Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
None
name Cisco Web Security Appliance with AsyncOS 11.8 SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
category Network and Network-Related Devices and Systems Operating Systems
scheme CA DE
status active archived
not_valid_after 21.05.2027 01.09.2019
not_valid_before 21.05.2022 13.10.2005
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0292a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0292b.pdf
manufacturer Cisco Systems, Inc. SUSE Linux Products Gmbh
manufacturer_web https://www.cisco.com https://www.suse.com/
security_level {} EAL3+, ALC_FLR.3
dgst 68a4bb5619d6b24a b8bea9a6818066d3
heuristics/cert_id 567-LSS
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2004-0587, CVE-2005-0207, CVE-2010-4342, CVE-2005-3146, CVE-2005-3147, CVE-2004-1092, CVE-2004-0688, CVE-2009-2903, CVE-2004-0746, CVE-2004-1176, CVE-2004-1142, CVE-2004-0867, CVE-1999-0405, CVE-2009-2408, CVE-2004-1072, CVE-2004-1174, CVE-2004-1071, CVE-2004-0064, CVE-2004-1070, CVE-2004-1154, CVE-2006-2752, CVE-2005-0398, CVE-2007-5000, CVE-2005-0085, CVE-2005-4790, CVE-2009-2625, CVE-2004-0886, CVE-2009-3231, CVE-2010-4158, CVE-2004-0936, CVE-2004-0687, CVE-2010-3848, CVE-2004-0803, CVE-2004-0991, CVE-2004-1074, CVE-2010-4258, CVE-2005-0005, CVE-2005-0156, CVE-2004-0940, CVE-2005-0639, CVE-1999-0234, CVE-2004-0903, CVE-2011-0762, CVE-2004-0802, CVE-2004-0866, CVE-2004-1090, CVE-2000-0438, CVE-2004-0957, CVE-2004-0914, CVE-2005-4772, CVE-2010-1205, CVE-2004-1491, CVE-2004-1175, CVE-2010-3442, CVE-2010-3849, CVE-2004-0461, CVE-2010-3702, CVE-2010-2249, CVE-2010-2941, CVE-2004-1184, CVE-2005-0750, CVE-2009-0115, CVE-2010-0205, CVE-2006-2703, CVE-2004-0827, CVE-2004-0933, CVE-2009-0040, CVE-2004-1895, CVE-2005-0638, CVE-2004-0817, CVE-2008-3949, CVE-2004-0554, CVE-2008-5021, CVE-2004-0902, CVE-2010-4081, CVE-2005-4788, CVE-2010-4180, CVE-2004-0535, CVE-2009-2910, CVE-2004-1237, CVE-2010-3850, CVE-2010-3067, CVE-2004-2097, CVE-2004-0888, CVE-2004-2658, CVE-2010-4072, CVE-2004-1096, CVE-2004-0947, CVE-2010-4164, CVE-2010-4073, CVE-2005-3321, CVE-2007-4074, CVE-2009-2698, CVE-2010-3876, CVE-2004-1191, CVE-2011-4862, CVE-2004-1139, CVE-2010-4083, CVE-2000-0218, CVE-2005-1043, CVE-2004-1091, CVE-2004-0956, CVE-2009-3095, CVE-2004-0935, CVE-2007-6427, CVE-2005-0373, CVE-2009-2848, CVE-2004-1145, CVE-2007-4393, CVE-2005-0206, CVE-2004-0949, CVE-2005-1767, CVE-2004-0883, CVE-2008-1375, CVE-2004-0889, CVE-2004-0807, CVE-2004-0460, CVE-2010-3873, CVE-2004-1190, CVE-2004-1235, CVE-2004-1170, CVE-2009-0949, CVE-2004-0981, CVE-2000-0361, CVE-2004-1005, CVE-2005-3298, CVE-2005-3297, CVE-2005-0605, CVE-2005-0337, CVE-2004-1093, CVE-2005-3148, CVE-2013-4002, CVE-2006-0803, CVE-2005-4789, CVE-2005-0470, CVE-2004-1073, CVE-2004-0934, CVE-2007-0460, CVE-2007-6167, CVE-2003-1295, CVE-2005-3322, CVE-2004-0937, CVE-2005-0384, CVE-1999-0746, CVE-2009-1955, CVE-2004-0497, CVE-2004-0905, CVE-2010-3437, CVE-2004-0932, CVE-2004-1009, CVE-2005-1761, CVE-2010-4160, CVE-2004-0990, CVE-2007-2654, CVE-2004-0495, CVE-2010-4157, CVE-2004-1098, CVE-2004-0626, CVE-2005-2023, CVE-2004-0929, CVE-2004-1004, CVE-2009-2416
heuristics/extracted_sars {} ALC_FLR.3
heuristics/extracted_versions 11.8 4, 9, 2
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 89f2a255423f4a20 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf {}
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf 0292a.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf 0292b.pdf
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different