Microsoft Windows 2003 and Microsoft Windows XP
CSV information ?
Status | archived |
---|---|
Valid from | 06.11.2005 |
Valid until | 07.09.2012 |
Scheme | πΊπΈ US |
Manufacturer | Microsoft Corporation |
Category | Operating Systems |
Security level | AVA_VLA.4, EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSL, TLSVendor
Infineon, Microsoft, Microsoft CorporationSecurity level
EAL 4, EAL 1, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_IGS.1, ADO_DEL, ALC_FLR.3, AVA_VLA.1.1, ASE_OBJ.1, ASE_REQ, ASE_REQ.1Security Functional Requirements (SFR)
FAU_STG.1, FAU_GEN.1, FDP_ACF.1, FIA_USB.1, FMT_SMF.1, FMT_REV.1Certificates
CCEVS-VR-05-0131Standards
X.509File metadata
Title | Validation Report |
---|---|
Author | Santosh Chokhani |
Creation date | D:20051110105336-05'00' |
Modification date | D:20051110105622-05'00' |
Pages | 18 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-05-0131 |
---|---|
Certified item | Microsoft Windows 2003 Server and XP Workstation |
Certification lab | US NIAP |
References
Incoming- BSI-DSZ-CC-0366-2008 - archived - Database Engine of Microsoft SQL Server 2005 SP2, Enterprise Edition (English) Version 9.00.3068.00
- BSI-DSZ-CC-0416-2007 - archived - Database Engine of Microsoft SQL Server 2005 Enterprise Edition (English) SP1, Version/Build 9.00.2047.00
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RC4, DES, 3DES, HMACAsymmetric Algorithms
Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, MD5Schemes
MAC, Key Exchange, Key exchangeProtocols
SSL, TLS, IKE, VPNRandomness
RNGBlock cipher modes
ECB, CBCVendor
Infineon, Broadcom, Microsoft, Microsoft CorporationSecurity level
EAL 4, EAL3, EAL4, EAL 3, EAL 4 augmented, EAL4 augmentedClaims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.AUDIT_PROTECTION, O.PROTECT, O.TRUSTED_PATH, O.LEGAL_WARNING, O.LIMIT_AUTHORIZATION, O.IPSEC, O.ENCRYPTED_DATA, O.ASSURANCE, O.MEDIATE, O.INSTALL, O.PHYSICAL, O.CREDEN, O.AUDIT_, T.AUDIT_CORRUPT, T.CONFIG_CORRUPT, T.OBJECTS_NOT_CLEAN, T.SPOOF, T.SYSACC, T.UNAUTH_ACCESS, T.UNAUTH_MODIFICATION, T.UNDETECTED_ACTIONS, T.USER_CORRUPT, T.ADMIN_ERROR, T.AUDIT_COMPROMISE, T.EAVESDROP, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.REPLAY, T.UNATTENDED_SESSION, T.UNIDENTIFIED_ACTIONS, T.ADDRESS_MASQUERADE, T.TCPIP_ATTACK, T.USER_CURRUPT, A.CONNECT, A.PEER, A.COOP, A.MANAGE, A.NO_EVIL_ADM, A.LOCATE, A.PROTECTSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_MSU.2, AVA_VLA.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FAU_GEN, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_CKM_EXP.2.2, FCS_COP, FCS_CKM_EXP.1, FDP_ACF.1, FDP_RIP.2, FDP_ACC.2, FDP_IFC.1, FDP_IFF.1, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_ITT.1.1, FDP_RIP.2.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.2, FDP_ITC.1, FDP_ITC, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.7, FIA_USB, FIA_AFL.1, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_UID, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3, FMT_REV.1, FMT_SMR.1, FMT_MOF.1, FMT_MTD.2, FMT_SAE.1, FMT_SMR.3, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.1.2, FMT_MTD.2.1, FMT_MTD.2.2, FMT_REV.1.1, FMT_REV.1.2, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR.3.1, FMT_REV, FMT_MSA.2, FMT_MSA, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RPL.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_ITT.1, FPT_ITT.3, FPT_TRC.1, FPT_RPL, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_SSL.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTA_TRP.1, FTA_MSC.1, FTA_MCS.1, FTA_LSA.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1Standards
FIPS 180-2, FIPS 140-1, FIPS 186-2, FIPS 140, FIPS 46-3, FIPS 140-2, FIPS 197, FIPS 140-214, PKCS#1, PKCS#5, RFC 3739, RFC 2617, x.509, X.509File metadata
Title | Windows 2003/XP Security Target |
---|---|
Author | SAIC |
Creation date | D:20051110083536-05'00' |
Modification date | D:20051110084057-05'00' |
Pages | 165 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
References
Incoming- BSI-DSZ-CC-0453-2009 - archived - Microsoft Internet Security and Acceleration Server 2006 Standard / Enterprise Edition, Build 5.0.5720.100
- BSI-DSZ-CC-0416-2007 - archived - Database Engine of Microsoft SQL Server 2005 Enterprise Edition (English) SP1, Version/Build 9.00.2047.00
- BSI-DSZ-CC-0387-2007 - archived - Microsoft Internet Security and Acceleration Server 2004 β Enterprise Edition β Service Pack 2 β Version 4.0.3443.594
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_OBJ.1, ASE_REQ.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.4CPE matches
- cpe:2.3:o:microsoft:windows_xp:-:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:*:x86:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:gold:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2002:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2003:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:gold:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*
- cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2000-1218 | CRITICAL | 9.8 | 5.9 | 14.04.2000 04:00 | ||
CVE-2001-0721 | MEDIUM | 5.0 | 2.9 | 06.12.2001 05:00 | ||
CVE-2001-0860 | HIGH | 7.5 | 6.4 | 06.12.2001 05:00 | ||
CVE-2001-0876 | HIGH | 7.5 | 6.4 | 20.12.2001 05:00 | ||
CVE-2001-0877 | MEDIUM | 5.0 | 2.9 | 20.12.2001 05:00 | ||
CVE-2001-0879 | MEDIUM | 5.0 | 2.9 | 20.12.2001 05:00 | ||
CVE-2001-0909 | HIGH | 7.5 | 6.4 | 21.11.2001 05:00 | ||
CVE-2001-1200 | HIGH | 7.2 | 10.0 | 17.12.2001 05:00 | ||
CVE-2002-0053 | HIGH | 7.5 | 6.4 | 08.03.2002 05:00 | ||
CVE-2002-0055 | MEDIUM | 5.0 | 2.9 | 08.03.2002 05:00 | ||
CVE-2002-0283 | MEDIUM | 5.0 | 2.9 | 31.05.2002 04:00 | ||
CVE-2002-0391 | CRITICAL | 9.8 | 5.9 | 12.08.2002 04:00 | ||
CVE-2002-0699 | MEDIUM | 5.0 | 2.9 | 04.10.2002 04:00 | ||
CVE-2002-0724 | HIGH | 7.5 | 6.4 | 24.09.2002 04:00 | ||
CVE-2002-0862 | MEDIUM | 6.8 | 6.4 | 04.10.2002 04:00 | ||
CVE-2002-0974 | MEDIUM | 5.0 | 2.9 | 24.09.2002 04:00 | ||
CVE-2002-1327 | HIGH | 7.5 | 6.4 | 26.12.2002 05:00 | ||
CVE-2002-2117 | MEDIUM | 5.0 | 2.9 | 31.12.2002 05:00 | ||
CVE-2002-2132 | LOW | 2.1 | 2.9 | 31.12.2002 05:00 | ||
CVE-2002-2324 | HIGH | 7.2 | 10.0 | 31.12.2002 05:00 | ||
CVE-2003-0306 | HIGH | 7.2 | 10.0 | 09.06.2003 04:00 | ||
CVE-2003-0469 | HIGH | 7.5 | 6.4 | 07.08.2003 04:00 | ||
CVE-2003-0807 | MEDIUM | 5.0 | 2.9 | 01.06.2004 04:00 | ||
CVE-2003-0813 | MEDIUM | 5.1 | 6.4 | 17.11.2003 05:00 | ||
CVE-2003-0897 | MEDIUM | 4.6 | 6.4 | 17.11.2003 05:00 | ||
CVE-2003-0907 | MEDIUM | 5.1 | 6.4 | 01.06.2004 04:00 | ||
CVE-2003-0909 | HIGH | 7.2 | 10.0 | 01.06.2004 04:00 | ||
CVE-2003-1048 | HIGH | 7.8 | 5.9 | 27.07.2004 04:00 | ||
CVE-2004-0116 | MEDIUM | 5.0 | 2.9 | 01.06.2004 04:00 | ||
CVE-2004-0117 | HIGH | 7.5 | 6.4 | 01.06.2004 04:00 | ||
CVE-2004-0119 | HIGH | 7.5 | 3.6 | 01.06.2004 04:00 | ||
CVE-2004-0120 | MEDIUM | 5.0 | 2.9 | 01.06.2004 04:00 | ||
CVE-2004-0123 | HIGH | 7.5 | 6.4 | 01.06.2004 04:00 | ||
CVE-2004-0124 | LOW | 2.6 | 2.9 | 01.06.2004 04:00 | ||
CVE-2004-0199 | MEDIUM | 5.1 | 6.4 | 14.06.2004 04:00 | ||
CVE-2004-0200 | HIGH | 9.3 | 10.0 | 28.09.2004 04:00 | ||
CVE-2004-0206 | HIGH | 7.5 | 6.4 | 03.11.2004 05:00 | ||
CVE-2004-0207 | LOW | 2.1 | 2.9 | 03.11.2004 05:00 | ||
CVE-2004-0208 | HIGH | 7.2 | 10.0 | 03.11.2004 05:00 | ||
CVE-2004-0209 | HIGH | 10.0 | 10.0 | 03.11.2004 05:00 | ||
CVE-2004-0575 | HIGH | 10.0 | 10.0 | 03.11.2004 05:00 | ||
CVE-2004-0840 | HIGH | 10.0 | 10.0 | 03.11.2004 05:00 | ||
CVE-2004-0897 | HIGH | 10.0 | 10.0 | 11.01.2005 05:00 | ||
CVE-2004-1049 | MEDIUM | 5.1 | 6.4 | 31.12.2004 05:00 | ||
CVE-2004-2339 | HIGH | 7.2 | 10.0 | 31.12.2004 05:00 | ||
CVE-2004-2527 | MEDIUM | 5.4 | 6.9 | 31.12.2004 05:00 | ||
CVE-2005-0058 | HIGH | 7.5 | 6.4 | 10.08.2005 04:00 | ||
CVE-2005-0904 | LOW | 2.1 | 2.9 | 02.05.2005 04:00 | ||
CVE-2005-1207 | HIGH | 7.2 | 10.0 | 14.06.2005 04:00 | ||
CVE-2005-1208 | HIGH | 10.0 | 10.0 | 14.06.2005 04:00 | ||
CVE-2005-1212 | HIGH | 7.5 | 6.4 | 14.06.2005 04:00 | ||
CVE-2005-1214 | MEDIUM | 5.1 | 6.4 | 14.06.2005 04:00 | ||
CVE-2005-1935 | HIGH | 7.5 | 6.4 | 13.06.2005 04:00 | ||
CVE-2005-1987 | HIGH | 7.5 | 6.4 | 13.10.2005 10:02 | ||
