This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Cisco Email Security Appliance v9.1 CCEVS-VR-VID-10631-2015 |
McAfee VirusScan Enterprise v8.8 and ePolicy Orchestrator v4.5 CCEVS-VR-VID-10421-2011 |
|
---|---|---|
name | Cisco Email Security Appliance v9.1 | McAfee VirusScan Enterprise v8.8 and ePolicy Orchestrator v4.5 |
category | Network and Network-Related Devices and Systems | Other Devices and Systems |
not_valid_after | 21.03.2016 | 01.11.2014 |
not_valid_before | 18.09.2015 | 17.10.2011 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10631-ci.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10631-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10421-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10631-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10421-st.pdf |
manufacturer | Cisco Systems, Inc. | McAfee, Inc. |
manufacturer_web | https://www.cisco.com | https://www.mcafee.com/ |
security_level | {} | ALC_FLR.2, EAL2+ |
dgst | 6c2e9ef7bd27a81f | aa36b2db508ea7e7 |
heuristics/cert_id | CCEVS-VR-VID-10631-2015 | CCEVS-VR-VID-10421-2011 |
heuristics/cpe_matches | cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.0-032:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.1-036:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-028:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-036:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.1-000:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-023:*:*:*:*:*:*:* | cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.7:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.3:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.6:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.5:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan:4.5.1:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.8:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.0:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.4:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.8.0:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.8.1000:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan:4.5:*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2015-0732, CVE-2022-20664, CVE-2019-15971, CVE-2015-6291, CVE-2023-20009, CVE-2020-3447, CVE-2020-3164, CVE-2020-3133, CVE-2016-6356, CVE-2016-1423, CVE-2020-3132, CVE-2016-6406, CVE-2016-9202, CVE-2020-3134, CVE-2019-15988, CVE-2016-1480, CVE-2020-3370, CVE-2020-3137, CVE-2019-12706, CVE-2022-20960, CVE-2016-1486, CVE-2020-3181, CVE-2015-6321, CVE-2016-6372, CVE-2016-1481 | CVE-2021-3712, CVE-2017-3980, CVE-2022-0842, CVE-2022-0862, CVE-2000-1128, CVE-2022-3338, CVE-2023-5444, CVE-2021-23890, CVE-2022-0857, CVE-2021-31835, CVE-2006-5417, CVE-2021-2432, CVE-2023-5445, CVE-2013-0141, CVE-2022-0861, CVE-2021-23889, CVE-2015-0922, CVE-2020-13938, CVE-2015-0921, CVE-2021-33037, CVE-2014-2205, CVE-2012-4594, CVE-2019-3604, CVE-2015-8765, CVE-2000-0119, CVE-2015-2859, CVE-2021-2161, CVE-2022-0859, CVE-2002-2282, CVE-2021-30639, CVE-2013-4882, CVE-2021-23840, CVE-2023-3946, CVE-2009-1348, CVE-2013-0140, CVE-2021-23888, CVE-2015-8577, CVE-2021-31834, CVE-2004-0831, CVE-2022-3339, CVE-2015-4559, CVE-2020-7317, CVE-2013-4883, CVE-2022-0858 |
heuristics/extracted_sars | ATE_IND.1, AVA_VAN.1, AGD_PRE.1, AGD_OPE.1, ALC_CMS.1, ALC_CMC.1, ADV_FSP.1 | AGD_PRE.1, ALC_DEL.1, ADV_FSP.2, ADV_ARC.1, ATE_FUN.1, AGD_OPE.1, AVA_VAN.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, ADV_TDS.1, ATE_IND.2, ALC_CMS.2 |
heuristics/extracted_versions | 9.1 | 8.8, 4.5 |
heuristics/protection_profiles | ac9abe3d5c5a31f0 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf | {} |
pdf_data/cert_filename | st_vid10631-ci.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid10631-vr.pdf | st_vid10421-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10631-st.pdf | st_vid10421-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_garbage | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |