-2017-13084",
"CVE-2013-3783",
"CVE-2014-1484",
"CVE-2018-19655",
"CVE-2013-6672",
"CVE-2015-4495",
"CVE-2013-6501",
"CVE-2015-2576",
"CVE-2015-0272",
"CVE-2016-3718",
"CVE-2011-1083",
"CVE-2016-0651",
"CVE-2012-4187",
"CVE-2017-18017",
"CVE-2012-6639",
"CVE-2011-3970",
"CVE-2013-3805",
"CVE-2015-7976",
"CVE-2016-4954",
"CVE-2015-2737",
"CVE-2014-1502",
"CVE-2012-1975",
"CVE-2017-17558",
"CVE-2018-19052",
"CVE-2015-4106",
"CVE-2013-3812",
"CVE-2014-1485",
"CVE-2020-15705",
"CVE-2017-13082",
"CVE-2013-0756",
"CVE-2012-3867",
"CVE-2012-4179",
"CVE-2014-2497",
"CVE-2014-1947",
"CVE-2012-4205",
"CVE-2013-0748",
"CVE-2014-3467",
"CVE-2014-5077",
"CVE-2013-0767",
"CVE-2013-0744",
"CVE-2012-1823",
"CVE-2012-3963",
"CVE-2013-1861",
"CVE-2013-5610",
"CVE-2014-1513"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0852-2013"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0962-2016",
"BSI-DSZ-CC-0852-2013"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SUSE Linux Products Gmbh",
"manufacturer_web": "https://www.suse.com/",
"name": "SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-02-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0787a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0787-2013",
"cert_item": "SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization",
"cert_lab": "BSI",
"developer": "SUSE Linux Products GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0787-2013": 20
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0067-": 1,
"BSI-CC-PP-0067-2010": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 5,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 6,
"EAL 4 augmented": 2,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL4+": 1,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Guide for SUSE LINUX Enterprise Server 11 SP2, (confidential document) 9 specifically \u2022 AIS 20, Version 2, Funktionalit\u00e4tsklassen und Evaluationsmethodologie f\u00fcr": 1,
"List CC Related Items, 2012-09-04, [CMLIST] SUSE Configuration Management Lists, 2012-08-21, (confidential document) [10] Guidance documentation for the TOE, Version 1.0, 2012-09-28, Common Criteria EAL4+ Evaluated": 1,
"Report, Version 4, 2013-02-15, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Configuration list for the TOE: [CM.OBS] Configuration List OBS, 2012-08-29, [CM.SAR": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 9,
"SSHv2": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 31": 1,
"AIS 32": 1
},
"FIPS": {
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"RFC": {
"RFC 4253": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
},
"Serpent": {
"Serpent": 1
},
"Twofish": {
"Twofish": 1
}
},
"DES": {
"3DES": {
"Triple-DES": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/CreationDate": "D:20130306111651+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, OSPP, SUSE Linux Enterprise Server 11 Service Pack 2\"",
"/ModDate": "D:20130306154502+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0787-2013",
"pdf_file_size_bytes": 1000567,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0787b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 17
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0787": 1
}
},
"cc_claims": {
"A": {
"A.AUTHUSER": 3,
"A.CONNECT": 5,
"A.DETECT": 3,
"A.MANAGE": 5,
"A.PEER": 6,
"A.PHYSICAL": 4,
"A.TRAINEDUSER": 3
},
"O": {
"O.AUDITING": 15,
"O.COMP": 31,
"O.CP": 17,
"O.CRYPTO": 16,
"O.DISCRETIONARY": 11,
"O.MANAGE": 26,
"O.NETWORK": 13,
"O.SUBJECT": 11,
"O.TRUSTED_CHANNEL": 5
},
"OE": {
"OE.ADMIN": 5,
"OE.INFO_PROTECT": 7,
"OE.INSTALL": 4,
"OE.MAINTENANCE": 3,
"OE.PHYSICAL": 3,
"OE.RECOVER": 4,
"OE.REMOTE": 4,
"OE.TRUSTED": 5
},
"T": {
"T.ACCESS": 24,
"T.COMM": 4,
"T.IA": 6,
"T.INFOFLOW": 4,
"T.RESTRICT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 5,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 17,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 3,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SEL.1": 8,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 11,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 8,
