Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
SUSE Linux Enterprise Server Version 12
None
name Cisco Web Security Appliance with AsyncOS 11.8 SUSE Linux Enterprise Server Version 12
category Network and Network-Related Devices and Systems Operating Systems
scheme CA DE
status active archived
not_valid_after 21.05.2027 24.02.2021
not_valid_before 21.05.2022 24.02.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0962a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0962b_pdf.pdf
manufacturer Cisco Systems, Inc. SUSE LLC
manufacturer_web https://www.cisco.com https://www.suse.com
security_level {} EAL4+, ALC_FLR.3
dgst 68a4bb5619d6b24a 6bc623917fc5cad1
heuristics/cert_id 567-LSS
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2015-8778, CVE-2014-9584, CVE-2015-8779, CVE-2016-1693, CVE-2014-7169, CVE-2014-2494, CVE-2016-2799, CVE-2016-3715, CVE-2016-1678, CVE-2020-6428, CVE-2016-1703, CVE-2015-2695, CVE-2014-9761, CVE-2015-4495, CVE-2015-5154, CVE-2016-2324, CVE-2018-12116, CVE-2014-6464, CVE-2014-8160, CVE-2015-0382, CVE-2015-7976, CVE-2016-1680, CVE-2015-8126, CVE-2020-15705, CVE-2016-1690, CVE-2014-4287, CVE-2016-9957, CVE-2015-4000, CVE-2016-1676, CVE-2016-1961, CVE-2016-2793, CVE-2021-45082, CVE-2014-6474, CVE-2016-1694, CVE-2015-5239, CVE-2016-8568, CVE-2016-0651, CVE-2014-6469, CVE-2016-1286, CVE-2015-2697, CVE-2016-1677, CVE-2016-1285, CVE-2016-1974, CVE-2015-3340, CVE-2016-2802, CVE-2016-1654, CVE-2019-18902, CVE-2020-6424, CVE-2014-6478, CVE-2018-19052, CVE-2014-6496, CVE-2016-2792, CVE-2015-0391, CVE-2015-6855, CVE-2014-9854, CVE-2015-4902, CVE-2015-0381, CVE-2020-5504, CVE-2015-4106, CVE-2016-1700, CVE-2016-1698, CVE-2020-15706, CVE-2014-4260, CVE-2016-1692, CVE-2016-2315, CVE-2016-2794, CVE-2016-2790, CVE-2014-3673, CVE-2016-2798, CVE-2011-3172, CVE-2016-0668, CVE-2014-6463, CVE-2016-1689, CVE-2016-1685, CVE-2015-0272, CVE-2015-5006, CVE-2015-2737, CVE-2020-6449, CVE-2016-1699, CVE-2016-2791, CVE-2010-5298, CVE-2014-7815, CVE-2016-1682, CVE-2016-7966, CVE-2015-2590, CVE-2016-8569, CVE-2018-12122, CVE-2016-2796, CVE-2018-16873, CVE-2016-2795, CVE-2021-41817, CVE-2015-5300, CVE-2016-5118, CVE-2015-1283, CVE-2016-1695, CVE-2016-1651, CVE-2015-3209, CVE-2016-1697, CVE-2016-1687, CVE-2018-16874, CVE-2015-0192, CVE-2016-2801, CVE-2016-0264, CVE-2023-29552, CVE-2014-6555, CVE-2016-0718, CVE-2020-6426, CVE-2020-14147, CVE-2014-6559, CVE-2016-1672, CVE-2014-6505, CVE-2020-6429, CVE-2014-9585, CVE-2016-1701, CVE-2016-5325, CVE-2016-1681, CVE-2014-6551, CVE-2015-1241, CVE-2015-2808, CVE-2016-1691, CVE-2015-2696, CVE-2020-6422, CVE-2019-18903, CVE-2014-2978, CVE-2016-1674, CVE-2019-15624, CVE-2014-6564, CVE-2015-7547, CVE-2016-9959, CVE-2016-2800, CVE-2021-4166, CVE-2019-18901, CVE-2014-6271, CVE-2016-5131, CVE-2014-6520, CVE-2015-8776, CVE-2015-0432, CVE-2014-6494, CVE-2016-1960, CVE-2014-6568, CVE-2016-2782, CVE-2020-15707, CVE-2014-3470, CVE-2016-5244, CVE-2016-1688, CVE-2016-3714, CVE-2016-9958, CVE-2016-1653, CVE-2021-41819, CVE-2016-2797, CVE-2002-20001, CVE-2015-8567, CVE-2016-1964, CVE-2014-6530, CVE-2016-2806, CVE-2019-18897, CVE-2016-7099, CVE-2015-0374, CVE-2016-0642, CVE-2015-5041, CVE-2014-4258, CVE-2014-6495, CVE-2016-3718, CVE-2016-1656, CVE-2016-1702, CVE-2015-2738, CVE-2014-9116, CVE-2014-0198, CVE-2016-1652, CVE-2016-1977, CVE-2014-0221, CVE-2016-1659, CVE-2016-1683, CVE-2016-1655, CVE-2016-1679, CVE-2014-6507, CVE-2016-1675, CVE-2015-2734, CVE-2016-1602, CVE-2014-6484, CVE-2014-2977, CVE-2020-8013, CVE-2014-4207, CVE-2016-1673, CVE-2016-1686, CVE-2016-2178, CVE-2020-6427, CVE-2016-3427, CVE-2016-2807, CVE-2016-1696
heuristics/extracted_sars {} ALC_FLR.3
heuristics/extracted_versions 11.8 12
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 89f2a255423f4a20 70cdc8b0cf910af7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf 0962a_pdf.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf 0962b_pdf.pdf
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different