CVE-2005-3177 | MEDIUM | 4.6 | 6.4 | 06.10.2005 10:02 | ||
CVE-2005-4269 | HIGH | 7.8 | 6.9 | 15.12.2005 20:11 | ||
CVE-2006-0005 | HIGH | 9.3 | 10.0 | 14.02.2006 19:06 | ||
CVE-2006-2373 | HIGH | 10.0 | 10.0 | 13.06.2006 19:06 | ||
CVE-2006-2374 | MEDIUM | 5.5 | 3.6 | 13.06.2006 19:06 | ||
CVE-2006-3209 | HIGH | 7.2 | 10.0 | 24.06.2006 01:06 | ||
CVE-2006-3351 | MEDIUM | 5.4 | 6.9 | 06.07.2006 01:05 | ||
CVE-2006-4071 | LOW | 2.6 | 2.9 | 10.08.2006 01:04 | ||
CVE-2006-4692 | MEDIUM | 5.1 | 6.4 | 10.10.2006 22:07 | ||
CVE-2006-4696 | HIGH | 9.0 | 10.0 | 10.10.2006 22:07 | ||
CVE-2006-5586 | HIGH | 7.2 | 10.0 | 04.04.2007 16:19 | ||
CVE-2006-5758 | HIGH | 7.2 | 10.0 | 06.11.2006 20:07 | ||
CVE-2006-6723 | HIGH | 7.8 | 6.9 | 26.12.2006 20:28 | ||
CVE-2006-6797 | MEDIUM | 6.6 | 9.2 | 28.12.2006 15:28 | ||
CVE-2006-7210 | MEDIUM | 5.0 | 2.9 | 27.06.2007 17:30 | ||
CVE-2007-0038 | HIGH | 9.3 | 10.0 | 30.03.2007 20:19 | ||
CVE-2007-0066 | HIGH | 7.1 | 6.9 | 08.01.2008 20:46 | ||
CVE-2007-0069 | HIGH | 9.3 | 10.0 | 08.01.2008 20:46 | ||
CVE-2007-0214 | HIGH | 9.3 | 10.0 | 13.02.2007 20:28 | ||
CVE-2007-0843 | MEDIUM | 4.6 | 6.4 | 23.02.2007 02:28 | ||
CVE-2007-1204 | MEDIUM | 6.8 | 10.0 | 10.04.2007 21:19 | ||
CVE-2007-1205 | HIGH | 9.3 | 10.0 | 10.04.2007 21:19 | ||
CVE-2007-1206 | HIGH | 7.2 | 10.0 | 10.04.2007 21:19 | ||
CVE-2007-1211 | HIGH | 7.1 | 6.9 | 04.04.2007 16:19 | ||
CVE-2007-1212 | MEDIUM | 6.6 | 10.0 | 04.04.2007 16:19 | ||
CVE-2007-1215 | HIGH | 7.2 | 10.0 | 04.04.2007 16:19 | ||
CVE-2007-1492 | HIGH | 7.1 | 6.9 | 16.03.2007 22:19 | ||
CVE-2007-1531 | MEDIUM | 5.0 | 2.9 | 20.03.2007 20:19 | ||
CVE-2007-1537 | LOW | 3.6 | 4.9 | 20.03.2007 22:19 | ||
CVE-2007-1765 | HIGH | 9.3 | 10.0 | 30.03.2007 00:19 | ||
CVE-2007-1912 | MEDIUM | 6.8 | 6.4 | 10.04.2007 23:19 | ||
CVE-2007-1946 | HIGH | 10.0 | 10.0 | 11.04.2007 01:19 | ||
CVE-2007-2218 | HIGH | 9.3 | 10.0 | 12.06.2007 19:30 | ||
CVE-2007-2219 | HIGH | 9.3 | 10.0 | 12.06.2007 20:30 | ||
CVE-2007-2224 | HIGH | 9.3 | 10.0 | 14.08.2007 21:17 | ||
CVE-2007-2228 | HIGH | 7.8 | 6.9 | 09.10.2007 22:17 | ||
CVE-2007-2237 | MEDIUM | 5.5 | 3.6 | 06.06.2007 20:30 | ||
CVE-2007-2374 | HIGH | 9.3 | 10.0 | 30.04.2007 23:19 | ||
CVE-2007-3034 | HIGH | 9.3 | 10.0 | 14.08.2007 21:17 | ||
CVE-2007-3463 | MEDIUM | 4.6 | 6.9 | 27.06.2007 18:30 | ||
CVE-2007-3724 | LOW | 2.1 | 2.9 | 12.07.2007 16:30 | ||
CVE-2007-5133 | HIGH | 7.1 | 6.9 | 27.09.2007 19:17 | ||
CVE-2007-5145 | MEDIUM | 4.3 | 2.9 | 01.10.2007 05:17 | ||
CVE-2007-5348 | HIGH | 9.3 | 10.0 | 11.09.2008 01:01 | ||
CVE-2007-5352 | HIGH | 7.2 | 10.0 | 08.01.2008 20:46 | ||
CVE-2007-6026 | HIGH | 9.3 | 10.0 | 20.11.2007 00:46 | ||
CVE-2007-6753 | MEDIUM | 6.2 | 10.0 | 28.03.2012 19:55 | ||
CVE-2008-0015 | HIGH | 9.3 | 10.0 | 07.07.2009 23:30 | ||
CVE-2008-0020 | HIGH | 9.3 | 10.0 | 07.07.2009 23:30 | ||
CVE-2008-0083 | HIGH | 9.3 | 10.0 | 08.04.2008 23:05 | ||
CVE-2008-0087 | HIGH | 7.5 | 3.6 | 08.04.2008 23:05 | ||
CVE-2008-0088 | MEDIUM | 6.8 | 6.9 | 12.02.2008 21:00 | ||
CVE-2008-0322 | HIGH | 7.8 | 5.9 | 13.05.2008 20:20 | ||
CVE-2008-1083 | HIGH | 9.3 | 10.0 | 08.04.2008 23:05 | ||
CVE-2008-1084 | HIGH | 7.2 | 10.0 | 08.04.2008 23:05 | ||
CVE-2008-1086 | HIGH | 9.3 | 10.0 | 08.04.2008 23:05 | ||
CVE-2008-1087 | HIGH | 9.3 | 10.0 | 08.04.2008 23:05 | ||
CVE-2008-1436 | HIGH | 9.0 | 10.0 | 21.04.2008 17:05 | ||
CVE-2008-1440 | HIGH | 7.1 | 6.9 | 12.06.2008 02:32 | ||
CVE-2008-1441 | MEDIUM | 5.4 | 6.9 | 12.06.2008 02:32 | ||
CVE-2008-1445 | HIGH | 7.1 | 6.9 | 12.06.2008 02:32 | ||
CVE-2008-1453 | HIGH | 8.3 | 10.0 | 12.06.2008 02:32 | ||
CVE-2008-1454 | HIGH | 9.4 | 9.2 | 08.07.2008 23:41 | ||
CVE-2008-1456 | HIGH | 9.0 | 10.0 | 13.08.2008 12:42 | ||
CVE-2008-1457 | HIGH | 9.0 | 10.0 | 13.08.2008 12:42 | ||
CVE-2008-2245 | HIGH | 9.3 | 10.0 | 13.08.2008 00:41 | ||
CVE-2008-2249 | HIGH | 9.3 | 10.0 | 10.12.2008 14:00 | ||
CVE-2008-2250 | HIGH | 7.2 | 10.0 | 15.10.2008 00:12 | ||
CVE-2008-2251 | HIGH | 7.2 | 10.0 | 15.10.2008 00:12 | ||
CVE-2008-2252 | HIGH | 7.2 | 10.0 | 15.10.2008 00:12 | ||
CVE-2008-3012 | HIGH | 9.3 | 10.0 | 11.09.2008 01:11 | ||
CVE-2008-3013 | HIGH | 9.3 | 10.0 | 11.09.2008 01:11 | ||
CVE-2008-3014 | HIGH | 9.3 | 10.0 | 11.09.2008 01:11 | ||
CVE-2008-3464 | HIGH | 7.2 | 10.0 | 15.10.2008 00:12 | ||
CVE-2008-3465 | HIGH | 9.3 | 10.0 | 10.12.2008 14:00 | ||
CVE-2008-3648 | HIGH | 9.3 | 10.0 | 12.08.2008 23:41 | ||
CVE-2008-4036 | HIGH | 7.2 | 10.0 | 15.10.2008 00:12 | ||
CVE-2008-4038 | HIGH | 10.0 | 10.0 | 15.10.2008 00:12 | ||
CVE-2008-4114 | HIGH | 7.1 | 6.9 | 16.09.2008 23:00 | ||
CVE-2008-4250 | HIGH | 10.0 | 10.0 | 23.10.2008 22:00 | ||
CVE-2008-4327 | MEDIUM | 4.3 | 2.9 | 30.09.2008 16:13 | ||
CVE-2008-4609 | HIGH | 7.1 | 6.9 | 20.10.2008 17:59 | ||
CVE-2008-4834 | HIGH | 10.0 | 10.0 | 14.01.2009 22:30 | ||
CVE-2008-4835 | HIGH | 10.0 | 10.0 | 14.01.2009 22:30 | ||
CVE-2009-0078 | HIGH | 7.2 | 10.0 | 15.04.2009 08:00 | ||
CVE-2009-0079 | MEDIUM | 6.9 | 10.0 | 15.04.2009 08:00 | ||
CVE-2009-0081 | HIGH | 9.3 | 10.0 | 10.03.2009 20:30 | ||
CVE-2009-0082 | HIGH | 7.2 | 10.0 | 10.03.2009 20:30 | ||
CVE-2009-0083 | HIGH | 7.2 | 10.0 | 10.03.2009 20:30 | ||
CVE-2009-0085 | HIGH | 7.1 | 6.9 | 10.03.2009 20:30 | ||
CVE-2009-0086 | HIGH | 10.0 | 10.0 | 15.04.2009 08:00 | ||
CVE-2009-0087 | HIGH | 9.3 | 10.0 | 15.04.2009 08:00 | ||
CVE-2009-0089 | MEDIUM | 5.8 | 4.9 | 15.04.2009 08:00 | ||
CVE-2009-0119 | HIGH | 10.0 | 10.0 | 14.01.2009 23:30 | ||
CVE-2009-0229 | MEDIUM | 4.9 | 6.9 | 10.06.2009 18:00 | ||
CVE-2009-0230 | HIGH | 9.0 | 10.0 | 10.06.2009 18:00 | ||
CVE-2009-0231 | HIGH | 8.8 | 5.9 | 15.07.2009 15:30 | ||
CVE-2009-0232 | HIGH | 9.3 | 10.0 | 15.07.2009 15:30 | ||
CVE-2009-0235 | HIGH | 9.3 | 10.0 | 15.04.2009 08:00 | ||
CVE-2009-0243 | HIGH | 7.2 | 10.0 | 21.01.2009 20:30 | ||
CVE-2009-0320 | MEDIUM | 4.0 | 6.9 | 28.01.2009 18:30 | ||
CVE-2009-0550 | HIGH | 9.3 | 10.0 | 15.04.2009 08:00 | ||
CVE-2009-0568 | HIGH | 10.0 | 10.0 | 10.06.2009 18:00 | ||
CVE-2009-1123 | HIGH | 7.8 | 5.9 | 10.06.2009 18:30 | ||
CVE-2009-1124 | HIGH | 7.2 | 10.0 | 10.06.2009 18:30 | ||
CVE-2009-1125 | HIGH | 7.2 | 10.0 | 10.06.2009 18:30 | ||
CVE-2009-1126 | HIGH | 7.2 | 10.0 | 10.06.2009 18:30 | ||
CVE-2009-1127 | HIGH | 7.2 | 10.0 | 11.11.2009 19:30 | ||
CVE-2009-1133 | HIGH | 9.3 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-1511 | HIGH | 7.8 | 6.9 | 01.05.2009 18:30 | ||
CVE-2009-1544 | HIGH | 9.0 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-1545 | HIGH | 9.3 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-1546 | HIGH | 8.5 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-1808 | MEDIUM | 4.9 | 6.9 | 28.05.2009 20:30 | ||
CVE-2009-1920 | HIGH | 9.3 | 10.0 | 08.09.2009 22:30 | ||
CVE-2009-1922 | MEDIUM | 6.9 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-1926 | HIGH | 7.8 | 6.9 | 08.09.2009 22:30 | ||
CVE-2009-1928 | HIGH | 7.8 | 6.9 | 11.11.2009 19:30 | ||
CVE-2009-1929 | HIGH | 9.3 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-1930 | HIGH | 10.0 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-2493 | HIGH | 9.3 | 10.0 | 29.07.2009 17:30 | ||
CVE-2009-2494 | HIGH | 10.0 | 10.0 | 12.08.2009 17:30 | ||
CVE-2009-2500 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2501 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2502 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2503 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2504 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2507 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2510 | MEDIUM | 6.8 | 6.4 | 14.10.2009 10:30 | ||
CVE-2009-2511 | HIGH | 7.5 | 6.4 | 14.10.2009 10:30 | ||
CVE-2009-2513 | HIGH | 7.2 | 10.0 | 11.11.2009 19:30 | ||
CVE-2009-2514 | HIGH | 9.3 | 10.0 | 11.11.2009 19:30 | ||
CVE-2009-2515 | HIGH | 7.2 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2516 | MEDIUM | 6.9 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2519 | HIGH | 9.3 | 10.0 | 08.09.2009 22:30 | ||
CVE-2009-2524 | HIGH | 7.8 | 6.9 | 14.10.2009 10:30 | ||
CVE-2009-2528 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-2653 | MEDIUM | 4.6 | 6.4 | 03.08.2009 14:30 | ||
CVE-2009-3126 | HIGH | 9.3 | 10.0 | 14.10.2009 10:30 | ||
CVE-2009-3675 | MEDIUM | 6.8 | 6.9 | 09.12.2009 18:30 | ||
CVE-2009-3677 | HIGH | 10.0 | 10.0 | 09.12.2009 18:30 | ||
CVE-2009-4210 | HIGH | 9.3 | 10.0 | 13.12.2009 01:30 | ||
CVE-2009-4311 | HIGH | 9.3 | 10.0 | 13.12.2009 01:30 | ||
CVE-2009-4312 | HIGH | 9.3 | 10.0 | 13.12.2009 01:30 | ||
CVE-2009-4313 | HIGH | 9.3 | 10.0 | 13.12.2009 01:30 | ||
CVE-2010-0016 | HIGH | 9.3 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0018 | HIGH | 9.3 | 10.0 | 13.01.2010 19:30 | ||
CVE-2010-0020 | HIGH | 9.0 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0021 | HIGH | 7.1 | 6.9 | 10.02.2010 18:30 | ||
CVE-2010-0022 | HIGH | 7.8 | 6.9 | 10.02.2010 18:30 | ||
CVE-2010-0023 | MEDIUM | 6.9 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0024 | MEDIUM | 5.0 | 2.9 | 14.04.2010 16:00 | ||
CVE-2010-0025 | MEDIUM | 5.0 | 2.9 | 14.04.2010 16:00 | ||
CVE-2010-0027 | HIGH | 9.3 | 10.0 | 22.01.2010 22:00 | ||
CVE-2010-0028 | HIGH | 9.3 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0231 | HIGH | 10.0 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0232 | HIGH | 7.8 | 5.9 | 21.01.2010 19:30 | ||
CVE-2010-0233 | HIGH | 7.2 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0234 | MEDIUM | 4.7 | 6.9 | 14.04.2010 16:00 | ||
CVE-2010-0235 | MEDIUM | 4.7 | 6.9 | 14.04.2010 16:00 | ||
CVE-2010-0236 | HIGH | 7.2 | 10.0 | 14.04.2010 16:00 | ||
CVE-2010-0237 | MEDIUM | 6.9 | 10.0 | 14.04.2010 16:00 | ||
CVE-2010-0238 | MEDIUM | 4.9 | 6.9 | 14.04.2010 16:00 | ||
CVE-2010-0250 | HIGH | 9.3 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0252 | HIGH | 9.3 | 10.0 | 10.02.2010 18:30 | ||
CVE-2010-0269 | HIGH | 10.0 | 10.0 | 14.04.2010 16:00 | ||
CVE-2010-0480 | HIGH | 9.3 | 10.0 | 14.04.2010 16:00 | ||
CVE-2010-0484 | MEDIUM | 6.8 | 10.0 | 08.06.2010 22:30 | ||
CVE-2010-0485 | MEDIUM | 6.8 | 10.0 | 08.06.2010 22:30 | ||
CVE-2010-0486 | HIGH | 9.3 | 10.0 | 14.04.2010 16:00 | ||
CVE-2010-0487 | HIGH | 9.3 | 10.0 | 14.04.2010 16:00 | ||
CVE-2010-0719 | MEDIUM | 4.7 | 6.9 | 26.02.2010 19:30 | ||
CVE-2010-0811 | HIGH | 9.3 | 10.0 | 08.06.2010 22:30 | ||
CVE-2010-0812 | MEDIUM | 6.4 | 4.9 | 14.04.2010 16:00 | ||
CVE-2010-0818 | HIGH | 9.3 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-0819 | HIGH | 7.2 | 10.0 | 08.06.2010 20:30 | ||
CVE-2010-0820 | HIGH | 9.0 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-1098 | HIGH | 7.1 | 6.9 | 24.03.2010 22:44 | ||
CVE-2010-1255 | MEDIUM | 6.8 | 10.0 | 08.06.2010 22:30 | ||
CVE-2010-1689 | MEDIUM | 6.4 | 4.9 | 07.05.2010 18:30 | ||
CVE-2010-1690 | MEDIUM | 6.4 | 4.9 | 07.05.2010 18:30 | ||
CVE-2010-1734 | MEDIUM | 4.9 | 6.9 | 06.05.2010 12:47 | ||
CVE-2010-1735 | MEDIUM | 4.9 | 6.9 | 06.05.2010 12:47 | ||
CVE-2010-1882 | HIGH | 9.3 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-1883 | HIGH | 9.3 | 10.0 | 13.10.2010 19:00 | ||
CVE-2010-1885 | HIGH | 9.3 | 10.0 | 15.06.2010 14:04 | ||
CVE-2010-1886 | MEDIUM | 6.8 | 10.0 | 16.08.2010 18:39 | ||
CVE-2010-1887 | MEDIUM | 4.4 | 6.9 | 11.08.2010 18:47 | ||
CVE-2010-1888 | MEDIUM | 6.8 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-1891 | MEDIUM | 6.9 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-1894 | HIGH | 7.2 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-1895 | HIGH | 7.2 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-1896 | HIGH | 7.2 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-1897 | HIGH | 7.2 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-2265 | MEDIUM | 4.3 | 2.9 | 15.06.2010 14:04 | ||
CVE-2010-2550 | HIGH | 10.0 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-2553 | HIGH | 9.3 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-2563 | HIGH | 9.3 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-2566 | HIGH | 9.3 | 10.0 | 11.08.2010 18:47 | ||
CVE-2010-2567 | HIGH | 9.3 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-2568 | HIGH | 7.8 | 5.9 | 22.07.2010 05:43 | ||
CVE-2010-2729 | HIGH | 9.3 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-2731 | MEDIUM | 6.8 | 6.4 | 15.09.2010 19:00 | ||
CVE-2010-2738 | HIGH | 9.3 | 10.0 | 15.09.2010 19:00 | ||
CVE-2010-2739 | HIGH | 7.2 | 10.0 | 07.09.2010 18:00 | ||
CVE-2010-2740 | HIGH | 7.2 | 10.0 | 13.10.2010 19:00 | ||
CVE-2010-2741 | HIGH | 7.2 | 10.0 | 13.10.2010 19:00 | ||
CVE-2010-2743 | HIGH | 7.2 | 10.0 | 20.01.2011 21:00 | ||
CVE-2010-2744 | HIGH | 7.2 | 10.0 | 13.10.2010 19:00 | ||
CVE-2010-2746 | HIGH | 7.6 | 10.0 | 13.10.2010 19:00 | ||
CVE-2010-3140 | HIGH | 9.3 | 10.0 | 27.08.2010 19:00 | ||
CVE-2010-3144 | HIGH | 9.3 | 10.0 | 27.08.2010 19:00 | ||
CVE-2010-3222 | HIGH | 7.2 | 10.0 | 13.10.2010 19:00 | ||
CVE-2010-3227 | HIGH | 9.3 | 10.0 | 26.10.2010 22:00 | ||
CVE-2010-3939 | HIGH | 7.2 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3940 | HIGH | 7.2 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3941 | HIGH | 7.2 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3942 | HIGH | 7.2 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3943 | HIGH | 7.2 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3956 | HIGH | 9.3 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3957 | MEDIUM | 6.9 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3959 | MEDIUM | 6.9 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3963 | HIGH | 7.2 | 10.0 | 16.12.2010 19:33 | ||
CVE-2010-3970 | HIGH | 9.3 | 10.0 | 22.12.2010 21:00 | ||
CVE-2010-3974 | HIGH | 7.6 | 10.0 | 13.04.2011 18:55 | ||
CVE-2010-4398 | HIGH | 7.8 | 5.9 | 06.12.2010 13:44 | ||
CVE-2010-4562 | MEDIUM | 4.3 | 2.9 | 02.02.2012 17:55 | ||
CVE-2010-4669 | HIGH | 7.8 | 6.9 | 07.01.2011 12:00 | ||
CVE-2010-4701 | HIGH | 7.6 | 10.0 | 20.01.2011 19:00 | ||
CVE-2011-0028 | HIGH | 9.3 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0030 | MEDIUM | 4.7 | 6.9 | 09.02.2011 01:00 | ||
CVE-2011-0033 | HIGH | 9.3 | 10.0 | 10.02.2011 16:00 | ||
CVE-2011-0034 | HIGH | 9.3 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0039 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0041 | HIGH | 9.3 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0042 | HIGH | 9.3 | 10.0 | 09.03.2011 23:00 | ||
CVE-2011-0043 | HIGH | 7.2 | 10.0 | 10.02.2011 16:00 | ||
CVE-2011-0045 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0086 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0087 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0088 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0089 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0090 | HIGH | 7.2 | 10.0 | 09.02.2011 01:00 | ||
CVE-2011-0096 | MEDIUM | 4.3 | 2.9 | 31.01.2011 20:00 | ||
CVE-2011-0657 | HIGH | 7.5 | 6.4 | 13.04.2011 18:55 | ||
CVE-2011-0658 | HIGH | 9.3 | 10.0 | 16.06.2011 20:55 | ||
CVE-2011-0660 | HIGH | 9.3 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0661 | HIGH | 10.0 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0662 | HIGH | 7.2 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0665 | HIGH | 7.2 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0666 | HIGH | 7.2 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0667 | HIGH | 7.2 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0670 | HIGH | 7.2 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-0671 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-0672 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-0673 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-0674 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-0675 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-0676 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-0677 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1225 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1226 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1227 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1228 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1229 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1230 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1231 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1232 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1233 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1234 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1235 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1236 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1237 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1238 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1239 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1240 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1241 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1242 | HIGH | 7.2 | 10.0 | 13.04.2011 20:26 | ||
CVE-2011-1243 | HIGH | 9.3 | 10.0 | 13.04.2011 18:55 | ||
CVE-2011-1247 | HIGH | 9.3 | 10.0 | 12.10.2011 02:52 | ||
CVE-2011-1249 | HIGH | 7.2 | 10.0 | 16.06.2011 20:55 | ||
CVE-2011-1268 | HIGH | 10.0 | 10.0 | 16.06.2011 20:55 | ||
CVE-2011-1281 | HIGH | 7.2 | 10.0 | 13.07.2011 22:55 | ||
CVE-2011-1282 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1283 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1284 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1868 | HIGH | 10.0 | 10.0 | 16.06.2011 20:55 | ||
CVE-2011-1869 | HIGH | 7.8 | 6.9 | 16.06.2011 20:55 | ||
CVE-2011-1870 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1873 | HIGH | 9.3 | 10.0 | 16.06.2011 20:55 | ||
CVE-2011-1874 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1875 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1876 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1878 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1879 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1880 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1881 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1882 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1883 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1884 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1885 | HIGH | 7.2 | 10.0 | 13.07.2011 23:55 | ||
CVE-2011-1886 | LOW | 2.1 | 2.9 | 13.07.2011 23:55 | ||
CVE-2011-1894 | MEDIUM | 4.3 | 2.9 | 16.06.2011 20:55 | ||
CVE-2011-1967 | HIGH | 7.2 | 10.0 | 10.08.2011 21:55 | ||
CVE-2011-1968 | HIGH | 7.1 | 6.9 | 10.08.2011 21:55 | ||
CVE-2011-1974 | HIGH | 7.2 | 10.0 | 10.08.2011 21:55 | ||
CVE-2011-1985 | HIGH | 7.2 | 10.0 | 12.10.2011 02:52 | ||
CVE-2011-1991 | HIGH | 9.3 | 10.0 | 15.09.2011 12:26 | ||
CVE-2011-2003 | HIGH | 9.3 | 10.0 | 12.10.2011 02:52 | ||
CVE-2011-2005 | HIGH | 7.8 | 5.9 | 12.10.2011 02:52 | ||
CVE-2011-2011 | HIGH | 7.2 | 10.0 | 12.10.2011 02:52 | ||
CVE-2011-2014 | HIGH | 9.0 | 10.0 | 08.11.2011 21:55 | ||
CVE-2011-2018 | HIGH | 7.2 | 10.0 | 14.12.2011 00:55 | ||
CVE-2011-2600 | HIGH | 7.1 | 6.9 | 30.06.2011 15:55 | ||
CVE-2011-3397 | HIGH | 9.3 | 10.0 | 14.12.2011 00:55 | ||
CVE-2011-3400 | HIGH | 9.3 | 10.0 | 14.12.2011 00:55 | ||
CVE-2011-3401 | HIGH | 9.3 | 10.0 | 14.12.2011 00:55 | ||
CVE-2011-3402 | HIGH | 9.3 | 10.0 | 04.11.2011 21:55 | ||
CVE-2011-3406 | HIGH | 9.0 | 10.0 | 14.12.2011 00:55 | ||
CVE-2011-3408 | HIGH | 7.2 | 10.0 | 14.12.2011 00:55 | ||
CVE-2011-5046 | HIGH | 9.3 | 10.0 | 30.12.2011 19:55 | ||
CVE-2012-0002 | HIGH | 9.3 | 10.0 | 13.03.2012 21:55 | ||
CVE-2012-0003 | HIGH | 9.3 | 10.0 | 10.01.2012 21:55 | ||
CVE-2012-0004 | HIGH | 9.3 | 10.0 | 10.01.2012 21:55 | ||
CVE-2012-0005 | MEDIUM | 6.9 | 10.0 | 10.01.2012 21:55 | ||
CVE-2012-0009 | HIGH | 9.3 | 10.0 | 10.01.2012 21:55 | ||
CVE-2012-0013 | HIGH | 9.3 | 10.0 | 10.01.2012 21:55 | ||
CVE-2012-0148 | HIGH | 7.2 | 10.0 | 14.02.2012 22:55 | ||
CVE-2012-0151 | HIGH | 7.8 | 5.9 | 10.04.2012 21:55 | ||
CVE-2012-0154 | HIGH | 7.2 | 10.0 | 14.02.2012 22:55 | ||
CVE-2012-0157 | HIGH | 7.2 | 10.0 | 13.03.2012 21:55 | ||
CVE-2012-0159 | HIGH | 9.3 | 10.0 | 09.05.2012 00:55 | ||
CVE-2012-0173 | HIGH | 9.3 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-0175 | HIGH | 9.3 | 10.0 | 10.07.2012 21:55 | ||
CVE-2012-0180 | HIGH | 7.2 | 10.0 | 09.05.2012 00:55 | ||
CVE-2012-0181 | HIGH | 7.2 | 10.0 | 09.05.2012 00:55 | ||
CVE-2012-0217 | HIGH | 7.2 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-1527 | HIGH | 9.3 | 10.0 | 14.11.2012 00:55 | ||
CVE-2012-1528 | HIGH | 9.3 | 10.0 | 14.11.2012 00:55 | ||
CVE-2012-1848 | HIGH | 7.2 | 10.0 | 09.05.2012 00:55 | ||
CVE-2012-1850 | MEDIUM | 5.0 | 2.9 | 15.08.2012 01:55 | ||
CVE-2012-1851 | HIGH | 10.0 | 10.0 | 15.08.2012 01:55 | ||
CVE-2012-1852 | HIGH | 10.0 | 10.0 | 15.08.2012 01:55 | ||
CVE-2012-1853 | HIGH | 10.0 | 10.0 | 15.08.2012 01:55 | ||
CVE-2012-1864 | HIGH | 7.2 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-1865 | HIGH | 7.2 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-1866 | HIGH | 7.2 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-1867 | HIGH | 7.2 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-1868 | MEDIUM | 6.9 | 10.0 | 12.06.2012 22:55 | ||
CVE-2012-1870 | MEDIUM | 4.3 | 2.9 | 10.07.2012 21:55 | ||
CVE-2012-1890 | HIGH | 7.2 | 10.0 | 10.07.2012 21:55 | ||
CVE-2012-1893 | HIGH | 7.2 | 10.0 | 10.07.2012 21:55 | ||
CVE-2012-2526 | HIGH | 9.3 | 10.0 | 15.08.2012 01:55 | ||
CVE-2012-2527 | HIGH | 7.2 | 10.0 | 15.08.2012 01:55 | ||
CVE-2012-2529 | HIGH | 7.2 | 10.0 | 09.10.2012 21:55 | ||
CVE-2012-2530 | HIGH | 7.2 | 10.0 | 14.11.2012 00:55 | ||
CVE-2012-2553 | HIGH | 7.2 | 10.0 | 14.11.2012 00:55 | ||
CVE-2012-2556 | HIGH | 9.3 | 10.0 | 12.12.2012 00:55 | ||
CVE-2012-4774 | HIGH | 9.3 | 10.0 | 12.12.2012 00:55 | ||
CVE-2012-4786 | HIGH | 10.0 | 10.0 | 12.12.2012 00:55 | ||
CVE-2012-5362 | HIGH | 7.5 | 3.6 | 20.02.2020 15:15 | ||
CVE-2012-5364 | HIGH | 7.5 | 3.6 | 20.02.2020 15:15 | ||
CVE-2013-0077 | HIGH | 9.3 | 10.0 | 13.02.2013 12:04 | ||
CVE-2013-0810 | HIGH | 9.3 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-1248 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1249 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1250 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1251 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1252 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1253 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1254 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1255 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1256 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1257 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1258 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1259 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1260 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1261 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1262 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1263 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1264 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1265 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1266 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1267 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1268 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1269 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1270 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1271 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1272 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1273 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1274 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1275 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1276 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1277 | MEDIUM | 4.9 | 6.9 | 13.02.2013 12:04 | ||
CVE-2013-1278 | HIGH | 7.2 | 10.0 | 13.02.2013 12:04 | ||
CVE-2013-1279 | HIGH | 7.2 | 10.0 | 13.02.2013 12:04 | ||
CVE-2013-1280 | HIGH | 7.2 | 10.0 | 13.02.2013 12:04 | ||
CVE-2013-1283 | MEDIUM | 6.9 | 10.0 | 09.04.2013 22:55 | ||
CVE-2013-1285 | HIGH | 7.2 | 10.0 | 13.03.2013 00:55 | ||
CVE-2013-1286 | HIGH | 7.2 | 10.0 | 13.03.2013 00:55 | ||
CVE-2013-1287 | HIGH | 7.2 | 10.0 | 13.03.2013 00:55 | ||
CVE-2013-1291 | HIGH | 7.1 | 6.9 | 09.04.2013 22:55 | ||
CVE-2013-1294 | MEDIUM | 4.9 | 6.9 | 09.04.2013 22:55 | ||
CVE-2013-1295 | HIGH | 7.2 | 10.0 | 09.04.2013 22:55 | ||
CVE-2013-1300 | HIGH | 7.2 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-1313 | HIGH | 9.3 | 10.0 | 13.02.2013 12:04 | ||
CVE-2013-1334 | HIGH | 7.2 | 10.0 | 15.05.2013 03:36 | ||
CVE-2013-1340 | HIGH | 7.2 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-1341 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-1342 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-1343 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-1344 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-1345 | HIGH | 7.2 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-3128 | HIGH | 9.3 | 10.0 | 09.10.2013 14:53 | ||
CVE-2013-3129 | HIGH | 9.3 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-3136 | MEDIUM | 4.4 | 6.9 | 12.06.2013 03:30 | ||
CVE-2013-3167 | HIGH | 7.2 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-3172 | MEDIUM | 4.9 | 6.9 | 10.07.2013 03:46 | ||
CVE-2013-3173 | HIGH | 7.2 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-3174 | HIGH | 9.3 | 10.0 | 10.07.2013 03:46 | ||
CVE-2013-3175 | HIGH | 10.0 | 10.0 | 14.08.2013 11:10 | ||
CVE-2013-3181 | HIGH | 9.3 | 10.0 | 14.08.2013 11:10 | ||
CVE-2013-3195 | HIGH | 10.0 | 10.0 | 09.10.2013 14:53 | ||
CVE-2013-3196 | HIGH | 7.2 | 10.0 | 14.08.2013 11:10 | ||
CVE-2013-3197 | HIGH | 7.2 | 10.0 | 14.08.2013 11:10 | ||
CVE-2013-3198 | HIGH | 7.2 | 10.0 | 14.08.2013 11:10 | ||
CVE-2013-3200 | HIGH | 7.2 | 10.0 | 09.10.2013 14:53 | ||
CVE-2013-3660 | HIGH | 7.8 | 5.9 | 24.05.2013 20:55 | ||
CVE-2013-3661 | MEDIUM | 4.9 | 6.9 | 24.05.2013 20:55 | ||
CVE-2013-3863 | HIGH | 9.3 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-3864 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-3865 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-3866 | HIGH | 7.2 | 10.0 | 11.09.2013 14:03 | ||
CVE-2013-3869 | MEDIUM | 5.0 | 2.9 | 13.11.2013 00:55 | ||
CVE-2013-3876 | HIGH | 7.1 | 6.9 | 18.11.2013 03:55 | ||
CVE-2013-3878 | MEDIUM | 6.9 | 10.0 | 11.12.2013 00:55 | ||
CVE-2013-3879 | HIGH | 7.2 | 10.0 | 09.10.2013 14:53 | ||
CVE-2013-3887 | MEDIUM | 4.9 | 6.9 | 13.11.2013 00:55 | ||
CVE-2013-3894 | HIGH | 9.3 | 10.0 | 09.10.2013 14:53 | ||
CVE-2013-3899 | HIGH | 7.2 | 10.0 | 11.12.2013 00:55 | ||
CVE-2013-3918 | HIGH | 9.3 | 10.0 | 12.11.2013 14:35 | ||
CVE-2013-3940 | HIGH | 9.3 | 10.0 | 13.11.2013 00:55 | ||
CVE-2013-5056 | HIGH | 9.3 | 10.0 | 11.12.2013 00:55 | ||
CVE-2013-5058 | MEDIUM | 6.9 | 10.0 | 11.12.2013 00:55 | ||
CVE-2013-5065 | HIGH | 7.8 | 5.9 | 28.11.2013 00:55 | ||
CVE-2014-0266 | HIGH | 7.1 | 6.9 | 12.02.2014 04:50 | ||
CVE-2014-0300 | HIGH | 7.2 | 10.0 | 12.03.2014 05:15 | ||
CVE-2014-0301 | HIGH | 9.3 | 10.0 | 12.03.2014 05:15 | ||
CVE-2014-0315 | MEDIUM | 6.9 | 10.0 | 08.04.2014 23:55 | ||
CVE-2014-0317 | MEDIUM | 5.4 | 6.9 | 12.03.2014 05:15 | ||
CVE-2014-0323 | MEDIUM | 6.6 | 9.2 | 12.03.2014 05:15 | ||
CVE-2014-4971 | HIGH | 7.2 | 10.0 | 26.07.2014 15:55 | ||
CVE-2017-0176 | HIGH | 8.1 | 5.9 | 22.06.2017 14:29 | ||
CVE-2017-8461 | HIGH | 7.8 | 5.9 | 15.06.2017 20:29 | ||
CVE-2017-8487 | HIGH | 7.8 | 5.9 | 15.06.2017 20:29 | ||
CVE-2019-1489 | HIGH | 7.5 | 3.6 | 10.12.2019 22:15 |
Scheme data ?
Product | Microsoft Windows 2003 Server SP1, XP SP2, and XP Embedded SP2 (for specific editions, updates, patches and hotfixes see Section 1 in Security Target) | |
---|---|---|
Id | CCEVS-VR-VID4025 | |
Url | https://www.niap-ccevs.org/product/4025 | |
Certification Date | 07.10.2005 | |
Expiration Date | None | |
Category | Operating System | |
Vendor | Microsoft Corporation | |
Evaluation Facility | Leidos Common Criteria Testing Laboratory | |
Scheme | US |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microsoft Windows 2003 Server SP1, XP SP2, and XP Embedded SP2 (for specific editions, updates, patches and hotfixes see Section 1 in Security Target)', 'id': 'CCEVS-VR-VID4025', 'url': 'https://www.niap-ccevs.org/product/4025', 'certification_date': '2005-10-07', 'expiration_date': None, 'category': 'Operating System', 'vendor': 'Microsoft Corporation', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
18.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2013-3900']}
values discarded.
- The related_cves property was updated, with the
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Microsoft Windows 2003 Server SP1, XP SP2, and XP Embedded SP2 (for specific editions, updates, patches and hotfixes see Section 1 in Security Target)', 'id': 'CCEVS-VR-VID4025', 'url': 'https://www.niap-ccevs.org/product/4025', 'certification_date': '2005-10-07'}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2001-0877', 'CVE-2004-0123', 'CVE-2004-0117', 'CVE-2002-0699', 'CVE-2010-3941', 'CVE-2004-0575', 'CVE-2002-0724', 'CVE-2002-0053', 'CVE-2007-3724', 'CVE-2011-0042', 'CVE-2004-0119', 'CVE-2004-0124', 'CVE-2010-3957', 'CVE-2007-5133', 'CVE-2001-0879', 'CVE-2003-0909', 'CVE-2002-0391', 'CVE-2010-4701', 'CVE-2003-0306', 'CVE-2002-2324', 'CVE-2007-1765', 'CVE-2004-0199', 'CVE-2011-0043', 'CVE-2010-3956', 'CVE-2010-3227', 'CVE-2003-0907', 'CVE-2007-2228', 'CVE-2004-0207', 'CVE-2007-0214', 'CVE-2007-0843', 'CVE-2010-4669', 'CVE-2011-0087', 'CVE-2001-0721', 'CVE-2001-0876', 'CVE-2007-3034', 'CVE-2002-0974', 'CVE-2007-1531', 'CVE-2001-0860', 'CVE-2011-0090', 'CVE-2011-0086', 'CVE-2003-0813', 'CVE-2011-0096', 'CVE-2010-3970', 'CVE-2011-0088', 'CVE-2004-0208', 'CVE-2005-4269', 'CVE-2002-0055', 'CVE-2010-3942', 'CVE-2010-3963', 'CVE-2004-0209', 'CVE-2011-0039', 'CVE-2011-0045', 'CVE-2004-1049', 'CVE-2007-2224', 'CVE-2010-3943', 'CVE-2004-0120', 'CVE-2004-0200', 'CVE-2010-3940', 'CVE-2019-1489', 'CVE-2010-4398', 'CVE-2011-0030', 'CVE-2003-1048', 'CVE-2004-0206', 'CVE-2004-0116', 'CVE-2007-1537', 'CVE-2002-0862', 'CVE-2000-1218', 'CVE-2007-5145', 'CVE-2003-0807', 'CVE-2002-2117', 'CVE-2002-1327', 'CVE-2010-3959', 'CVE-2001-0909', 'CVE-2007-1492', 'CVE-2002-0283', 'CVE-2011-0089', 'CVE-2006-6797', 'CVE-2002-2132', 'CVE-2003-0897', 'CVE-2004-0840', 'CVE-2011-0033', 'CVE-2010-2743', 'CVE-2001-1200', 'CVE-2010-3939', 'CVE-2003-0469']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2008-0087', 'CVE-2006-4692']}
values added.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4768bb74fe8e9569de100de38e903edfa9ace397f1324c6b144c26cc4b206e99', 'txt_hash': '2d3b565689e87e9d0d98fe2bd689f9ef5533955e89b1fa29c38aeb65150e7852'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'db88d04095a9929599fc2e04dd77314c11d5d9f2e5a08217104eaab61172152a', 'txt_hash': '445bd448c2212b4fb328f82d14caa75a607277cbb3e72d0c1e891c2c7f0941d2'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 405044, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Santosh Chokhani', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20051110105622-05'00'", '/Title': 'Validation Report', '/CreationDate': "D:20051110105336-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx', 'http://www.cve.mitre.org/', 'http://www.microsoft.com/technet/security/Bulletin/MS05-027.mspx']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1128096, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 165, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'SAIC', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20051110084057-05'00'", '/Title': 'Windows 2003/XP Security Target', '/CreationDate': "D:20051110083536-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.ncsl.nist.gov/cryptval/', 'http://www.microsoft.com/technet/security/Bulletin/MS05-043.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-018.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-012.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-011.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-027.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS04-044.