"FAU_STG.3.1": 1,
"FAU_STG.4": 7,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 33,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 20,
"FCS_COP.1.1": 2,
"FCS_RNG": 2,
"FCS_RNG.1": 30,
"FCS_RNG.1.1": 4,
"FCS_RNG.1.2": 5
},
"FDP": {
"FDP_ACC.1": 36,
"FDP_ACC.1.1": 2,
"FDP_ACC.2": 19,
"FDP_ACC.2.1": 2,
"FDP_ACC.2.2": 2,
"FDP_ACF.1": 39,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_CDP": 5,
"FDP_CDP.1": 14,
"FDP_CDP.1.1": 2,
"FDP_ETC.2": 8,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 14,
"FDP_IFC.2": 20,
"FDP_IFC.2.1": 2,
"FDP_IFC.2.2": 2,
"FDP_IFF.1": 29,
"FDP_IFF.1.1": 3,
"FDP_IFF.1.2": 3,
"FDP_IFF.1.3": 3,
"FDP_IFF.1.4": 3,
"FDP_IFF.1.5": 3,
"FDP_ITC.1": 5,
"FDP_ITC.2": 21,
"FDP_ITC.2.1": 2,
"FDP_ITC.2.2": 2,
"FDP_ITC.2.3": 2,
"FDP_ITC.2.4": 2,
"FDP_ITC.2.5": 2,
"FDP_RIP.2": 13,
"FDP_RIP.2.1": 1,
"FDP_RIP.3": 13,
"FDP_RIP.3.1": 1,
"FDP_TDC.1": 1,
"FDP_UCT": 1,
"FDP_UID.2": 1
},
"FIA": {
"FIA_AFL.1": 9,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 19,
"FIA_ATD.1.1": 2,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 10,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1,
"FIA_USB.2": 8,
"FIA_USB.2.1": 1,
"FIA_USB.2.2": 1,
"FIA_USB.2.3": 1,
"FIA_USB.2.4": 1
},
"FMT": {
"FMT_MSA.1": 46,
"FMT_MSA.1.1": 5,
"FMT_MSA.3": 47,
"FMT_MSA.3.1": 6,
"FMT_MSA.3.2": 6,
"FMT_MSA.4": 6,
"FMT_MSA.4.1": 1,
"FMT_MTD.1": 88,
"FMT_MTD.1.1": 13,
"FMT_REV.1": 12,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SMF.1": 24,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 32,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 21,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2
},
"FTA": {
"FTA_SSL.1": 7,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.2": 7,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 1
},
"FTP": {
"FTP_ITC.1": 11,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store": 1,
"PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation": 1,
"as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also": 1,
"out of scope": 3
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 6
},
"libgcrypt": {
"libgcrypt": 2
}
},
"crypto_protocol": {
"SSH": {
"SSH": 45,
"SSHv2": 5
},
"TLS": {
"SSL": {
"SSL": 11
},
"TLS": {
"TLS": 3
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 202
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 18
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1
},
"FIPS": {
"FIPS 140-2": 5,
"FIPS 186-3": 1,
"FIPS PUB 186-3": 4
},
"RFC": {
"RFC 2460": 1,
"RFC 3484": 1,
"RFC 3542": 1,
"RFC 4213": 1,
"RFC 4252": 9,
"RFC 4253": 10,
"RFC 768": 1,
"RFC 791": 2,
"RFC 792": 1,
"RFC 793": 1,
"RFC4253": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5,
"AES-128": 1,
"AES128": 1,
"AES256": 1
},
"Serpent": {
"Serpent": 1
},
"Twofish": {
"Twofish": 2
}
},
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Stephan Mueller (generated by CCTool version 2.7.2)",
"/CreationDate": "D:20130118132358Z",
"/Creator": "Unknown",
"/Keywords": "\"Security Target, Common Criteria, Linux Distribution\"",
"/ModDate": "D:20130306101641+01\u002700\u0027",
"/Producer": "XEP 4.18 build 20100322",
"/Subject": "Common Criteria Certification",
"/Title": "SUSE Linux Enterprise Server 11 SP2 including KVM virtualization (version 1.1 as of 2013-01-17 )",
"/Trapped": "/False",
"/application": "CCTool version x.y",
"pdf_file_size_bytes": 1101932,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 100
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0787a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0787b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4efa0cc09dd5cc3446e71e9b350e8c1cdb59ce801143dd6d2e3f009cfa353615",
"txt_hash": "f701e5cb5d89ea4b90b76d42d12f9cc7b86dd3eeaa160e1dcf2268e1ec6a225d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "dec1deade6547a8ea3e19ae7c95094fb5abece9bd3f7e5e74db45684fe4e9841",
"txt_hash": "56d4b6107dcc31164da886f6fb521ab0ee88d2d31ce542fdee5df29600ddbdd9"
}
},
"status": "archived"
}