Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
Juniper Networks Junos Pulse Access Control Service 4.2 R4
ISCB-5-RPT-C039-CR-v1a
name Cisco Web Security Appliance with AsyncOS 11.8 Juniper Networks Junos Pulse Access Control Service 4.2 R4
scheme CA MY
status active archived
not_valid_after 21.05.2027 05.08.2018
not_valid_before 21.05.2022 05.08.2013
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C039-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20UAC%204.2R4%20EAL3%20ST%20v1.3.pdf
manufacturer Cisco Systems, Inc. Juniper Networks, Inc.
manufacturer_web https://www.cisco.com https://www.juniper.net/
security_level {} EAL3+, ALC_FLR.2
dgst 68a4bb5619d6b24a 1c02d4a2e04d2b29
heuristics/cert_id 567-LSS ISCB-5-RPT-C039-CR-v1a
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:4.2:*:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_pulse_access_control_service:4.2:*:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2019-0036, CVE-2022-22214, CVE-2024-30380, CVE-2022-22244, CVE-2022-22208, CVE-2024-39549, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2023-44182, CVE-2024-39514, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-5650, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22181, CVE-2022-22163, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22238, CVE-2022-22162, CVE-2004-0230, CVE-2023-28963, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2021-31362, CVE-2022-22245, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2023-22395, CVE-2022-22246, CVE-2023-36843, CVE-2023-44185, CVE-2023-22391, CVE-2023-44176
heuristics/extracted_sars {} ALC_FLR.2
heuristics/extracted_versions 11.8 4.2
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 89f2a255423f4a20 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf {}
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf ISCB-5-RPT-C039-CR-v1a.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf JNPR UAC 4.2R4 EAL3 ST v1.3.pdf
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different