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx', 'http://www.microsoft.com/technet/security/Bulletin/MS05-007.mspx', 'mailto:[email protected]', 'http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx', 'http://creativecommons.org/licenses/by-nd-nc/1.0/']}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-05-0131', 'cert_item': 'Microsoft Windows 2003 Server and XP Workstation', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-05-0131': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL 1': 1, 'EAL 4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 1, 'ACM_SCP.1': 2}, 'ADO': {'ADO_IGS.1': 1, 'ADO_DEL': 1}, 'ALC': {'ALC_FLR.3': 3}, 'AVA': {'AVA_VLA.1.1': 1}, 'ASE': {'ASE_OBJ.1': 2, 'ASE_REQ': 2, 'ASE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG.1': 1, 'FAU_GEN.1': 1}, 'FDP': {'FDP_ACF.1': 1}, 'FIA': {'FIA_USB.1': 1}, 'FMT': {'FMT_SMF.1': 1, 'FMT_REV.1': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}, 'Microsoft': {'Microsoft': 24, 'Microsoft Corporation': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 14, 'EAL3': 2, 'EAL4': 21, 'EAL 3': 4, 'EAL 4 augmented': 5, 'EAL4 augmented': 4}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 14, 'ACM_CAP.4': 24, 'ACM_SCP.2': 11}, 'ADO': {'ADO_DEL.2': 11, 'ADO_IGS.1': 10}, 'ADV': {'ADV_FSP.2': 14, 'ADV_HLD.2': 16, 'ADV_IMP.1': 11, 'ADV_LLD.1': 18, 'ADV_RCR.1': 8, 'ADV_SPM.1': 14}, 'AGD': {'AGD_ADM.1': 15, 'AGD_USR.1': 13}, 'ALC': {'ALC_FLR.3': 25, 'ALC_DVS.1': 11, 'ALC_LCD.1': 12, 'ALC_TAT.1': 13}, 'ATE': {'ATE_COV.2': 11, 'ATE_DPT.1': 9, 'ATE_FUN.1': 14, 'ATE_IND.2': 12}, 'AVA': {'AVA_SOF.1': 11, 'AVA_MSU.2': 18, 'AVA_VLA.2': 16}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 17, 'FAU_GEN.2': 8, 'FAU_SAR.1': 14, 'FAU_SAR.2': 9, 'FAU_SAR.3': 13, 'FAU_SEL.1': 7, 'FAU_STG.1': 12, 'FAU_STG.3': 10, 'FAU_STG.4': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 2, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1, 'FAU_GEN': 3}, 'FCS': {'FCS_COP.1': 31, 'FCS_CKM.1': 19, 'FCS_CKM.2': 10, 'FCS_CKM.4': 9, 'FCS_COP.1.1': 16, 'FCS_CKM': 10, 'FCS_CKM.1.1': 5, 'FCS_CKM.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_CKM_EXP.2.2': 1, 'FCS_COP': 1, 'FCS_CKM_EXP.1': 1}, 'FDP': {'FDP_ACF.1': 36, 'FDP_RIP.2': 11, 'FDP_ACC.2': 30, 'FDP_IFC.1': 30, 'FDP_IFF.1': 20, 'FDP_ITT.1': 9, 'FDP_UCT.1': 9, 'FDP_UIT.1': 9, 'FDP_ACC.1': 15, 'FDP_ACC.2.1': 3, 'FDP_ACC.2.2': 3, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 5, 'FDP_ACF.1.3': 5, 'FDP_ACF.1.4': 3, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_ITT.1.1': 1, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACF.2': 2, 'FDP_ITC.1': 4, 'FDP_ITC': 1}, 'FIA': {'FIA_ATD.1': 11, 'FIA_SOS.1': 15, 'FIA_UAU.1': 14, 'FIA_UID.1': 13, 'FIA_UAU.7': 8, 'FIA_USB': 18, 'FIA_AFL.1': 11, 'FIA_UAU.6': 9, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1': 4, 'FIA_UID': 1}, 'FMT': {'FMT_MTD.1': 140, 'FMT_MSA.1': 64, 'FMT_MSA.3': 50, 'FMT_REV.1': 19, 'FMT_SMR.1': 45, 'FMT_MOF.1': 39, 'FMT_MTD.2': 11, 'FMT_SAE.1': 11, 'FMT_SMR.3': 8, 'FMT_MOF.1.1': 4, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 5, 'FMT_MSA.3.2': 5, 'FMT_MTD.1.1': 16, 'FMT_MTD.1.2': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1': 8, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR.3.1': 1, 'FMT_REV': 1, 'FMT_MSA.2': 9, 'FMT_MSA': 1}, 'FPT': {'FPT_AMT.1': 7, 'FPT_RVM.1': 10, 'FPT_SEP.1': 9, 'FPT_STM.1': 11, 'FPT_RPL.1': 3, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_ITT.1': 6, 'FPT_ITT.3': 3, 'FPT_TRC.1': 4, 'FPT_RPL': 1}, 'FRU': {'FRU_RSA.1': 9, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_SSL.2': 12, 'FTA_SSL.3': 7, 'FTA_TAB.1': 8, 'FTA_TSE.1': 10, 'FTA_SSL.1': 8, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1, 'FTA_TSE.1.1': 1, 'FTA_TRP.1': 1, 'FTA_MSC.1': 1, 'FTA_MCS.1': 2, 'FTA_LSA.1': 1}, 'FTP': {'FTP_TRP.1': 11, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 2}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 7, 'O.DISCRETIONARY_ACCESS': 3, 'O.AUDITING': 7, 'O.RESIDUAL_INFORMATION': 7, 'O.MANAGE': 7, 'O.ENFORCEMENT': 8, 'O.AUDIT_PROTECTION': 4, 'O.PROTECT': 9, 'O.TRUSTED_PATH': 8, 'O.LEGAL_WARNING': 4, 'O.LIMIT_AUTHORIZATION': 8, 'O.IPSEC': 12, 'O.ENCRYPTED_DATA': 10, 'O.ASSURANCE': 4, 'O.MEDIATE': 8, 'O.INSTALL': 4, 'O.PHYSICAL': 5, 'O.CREDEN': 4, 'O.AUDIT_': 1}, 'T': {'T.AUDIT_CORRUPT': 4, 'T.CONFIG_CORRUPT': 3, 'T.OBJECTS_NOT_CLEAN': 4, 'T.SPOOF': 4, 'T.SYSACC': 4, 'T.UNAUTH_ACCESS': 7, 'T.UNAUTH_MODIFICATION': 4, 'T.UNDETECTED_ACTIONS': 4, 'T.USER_CORRUPT': 7, 'T.ADMIN_ERROR': 4, 'T.AUDIT_COMPROMISE': 5, 'T.EAVESDROP': 4, 'T.MASQUERADE': 3, 'T.POOR_DESIGN': 3, 'T.POOR_IMPLEMENTATION': 4, 'T.REPLAY': 4, 'T.UNATTENDED_SESSION': 5, 'T.UNIDENTIFIED_ACTIONS': 8, 'T.ADDRESS_MASQUERADE': 4, 'T.TCPIP_ATTACK': 3, 'T.USER_CURRUPT': 1}, 'A': {'A.CONNECT': 3, 'A.PEER': 3, 'A.COOP': 5, 'A.MANAGE': 2, 'A.NO_EVIL_ADM': 3, 'A.LOCATE': 3, 'A.PROTECT': 2}}, 'vendor': {'Infineon': {'Infineon': 2}, 'Broadcom': {'Broadcom': 1}, 'Microsoft': {'Microsoft': 42, 'Microsoft Corporation': 168}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'RC': {'RC4': 2}}, 'DES': {'DES': {'DES': 18}, '3DES': {'3DES': 12}}, 'constructions': {'MAC': {'HMAC': 6}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 9}, 'DSA': {'DSA': 17}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 21, 'SHA1': 2}, 'SHA2': {'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KEX': {'Key Exchange': 2, 'Key exchange': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 12}, 'TLS': {'TLS': 5}}, 'IKE': {'IKE': 11}, 'VPN': {'VPN': 3}}, 'randomness': {'RNG': {'RNG': 12}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 10}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-2': 1, 'FIPS 140-1': 6, 'FIPS 186-2': 2, 'FIPS 140': 5, 'FIPS 46-3': 3, 'FIPS 140-2': 5, 'FIPS 197': 2, 'FIPS 140-214': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS#5': 7}, 'RFC': {'RFC 3739': 1, 'RFC 2617': 1}, 'X509': {'x.509': 1, 'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid4025-vr.pdf
. - The st_filename property was set to
st_vid4025-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-0131-2005
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0416-2007', 'BSI-DSZ-CC-0453-2009', 'BSI-DSZ-CC-0387-2007']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0416-2007', 'BSI-DSZ-CC-0453-2009', 'BSI-DSZ-CC-0387-2007']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0366-2008', 'BSI-DSZ-CC-0416-2007']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0366-2008', 'BSI-DSZ-CC-0416-2007']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-st.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Microsoft Windows 2003 and Microsoft Windows XP was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "b3eff67d30a6fa07",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-0131-2005",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2003:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:gold:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2002:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*",
"cpe:2.3:o:microsoft:windows_xp:-:gold:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2003"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2012-4786",
"CVE-2010-0250",
"CVE-2007-1912",
"CVE-2009-1544",
"CVE-2011-1233",
"CVE-2011-1885",
"CVE-2007-0066",
"CVE-2001-0876",
"CVE-2011-3402",
"CVE-2012-2529",
"CVE-2010-1895",
"CVE-2010-1897",
"CVE-2009-0085",
"CVE-2012-0004",
"CVE-2013-3173",
"CVE-2011-0034",
"CVE-2006-0005",
"CVE-2005-1208",
"CVE-2012-1864",
"CVE-2013-1270",
"CVE-2010-0020",
"CVE-2010-1690",
"CVE-2010-4669",
"CVE-2011-1239",
"CVE-2010-0820",
"CVE-2010-0819",
"CVE-2010-0236",
"CVE-2009-1922",
"CVE-2010-0237",
"CVE-2010-1896",
"CVE-2013-1334",
"CVE-2009-1545",
"CVE-2010-3974",
"CVE-2011-1226",
"CVE-2012-1867",
"CVE-2013-1258",
"CVE-2004-0124",
"CVE-2013-1260",
"CVE-2009-4210",
"CVE-2008-1456",
"CVE-2002-0391",
"CVE-2013-1269",
"CVE-2014-0300",
"CVE-2004-0206",
"CVE-2007-1492",
"CVE-2010-3956",
"CVE-2011-0088",
"CVE-2001-0909",
"CVE-2008-4036",
"CVE-2006-4692",
"CVE-2012-5362",
"CVE-2004-1049",
"CVE-2007-3463",
"CVE-2009-1929",
"CVE-2009-2504",
"CVE-2013-3887",
"CVE-2007-1765",
"CVE-2011-2014",
"CVE-2013-1266",
"CVE-2013-3181",
"CVE-2013-3894",
"CVE-2013-0077",
"CVE-2010-3970",
"CVE-2011-0045",
"CVE-2010-1734",
"CVE-2012-5364",
"CVE-2011-0039",
"CVE-2017-0176",
"CVE-2011-1229",
"CVE-2009-2502",
"CVE-2013-3863",
"CVE-2005-1207",
"CVE-2011-0086",
"CVE-2010-0233",
"CVE-2008-3012",
"CVE-2010-0235",
"CVE-2012-0005",
"CVE-2011-0676",
"CVE-2008-1441",
"CVE-2011-3401",
"CVE-2010-0238",
"CVE-2007-1206",
"CVE-2009-2493",
"CVE-2013-1345",
"CVE-2004-0117",
"CVE-2013-1273",
"CVE-2013-1256",
"CVE-2013-1283",
"CVE-2013-3876",
"CVE-2013-3195",
"CVE-2010-1891",
"CVE-2001-1200",
"CVE-2010-1689",
"CVE-2011-1228",
"CVE-2010-2744",
