This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
H3C Switch Series version 1.0 2022-49-INF-4218 |
IBM WebSphere Application Server V5.0.2.8 CCEVS-VR-0082-2004 |
|
---|---|---|
name | H3C Switch Series version 1.0 | IBM WebSphere Application Server V5.0.2.8 |
category | Network and Network-Related Devices and Systems | Databases |
scheme | ES | US |
status | active | archived |
not_valid_after | 08.11.2029 | 06.09.2012 |
not_valid_before | 08.11.2024 | 02.12.2004 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-49_Certificado.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-49-INF-4218.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4023-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-49-ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4023-st.pdf |
manufacturer | H3C Technologies Co. Ltd. | IBM Corporation |
manufacturer_web | https://www.h3c.com | https://www.ibm.com |
security_level | PP | EAL2+, ALC_FLR.1 |
dgst | b4d32b055d6199cc | fa1ab0672250550e |
heuristics/cert_id | 2022-49-INF-4218 | CCEVS-VR-0082-2004 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:a:ibm:websphere_application_server:5.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_application_server:5.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_application_server:5.0.2.8:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2010-0769, CVE-2006-4222, CVE-2006-2435, CVE-2006-2431, CVE-2007-3262, CVE-2008-2221, CVE-2008-4284, CVE-2008-5411, CVE-2008-5413, CVE-2006-4136, CVE-2011-1318, CVE-2011-1316, CVE-2009-1898, CVE-2009-1900, CVE-2005-2091, CVE-2012-2162, CVE-2006-1093, CVE-2007-4833, CVE-2008-0740, CVE-2009-0504, CVE-2005-1872, CVE-2010-0770, CVE-2007-5799, CVE-2013-0542, CVE-2011-1311, CVE-2006-5324, CVE-2006-7166, CVE-2011-1314, CVE-2006-5323, CVE-2006-2432, CVE-2005-3498, CVE-2010-3271, CVE-2006-2430, CVE-2009-1899, CVE-2008-0741, CVE-2006-3232, CVE-2007-3264, CVE-2005-4834, CVE-2007-5798, CVE-2011-1315, CVE-2006-2436, CVE-2007-3960, CVE-2009-1901, CVE-2006-4223, CVE-2011-1307, CVE-2007-3263, CVE-2007-6679, CVE-2007-3265, CVE-2008-4283, CVE-2005-1112, CVE-2007-1608, CVE-2007-1944, CVE-2008-0389, CVE-2010-0768, CVE-2005-0425, CVE-2008-2550, CVE-2006-3231, CVE-2011-1309, CVE-2011-1308 |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1 | ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions | 1.0 | 5.0.2.8 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | 89f2a255423f4a20 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf | {} |
pdf_data/cert_filename | 2022-49_Certificado.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 2022-49-INF-4218.pdf | st_vid4023-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 2022-49-ST.pdf | st_vid4023-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |