Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
Juniper Networks JUNOSĀ® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
383-4-188
name Cisco Web Security Appliance with AsyncOS 11.8 Juniper Networks JUNOSĀ® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
status active archived
not_valid_after 21.05.2027 19.04.2018
not_valid_before 21.05.2022 10.08.2012
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf
manufacturer Cisco Systems, Inc. Juniper Networks, Inc.
manufacturer_web https://www.cisco.com https://www.juniper.net/
security_level {} EAL3+, ALC_FLR.3
dgst 68a4bb5619d6b24a 8e96ae99530fca1d
heuristics/cert_id 567-LSS 383-4-188
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2019-0036, CVE-2022-22214, CVE-2024-30380, CVE-2022-22244, CVE-2022-22208, CVE-2014-3818, CVE-2021-31372, CVE-2024-39549, CVE-2024-39511, CVE-2023-28962, CVE-2023-44182, CVE-2024-39514, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2014-0613, CVE-2023-28979, CVE-2014-0615, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2022-22241, CVE-2013-4686, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22181, CVE-2022-22163, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2014-2712, CVE-2022-22162, CVE-2022-22238, CVE-2004-0230, CVE-2023-28963, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2014-0616, CVE-2013-6014, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22245, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2023-22395, CVE-2022-22246, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2023-44176
heuristics/extracted_sars {} ALC_FLR.3
heuristics/extracted_versions 11.8 10.4
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 89f2a255423f4a20 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf {}
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf 383-4-188 CR v1.0e.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf 383-4-188 ST v2.2.pdf
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different