Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
None
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39)
None
name Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39)
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_39fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_39fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_39_fr.pdf
dgst e5bae93bf2719158 a2effca18709d4c6
heuristics/cpe_matches cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2024-44240, CVE-2024-40788, CVE-2024-40787, CVE-2024-40813, CVE-2024-27810, CVE-2024-44185, CVE-2024-44198, CVE-2024-54502, CVE-2024-44232, CVE-2024-27821, CVE-2024-44171, CVE-2024-40799, CVE-2024-40774, CVE-2024-27838, CVE-2024-27880, CVE-2024-44183, CVE-2024-27884, CVE-2024-40789, CVE-2024-40779, CVE-2024-44194, CVE-2024-44234, CVE-2024-44274, CVE-2024-40857, CVE-2024-40805, CVE-2024-54486, CVE-2024-40829, CVE-2024-44239, CVE-2024-40815, CVE-2024-54513, CVE-2024-40793, CVE-2024-54534, CVE-2024-27811, CVE-2024-44176, CVE-2024-40824, CVE-2024-40784, CVE-2024-40785, CVE-2024-27816, CVE-2024-40822, CVE-2024-54500, CVE-2024-40782, CVE-2024-44255, CVE-2024-44155, CVE-2024-44269, CVE-2024-40777, CVE-2024-27830, CVE-2024-44212, CVE-2024-44233, CVE-2024-23251, CVE-2024-54526, CVE-2024-27801, CVE-2024-27863, CVE-2024-54505, CVE-2024-54508, CVE-2024-44215, CVE-2024-44285, CVE-2024-54514, CVE-2024-27804, CVE-2024-40835, CVE-2024-40850, CVE-2024-27832, CVE-2024-44278, CVE-2024-27840, CVE-2024-27800, CVE-2024-54510, CVE-2024-27808, CVE-2024-40795, CVE-2024-54538, CVE-2024-44290, CVE-2024-40776, CVE-2024-27823, CVE-2024-44144, CVE-2024-27834, CVE-2024-54501, CVE-2024-44282, CVE-2024-23282, CVE-2024-44187, CVE-2024-44296, CVE-2024-44244, CVE-2024-40818, CVE-2024-27805, CVE-2024-44225, CVE-2024-44254, CVE-2024-44169, CVE-2024-40806, CVE-2024-44273, CVE-2024-27815, CVE-2024-27814, CVE-2024-44191, CVE-2024-40780, CVE-2024-27806, CVE-2024-27851, CVE-2024-44297, CVE-2024-44170, CVE-2024-54494, CVE-2024-40812, CVE-2024-27820, CVE-2024-40809, CVE-2024-54479, CVE-2024-27826, CVE-2024-40836, CVE-2024-44302, CVE-2024-27828, CVE-2024-54535, CVE-2024-54527 {}
heuristics/extracted_versions 10.4 17.4
heuristics/scheme_data