"CVE-2011-0670",
"CVE-2013-3866",
"CVE-2009-3677",
"CVE-2003-0907",
"CVE-2011-1882",
"CVE-2011-0033",
"CVE-2009-0089",
"CVE-2009-0568",
"CVE-2011-1870",
"CVE-2009-2519",
"CVE-2004-0119",
"CVE-2012-0009",
"CVE-2009-0232",
"CVE-2011-0096",
"CVE-2010-2729",
"CVE-2010-0818",
"CVE-2010-3943",
"CVE-2011-0667",
"CVE-2011-2600",
"CVE-2012-1868",
"CVE-2005-1987",
"CVE-2013-3198",
"CVE-2011-0671",
"CVE-2010-3144",
"CVE-2012-1851",
"CVE-2010-3957",
"CVE-2007-1204",
"CVE-2013-1268",
"CVE-2017-8461",
"CVE-2011-2005",
"CVE-2013-3864",
"CVE-2009-1546",
"CVE-2011-3400",
"CVE-2012-1848",
"CVE-2013-3128",
"CVE-2013-3918",
"CVE-2010-2553",
"CVE-2009-1926",
"CVE-2008-2251",
"CVE-2010-2738",
"CVE-2012-0002",
"CVE-2009-1928",
"CVE-2008-0015",
"CVE-2010-4562",
"CVE-2013-3661",
"CVE-2011-0089",
"CVE-2001-0860",
"CVE-2012-0181",
"CVE-2011-1868",
"CVE-2013-1271",
"CVE-2004-0199",
"CVE-2007-5145",
"CVE-2013-1250",
"CVE-2003-0469",
"CVE-2009-2494",
"CVE-2009-0079",
"CVE-2011-0042",
"CVE-2011-1231",
"CVE-2012-0173",
"CVE-2013-3174",
"CVE-2009-1125",
"CVE-2013-3899",
"CVE-2010-1882",
"CVE-2002-0699",
"CVE-2017-8487",
"CVE-2011-1281",
"CVE-2006-2374",
"CVE-2011-1247",
"CVE-2013-0810",
"CVE-2010-1885",
"CVE-2013-1343",
"CVE-2010-0028",
"CVE-2011-1879",
"CVE-2002-1327",
"CVE-2002-0862",
"CVE-2007-5133",
"CVE-2013-1261",
"CVE-2008-4834",
"CVE-2011-1249",
"CVE-2008-1454",
"CVE-2013-1276",
"CVE-2009-3126",
"CVE-2009-4311",
"CVE-2009-1930",
"CVE-2010-2566",
"CVE-2011-1234",
"CVE-2011-1883",
"CVE-2013-3129",
"CVE-2009-2503",
"CVE-2011-0087",
"CVE-2012-0003",
"CVE-2011-0662",
"CVE-2012-0217",
"CVE-2008-1083",
"CVE-2005-4269",
"CVE-2009-2514",
"CVE-2011-1243",
"CVE-2009-0083",
"CVE-2010-3939",
"CVE-2013-1274",
"CVE-2009-2513",
"CVE-2011-0666",
"CVE-2013-1344",
"CVE-2009-4313",
"CVE-2013-1272",
"CVE-2012-0013",
"CVE-2008-0020",
"CVE-2002-0055",
"CVE-2014-0317",
"CVE-2010-1255",
"CVE-2006-2373",
"CVE-2012-2527",
"CVE-2013-3175",
"CVE-2007-3724",
"CVE-2004-0207",
"CVE-2010-2731",
"CVE-2009-2516",
"CVE-2013-5065",
"CVE-2009-4312",
"CVE-2010-1894",
"CVE-2013-5056",
"CVE-2010-3940",
"CVE-2011-1875",
"CVE-2013-1294",
"CVE-2010-0487",
"CVE-2013-1300",
"CVE-2012-1870",
"CVE-2002-0724",
"CVE-2011-0043",
"CVE-2004-0209",
"CVE-2009-0230",
"CVE-2013-5058",
"CVE-2013-1252",
"CVE-2005-1214",
"CVE-2014-0315",
"CVE-2007-2237",
"CVE-2011-0030",
"CVE-2010-1098",
"CVE-2013-1286",
"CVE-2010-0486",
"CVE-2010-2741",
"CVE-2005-0904",
"CVE-2012-1893",
"CVE-2006-5586",
"CVE-2004-2527",
"CVE-2004-0120",
"CVE-2010-3963",
"CVE-2012-1853",
"CVE-2011-0660",
"CVE-2010-2265",
"CVE-2009-2507",
"CVE-2007-2218",
"CVE-2012-0180",
"CVE-2006-5758",
"CVE-2013-1254",
"CVE-2013-3136",
"CVE-2009-1123",
"CVE-2011-0658",
"CVE-2006-6723",
"CVE-2011-1268",
"CVE-2009-0235",
"CVE-2009-2510",
"CVE-2010-3959",
"CVE-2004-0575",
"CVE-2011-1237",
"CVE-2013-1277",
"CVE-2011-1227",
"CVE-2012-1865",
"CVE-2007-2224",
"CVE-2008-0322",
"CVE-2009-0086",
"CVE-2008-1087",
"CVE-2005-3177",
"CVE-2013-3869",
"CVE-2010-2563",
"CVE-2013-1341",
"CVE-2005-0058",
"CVE-2013-1280",
"CVE-2002-0283",
"CVE-2013-1264",
"CVE-2007-1531",
"CVE-2012-0154",
"CVE-2010-0269",
"CVE-2007-1215",
"CVE-2009-2501",
"CVE-2010-2746",
"CVE-2010-0022",
"CVE-2010-3941",
"CVE-2004-2339",
"CVE-2013-3878",
"CVE-2009-0119",
"CVE-2013-1287",
"CVE-2009-2515",
"CVE-2008-1453",
"CVE-2013-3660",
"CVE-2011-1967",
"CVE-2012-1852",
"CVE-2011-1235",
"CVE-2011-1985",
"CVE-2013-1259",
"CVE-2008-1086",
"CVE-2011-1974",
"CVE-2009-1126",
"CVE-2008-2250",
"CVE-2011-0661",
"CVE-2005-1935",
"CVE-2008-3648",
"CVE-2007-0069",
"CVE-2002-2324",
"CVE-2013-1291",
"CVE-2011-1283",
"CVE-2007-1946",
"CVE-2008-3464",
"CVE-2003-0909",
"CVE-2010-1886",
"CVE-2009-2528",
"CVE-2012-1850",
"CVE-2013-1278",
"CVE-2013-1248",
"CVE-2013-3879",
"CVE-2007-1537",
"CVE-2004-0840",
"CVE-2007-6753",
"CVE-2010-3942",
"CVE-2010-1735",
"CVE-2011-5046",
"CVE-2010-0812",
"CVE-2013-3197",
"CVE-2010-2739",
"CVE-2011-1876",
"CVE-2011-0673",
"CVE-2019-1489",
"CVE-2009-2524",
"CVE-2009-1124",
"CVE-2009-1127",
"CVE-2011-1886",
"CVE-2009-0550",
"CVE-2009-0078",
"CVE-2002-0974",
"CVE-2010-0021",
"CVE-2009-0087",
"CVE-2007-2219",
"CVE-2011-0674",
"CVE-2007-1212",
"CVE-2007-2228",
"CVE-2009-2511",
"CVE-2014-0301",
"CVE-2001-0879",
"CVE-2010-0025",
"CVE-2008-0087",
"CVE-2008-4114",
"CVE-2001-0721",
"CVE-2011-0677",
"CVE-2010-1883",
"CVE-2011-3397",
"CVE-2010-0234",
"CVE-2011-1238",
"CVE-2003-0306",
"CVE-2007-1211",
"CVE-2014-0323",
"CVE-2011-1991",
"CVE-2013-3200",
"CVE-2013-1285",
"CVE-2009-1133",
"CVE-2004-0116",
"CVE-2007-0038",
"CVE-2009-0081",
"CVE-2011-3408",
"CVE-2010-0016",
"CVE-2008-0088",
"CVE-2009-3675",
"CVE-2002-2117",
"CVE-2013-1295",
"CVE-2007-5352",
"CVE-2006-4071",
"CVE-2010-0018",
"CVE-2010-2740",
"CVE-2008-2245",
"CVE-2004-0123",
"CVE-2012-4774",
"CVE-2013-1263",
"CVE-2011-0028",
"CVE-2010-0480",
"CVE-2012-0151",
"CVE-2009-0229",
"CVE-2011-0090",
"CVE-2011-2011",
"CVE-2006-7210",
"CVE-2011-1873",
"CVE-2009-0320",
"CVE-2011-1894",
"CVE-2011-0672",
"CVE-2007-1205",
"CVE-2007-2374",
"CVE-2013-1340",
"CVE-2009-0243",
"CVE-2004-0897",
"CVE-2011-1878",
"CVE-2013-1267",
"CVE-2012-1527",
"CVE-2010-2568",
"CVE-2008-4327",
"CVE-2002-0053",
"CVE-2010-0231",
"CVE-2011-2018",
"CVE-2011-1284",
"CVE-2010-0024",
"CVE-2012-1866",
"CVE-2011-1241",
"CVE-2009-2500",
"CVE-2013-1255",
"CVE-2012-0157",
"CVE-2003-0897",
"CVE-2012-2553",
"CVE-2009-2653",
"CVE-2001-0877",
"CVE-2008-4038",
"CVE-2008-3013",
"CVE-2013-3167",
"CVE-2008-4835",
"CVE-2010-1888",
"CVE-2009-1511",
"CVE-2010-3227",
"CVE-2003-0813",
"CVE-2009-0082",
"CVE-2011-1232",
"CVE-2006-3351",
"CVE-2011-1869",
"CVE-2013-3172",
"CVE-2007-6026",
"CVE-2012-0148",
"CVE-2009-1808",
"CVE-2010-0719",
"CVE-2010-2550",
"CVE-2008-4609",
"CVE-2010-4701",
"CVE-2007-3034",
"CVE-2004-0200",
"CVE-2011-1242",
"CVE-2008-0083",
"CVE-2008-1084",
"CVE-2010-3140",
"CVE-2010-4398",
"CVE-2011-0675",
"CVE-2013-3940",
"CVE-2011-1968",
"CVE-2011-0657",
"CVE-2009-1920",
"CVE-2013-1265",
"CVE-2008-4250",
"CVE-2008-3014",
"CVE-2008-1436",
"CVE-2010-0485",
"CVE-2011-1236",
"CVE-2002-2132",
"CVE-2007-0214",
"CVE-2006-4696",
"CVE-2013-1257",
"CVE-2012-1528",
"CVE-2008-1457",
"CVE-2011-1225",
"CVE-2011-2003",
"CVE-2011-1880",
"CVE-2011-3406",
"CVE-2010-0811",
"CVE-2006-6797",
"CVE-2011-1874",
"CVE-2008-1440",
"CVE-2003-0807",
"CVE-2013-1262",
"CVE-2011-1282",
"CVE-2006-3209",
"CVE-2005-1212",
"CVE-2011-1881",
"CVE-2013-1249",
"CVE-2010-0027",
"CVE-2012-0159",
"CVE-2008-2249",
"CVE-2013-1251",
"CVE-2014-4971",
"CVE-2010-0232",
"CVE-2008-3465",
"CVE-2004-0208",
"CVE-2013-1313",
"CVE-2008-2252",
"CVE-2013-1342",
"CVE-2010-0023",
"CVE-2011-0665",
"CVE-2013-1253",
"CVE-2003-1048",
"CVE-2013-1279",
"CVE-2010-0484",
"CVE-2009-0231",
"CVE-2013-3196",
"CVE-2000-1218",
"CVE-2012-0175",
"CVE-2011-1884",
"CVE-2010-2743",
"CVE-2014-0266",
"CVE-2010-2567",
"CVE-2007-0843",
"CVE-2010-1887",
"CVE-2010-0252",
"CVE-2010-3222",
"CVE-2011-1240",
"CVE-2012-2530",
"CVE-2012-2526",
"CVE-2011-1230",
"CVE-2012-1890",
"CVE-2013-3865",
"CVE-2007-5348",
"CVE-2013-1275",
"CVE-2011-0041",
"CVE-2012-2556",
"CVE-2008-1445"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0416-2007",
"BSI-DSZ-CC-0366-2008"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0416-2007",
"BSI-DSZ-CC-0366-2008"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"category": "Operating System",
"certification_date": "2005-10-07",
"evaluation_facility": "Leidos Common Criteria Testing Laboratory",
"expiration_date": null,
"id": "CCEVS-VR-VID4025",
"product": "Microsoft Windows 2003 Server SP1, XP SP2, and XP Embedded SP2 (for specific editions, updates, patches and hotfixes see Section 1 in Security Target)",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/4025",
"vendor": "Microsoft Corporation"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0416-2007",
"BSI-DSZ-CC-0387-2007",
"BSI-DSZ-CC-0453-2009"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0416-2007",
"BSI-DSZ-CC-0387-2007",
"BSI-DSZ-CC-0453-2009"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Microsoft Corporation",
"manufacturer_web": "https://www.microsoft.com",
"name": "Microsoft Windows 2003 and Microsoft Windows XP",
"not_valid_after": "2012-09-07",
