Rapid7™ Nexpose™ Vulnerability Management and Penetration Testing System V5.1
CSV information ?
Status | archived |
---|---|
Valid from | 22.05.2012 |
Valid until | 15.05.2017 |
Scheme | 🇨🇦 CA |
Manufacturer | Rapid7 LLC |
Category | Other Devices and Systems |
Security level | ALC_FLR.2, EAL3+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL 3+, EAL 3, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
383-4-148-CREvaluation facilities
EWA-CanadaStandards
ISO/IEC 17025:2005File metadata
Title | Microsoft Word - 383-4-148_CR_english_v1 0.doc |
---|---|
Author | dewhite |
Creation date | D:20120608081731-04'00' |
Modification date | D:20120608081731-04'00' |
Pages | 13 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 6.0 (Windows) |
Frontpage
Certificate ID | 383-4-148-CR |
---|---|
Certification lab | CANADA |
Security target ?
Extracted keywords
Protocols
SSLSecurity level
EAL3, EAL3+, EAL3 augmentedClaims
O.ACCESS, O.ADMIN, O.AUDITS, O.IDAUTH, O.PROTECT, T.ACCESS, T.BRUTE, T.DELETE, T.ELEVATE, T.INTERCPT, T.MODIFY, A.ATTACK, A.CLIENT, A.CONNECT, A.ENV, A.INSTALL, A.INTROP, A.NOEVIL, A.PHYSICAL, A.PRIVIL, A.REMOTE, A.TRUSTED, A.INTEROP, OE.ATTACK, OE.CONNECT, OE.CREDENT, OE.ENV, OE.INSTALL, OE.INTROP, OE.NOEVIL, OE.PERSON, OE.PHYSICAL, OE.PRIVIL, OE.REMOTE, OE.SSL, OE.TIME, OE.TRAIN, OE.TRUSTED, OE.PROTECTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_UAU, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF.1, FMT_MTD, FMT_SMF.1, FMT_SMR, FMT_MTD.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL.3, FTA_SSL.3.1File metadata
Title | Microsoft Word - Rapid7_CommonCriteria_STv1.7 - Copy.docx |
---|---|
Author | cbridges |
Creation date | D:20120511160512-04'00' |
Modification date | D:20120511160512-04'00' |
Pages | 25 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 10.1.0 (Windows) |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_DPT.1, ALC_CMS.3, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ALC_CMC.3, ASE_SPD.1, ASE_REQ.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ALC_FLR.2, ADV_TDS.2, ASE_ECD.1, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, ADV_FSP.3CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2012-6493 | MEDIUM | 6.8 | 6.4 | 04.02.2014 22:55 | ||
CVE-2012-6494 | MEDIUM | 6.1 | 2.7 | 25.01.2020 19:15 | ||
CVE-2017-5230 | HIGH | 7.2 | 5.9 | 02.03.2017 20:59 | ||
CVE-2017-5232 | HIGH | 7.8 | 5.9 | 02.03.2017 20:59 | ||
CVE-2017-5243 | HIGH | 8.5 | 6.0 | 06.06.2017 16:29 | ||
CVE-2017-5264 | HIGH | 8.8 | 5.9 | 14.12.2017 21:29 | ||
CVE-2019-5638 | MEDIUM | 6.8 | 6.4 | 21.08.2019 20:15 | ||
CVE-2019-5640 | MEDIUM | 5.3 | 1.4 | 22.11.2021 17:15 | ||
CVE-2020-7381 | HIGH | 7.8 | 5.9 | 03.09.2020 14:15 | ||
CVE-2020-7382 | MEDIUM | 6.5 | 5.9 | 03.09.2020 14:15 | ||
CVE-2020-7383 | HIGH | 8.1 | 5.2 | 14.10.2020 20:15 | ||
CVE-2021-31868 | MEDIUM | 5.4 | 2.5 | 19.08.2021 16:15 | ||
CVE-2021-3535 | MEDIUM | 6.1 | 2.7 | 16.06.2021 02:15 | ||
CVE-2022-0757 | HIGH | 8.8 | 5.9 | 17.03.2022 23:15 | ||
CVE-2022-0758 | MEDIUM | 6.1 | 2.7 | 17.03.2022 23:15 | ||
CVE-2022-4261 | MEDIUM | 6.5 | 3.6 | 08.12.2022 00:15 | ||
CVE-2023-1699 | CRITICAL | 9.8 | 5.9 | 30.03.2023 10:15 |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2019-5638', 'CVE-2012-6494']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2019-5638', 'CVE-2012-6494']}
values discarded.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '02a10a3aeb8c9db384f81f5fcf75b2ddbca7851fbcd38468f6f1807197a7e7d9', 'txt_hash': '463061e019e06f4fa87d936db6c6696b414dfab85f124b1c256cbe0fa06aee36'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '469c4362d8e60ce56ae8d8485917a535064895b1bde94639ad56ce5c0730091d', 'txt_hash': '8a0d3496d418419732ef4b293b604ba40f65bc4ae9c7e2f182c140d4546a9f77'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 53933, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/ModDate': "D:20120608081731-04'00'", '/CreationDate': "D:20120608081731-04'00'", '/Title': 'Microsoft Word - 383-4-148_CR_english_v1 0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'dewhite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 178559, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Author': 'cbridges', '/CreationDate': "D:20120511160512-04'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20120511160512-04'00'", '/Producer': 'Acrobat Distiller 10.1.0 (Windows)', '/Title': 'Microsoft Word - Rapid7_CommonCriteria_STv1.7 - Copy.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'CA': {'cert_id': '383-4-148-CR', 'cert_lab': 'CANADA'}}
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-148-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3+': 3, 'EAL 3': 4, 'EAL 3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 1, 'EAL3+': 1, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_STG.1': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 5, 'FDP_ACF.1': 4, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_AFL.1': 7, 'FIA_ATD.1': 7, 'FIA_UAU.2': 9, 'FIA_UID.2': 8, 'FIA_UAU': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MTD': 2, 'FMT_SMF.1': 9, 'FMT_SMR': 2, 'FMT_MTD.1': 8, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL.3': 7, 'FTA_SSL.3.1': 1}}, 'cc_claims': {'O': {'O.ACCESS': 8, 'O.ADMIN': 5, 'O.AUDITS': 6, 'O.IDAUTH': 10, 'O.PROTECT': 8}, 'T': {'T.ACCESS': 3, 'T.BRUTE': 3, 'T.DELETE': 3, 'T.ELEVATE': 3, 'T.INTERCPT': 3, 'T.MODIFY': 3}, 'A': {'A.ATTACK': 3, 'A.CLIENT': 3, 'A.CONNECT': 3, 'A.ENV': 3, 'A.INSTALL': 3, 'A.INTROP': 2, 'A.NOEVIL': 3, 'A.PHYSICAL': 3, 'A.PRIVIL': 3, 'A.REMOTE': 3, 'A.TRUSTED': 3, 'A.INTEROP': 1}, 'OE': {'OE.ATTACK': 3, 'OE.CONNECT': 2, 'OE.CREDENT': 3, 'OE.ENV': 3, 'OE.INSTALL': 3, 'OE.INTROP': 3, 'OE.NOEVIL': 4, 'OE.PERSON': 2, 'OE.PHYSICAL': 3, 'OE.PRIVIL': 2, 'OE.REMOTE': 3, 'OE.SSL': 3, 'OE.TIME': 4, 'OE.TRAIN': 3, 'OE.TRUSTED': 4, 'OE.PROTECT': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
383-4-148_CR_english_v1 0.pdf
. - The st_filename property was set to
Rapid7_CommonCriteria_STv1.7.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CANADA']
. - The cert_id property was set to
383-4-148
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-148_CR_english_v1%200.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapid7_CommonCriteria_STv1.7.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Rapid7™ Nexpose™ Vulnerability Management and Penetration Testing System V5.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "7b44aee232c7dae0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-148",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:rapid7:nexpose:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2012-6493",
"CVE-2021-3535",
"CVE-2020-7382",
"CVE-2022-0757",
"CVE-2023-1699",
"CVE-2017-5264",
"CVE-2017-5232",
"CVE-2022-0758",
"CVE-2022-4261",
"CVE-2020-7381",
"CVE-2012-6494",
"CVE-2020-7383",
"CVE-2017-5230",
"CVE-2021-31868",
"CVE-2019-5640",
"CVE-2017-5243",
"CVE-2019-5638"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Rapid7 LLC",
"manufacturer_web": "https://www.rapid7.com/",
"name": "Rapid7\u2122 Nexpose\u2122 Vulnerability Management and Penetration Testing System V5.1",
"not_valid_after": "2017-05-15",
"not_valid_before": "2012-05-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "383-4-148_CR_english_v1 0.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-148-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-148-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 2,
"EAL 3+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "dewhite",
"/CreationDate": "D:20120608081731-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20120608081731-04\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "Microsoft Word - 383-4-148_CR_english_v1 0.doc",
"pdf_file_size_bytes": 53933,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "Rapid7_CommonCriteria_STv1.7.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ATTACK": 3,
"A.CLIENT": 3,
"A.CONNECT": 3,
"A.ENV": 3,
"A.INSTALL": 3,
"A.INTEROP": 1,
"A.INTROP": 2,
"A.NOEVIL": 3,
"A.PHYSICAL": 3,
"A.PRIVIL": 3,
"A.REMOTE": 3,
"A.TRUSTED": 3
},
"O": {
"O.ACCESS": 8,
"O.ADMIN": 5,
"O.AUDITS": 6,
"O.IDAUTH": 10,
"O.PROTECT": 8
},
"OE": {
"OE.ATTACK": 3,
"OE.CONNECT": 2,
"OE.CREDENT": 3,
"OE.ENV": 3,
"OE.INSTALL": 3,
"OE.INTROP": 3,
"OE.NOEVIL": 4,
"OE.PERSON": 2,
"OE.PHYSICAL": 3,
"OE.PRIVIL": 2,
"OE.PROTECT": 1,
"OE.REMOTE": 3,
"OE.SSL": 3,
"OE.TIME": 4,
"OE.TRAIN": 3,
"OE.TRUSTED": 4
},
"T": {
"T.ACCESS": 3,
"T.BRUTE": 3,
"T.DELETE": 3,
"T.ELEVATE": 3,
"T.INTERCPT": 3,
"T.MODIFY": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 3,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 1,
"EAL3 augmented": 1,
"EAL3+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 5,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 4,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 9,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 2
},
"FTA": {
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "cbridges",
"/CreationDate": "D:20120511160512-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20120511160512-04\u002700\u0027",
"/Producer": "Acrobat Distiller 10.1.0 (Windows)",
"/Title": "Microsoft Word - Rapid7_CommonCriteria_STv1.7 - Copy.docx",
"pdf_file_size_bytes": 178559,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-148_CR_english_v1%200.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapid7_CommonCriteria_STv1.7.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "02a10a3aeb8c9db384f81f5fcf75b2ddbca7851fbcd38468f6f1807197a7e7d9",
"txt_hash": "463061e019e06f4fa87d936db6c6696b414dfab85f124b1c256cbe0fa06aee36"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "469c4362d8e60ce56ae8d8485917a535064895b1bde94639ad56ce5c0730091d",
"txt_hash": "8a0d3496d418419732ef4b293b604ba40f65bc4ae9c7e2f182c140d4546a9f77"
}
},
"status": "archived"
}