"not_valid_before": "2005-11-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid4025-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-05-0131",
"cert_item": "Microsoft Windows 2003 Server and XP Workstation",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-05-0131": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 1,
"ACM_SCP.1": 2
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS.1": 1
},
"ALC": {
"ALC_FLR.3": 3
},
"ASE": {
"ASE_OBJ.1": 2,
"ASE_REQ": 2,
"ASE_REQ.1": 1
},
"AVA": {
"AVA_VLA.1.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 3,
"EAL 4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_STG.1": 1
},
"FDP": {
"FDP_ACF.1": 1
},
"FIA": {
"FIA_USB.1": 1
},
"FMT": {
"FMT_REV.1": 1,
"FMT_SMF.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1
},
"Microsoft": {
"Microsoft": 24,
"Microsoft Corporation": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Santosh Chokhani",
"/CreationDate": "D:20051110105336-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20051110105622-05\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Validation Report",
"pdf_file_size_bytes": 405044,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cve.mitre.org/",
"http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-027.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "st_vid4025-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 17
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT": 3,
"A.COOP": 5,
"A.LOCATE": 3,
"A.MANAGE": 2,
"A.NO_EVIL_ADM": 3,
"A.PEER": 3,
"A.PROTECT": 2
},
"O": {
"O.ASSURANCE": 4,
"O.AUDITING": 7,
"O.AUDIT_": 1,
"O.AUDIT_PROTECTION": 4,
"O.AUTHORIZATION": 7,
"O.CREDEN": 4,
"O.DISCRETIONARY_ACCESS": 3,
"O.ENCRYPTED_DATA": 10,
"O.ENFORCEMENT": 8,
"O.INSTALL": 4,
"O.IPSEC": 12,
"O.LEGAL_WARNING": 4,
"O.LIMIT_AUTHORIZATION": 8,
"O.MANAGE": 7,
"O.MEDIATE": 8,
"O.PHYSICAL": 5,
"O.PROTECT": 9,
"O.RESIDUAL_INFORMATION": 7,
"O.TRUSTED_PATH": 8
},
"T": {
"T.ADDRESS_MASQUERADE": 4,
"T.ADMIN_ERROR": 4,
"T.AUDIT_COMPROMISE": 5,
"T.AUDIT_CORRUPT": 4,
"T.CONFIG_CORRUPT": 3,
"T.EAVESDROP": 4,
"T.MASQUERADE": 3,
"T.OBJECTS_NOT_CLEAN": 4,
"T.POOR_DESIGN": 3,
"T.POOR_IMPLEMENTATION": 4,
"T.REPLAY": 4,
"T.SPOOF": 4,
"T.SYSACC": 4,
"T.TCPIP_ATTACK": 3,
"T.UNATTENDED_SESSION": 5,
"T.UNAUTH_ACCESS": 7,
"T.UNAUTH_MODIFICATION": 4,
"T.UNDETECTED_ACTIONS": 4,
"T.UNIDENTIFIED_ACTIONS": 8,
"T.USER_CORRUPT": 7,
"T.USER_CURRUPT": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 14,
"ACM_CAP.4": 24,
"ACM_SCP.2": 11
},
"ADO": {
"ADO_DEL.2": 11,
"ADO_IGS.1": 10
},
"ADV": {
"ADV_FSP.2": 14,
"ADV_HLD.2": 16,
"ADV_IMP.1": 11,
"ADV_LLD.1": 18,
"ADV_RCR.1": 8,
"ADV_SPM.1": 14
},
"AGD": {
"AGD_ADM.1": 15,
"AGD_USR.1": 13
},
"ALC": {
"ALC_DVS.1": 11,
"ALC_FLR.3": 25,
"ALC_LCD.1": 12,
"ALC_TAT.1": 13
},
"ATE": {
"ATE_COV.2": 11,
"ATE_DPT.1": 9,
"ATE_FUN.1": 14,
"ATE_IND.2": 12
},
"AVA": {
"AVA_MSU.2": 18,
"AVA_SOF.1": 11,
"AVA_VLA.2": 16
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 4": 14,
"EAL 4 augmented": 5,
"EAL3": 2,
"EAL4": 21,
"EAL4 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 3,
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 14,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 9,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 13,
"FAU_SAR.3.1": 2,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 12,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 10,
"FAU_STG.3.1": 1,
"FAU_STG.4": 14,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 10,
"FCS_CKM.1": 19,
"FCS_CKM.1.1": 5,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 1,
"FCS_CKM_EXP.1": 1,
"FCS_CKM_EXP.2.2": 1,
"FCS_COP": 1,
"FCS_COP.1": 31,
"FCS_COP.1.1": 16
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.2": 30,
"FDP_ACC.2.1": 3,
"FDP_ACC.2.2": 3,
"FDP_ACF.1": 36,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 5,
"FDP_ACF.1.3": 5,
"FDP_ACF.1.4": 3,
"FDP_ACF.2": 2,
"FDP_IFC.1": 30,
"FDP_IFC.1.1": 2,
"FDP_IFF.1": 20,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 2,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITT.1": 9,
"FDP_ITT.1.1": 1,
"FDP_RIP.2": 11,
"FDP_RIP.2.1": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 9,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 11,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 15,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 14,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.6": 9,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 8,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 18,
"FIA_USB.1": 4
},
"FMT": {
"FMT_MOF.1": 39,
"FMT_MOF.1.1": 4,
"FMT_MSA": 1,
"FMT_MSA.1": 64,
"FMT_MSA.1.1": 6,
"FMT_MSA.2": 9,
"FMT_MSA.3": 50,
"FMT_MSA.3.1": 5,
"FMT_MSA.3.2": 5,
"FMT_MTD.1": 140,
"FMT_MTD.1.1": 16,
"FMT_MTD.1.2": 1,
"FMT_MTD.2": 11,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_REV": 1,
"FMT_REV.1": 19,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SAE.1": 11,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 1,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 45,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1,
"FMT_SMR.3": 8,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_AMT.1": 7,
"FPT_ITT.1": 6,
"FPT_ITT.3": 3,
"FPT_RPL": 1,
"FPT_RPL.1": 3,
"FPT_RVM.1": 10,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 9,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1,
"FPT_TRC.1": 4
},
"FRU": {
"FRU_RSA.1": 9,
"FRU_RSA.1.1": 1
},
"FTA": {
"FTA_LSA.1": 1,
"FTA_MCS.1": 2,
"FTA_MSC.1": 1,
"FTA_SSL.1": 8,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.2": 12,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 1,
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1,
"FTA_TRP.1": 1,
"FTA_TSE.1": 10,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_TRP.1": 11,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 10
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 11
},
"TLS": {
"SSL": {
"SSL": 12
},
"TLS": {
"TLS": 5
}
},
"VPN": {
"VPN": 3
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2,
"Key exchange": 1
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 21,
"SHA1": 2
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 12
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 5,
"FIPS 140-1": 6,
"FIPS 140-2": 5,
"FIPS 140-214": 1,
"FIPS 180-2": 1,
"FIPS 186-2": 2,
"FIPS 197": 2,
"FIPS 46-3": 3
},
"PKCS": {
"PKCS#1": 2,
"PKCS#5": 7
},
"RFC": {
"RFC 2617": 1,
"RFC 3739": 1
},
"X509": {
"X.509": 3,
"x.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
},
"RC": {
"RC4": 2
}
},
"DES": {
"3DES": {
"3DES": 12
},
"DES": {
"DES": 18
}
},
"constructions": {
"MAC": {
"HMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 1
},
"Infineon": {
"Infineon": 2
},
"Microsoft": {
"Microsoft": 42,
"Microsoft Corporation": 168
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "SAIC",
"/CreationDate": "D:20051110083536-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20051110084057-05\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Windows 2003/XP Security Target",
"pdf_file_size_bytes": 1128096,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.microsoft.com/technet/security/Bulletin/MS05-012.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-027.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS04-044.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-007.mspx",
"http://csrc.ncsl.nist.gov/cryptval/",
"http://www.microsoft.com/technet/security/Bulletin/MS05-018.mspx",
"http://creativecommons.org/licenses/by-nd-nc/1.0/",
"http://www.microsoft.com/technet/security/Bulletin/MS05-011.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-043.mspx",
"http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 165
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"AVA_VLA.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4768bb74fe8e9569de100de38e903edfa9ace397f1324c6b144c26cc4b206e99",
"txt_hash": "2d3b565689e87e9d0d98fe2bd689f9ef5533955e89b1fa29c38aeb65150e7852"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "db88d04095a9929599fc2e04dd77314c11d5d9f2e5a08217104eaab61172152a",
"txt_hash": "445bd448c2212b4fb328f82d14caa75a607277cbb3e72d0c1e891c2c7f0941d2"
}
},
"status": "archived"
}