This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
VMware ESXi 7.0 Update 3d CCEVS-VR-VID-11249-2022 |
IBM WebSphere MQ v7.1.0.2 None |
|
---|---|---|
name | VMware ESXi 7.0 Update 3d | IBM WebSphere MQ v7.1.0.2 |
not_valid_after | 06.09.2024 | 30.01.2016 |
not_valid_before | 06.09.2022 | 30.01.2014 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-ci.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10491-vr |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10491-st |
manufacturer | VMware Inc. | IBM Corporation |
manufacturer_web | https://www.vmware.com | https://www.ibm.com |
security_level | {} | EAL2+, ALC_FLR.2 |
dgst | eea19bafd2daa311 | 2d35d282eabd7e9f |
heuristics/cert_id | CCEVS-VR-VID-11249-2022 | |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3s:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* | cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*, cpe:2.3:a:ibm:websphere_mq:7.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_extreme_scale_client:7.1.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:-:*:*:* |
heuristics/related_cves | CVE-2021-22045, CVE-2025-22225, CVE-2024-37085, CVE-2022-21123, CVE-2021-22041, CVE-2020-4005, CVE-2021-22050, CVE-2022-21166, CVE-2021-21995, CVE-2020-3964, CVE-2024-22273, CVE-2022-31699, CVE-2020-4004, CVE-2024-22254, CVE-2020-3966, CVE-2024-22253, CVE-2020-3981, CVE-2022-31705, CVE-2020-3999, CVE-2024-22255, CVE-2021-22043, CVE-2020-3968, CVE-2022-23825, CVE-2020-3963, CVE-2021-21994, CVE-2021-21974, CVE-2022-31696, CVE-2020-3965, CVE-2022-31681, CVE-2024-22252, CVE-2021-22040, CVE-2025-22226, CVE-2022-21125, CVE-2020-3969, CVE-2020-3992, CVE-2020-3970, CVE-2020-3982, CVE-2020-3962, CVE-2020-3967, CVE-2025-22224, CVE-2021-22042, CVE-2022-29901, CVE-2020-3976 | CVE-2013-6734, CVE-2016-3013, CVE-2019-4261, CVE-2014-4771, CVE-2014-0911, CVE-2017-1612, CVE-2015-0176, CVE-2016-3052, CVE-2018-1374, CVE-2019-4141, CVE-2013-3028, CVE-2012-2201, CVE-2012-3295 |
heuristics/extracted_sars | ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2, ATE_IND.1, ASE_TSS.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1 | ALC_FLR.2 |
heuristics/extracted_versions | 7.0 | 7.1.0.2 |
heuristics/protection_profiles | deb6fe6c7a4a2306, c40ae795865a0dba, e80eb1652a0e6f6a | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VIRTUALIZATION_BASE_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_SV_v1.0.pdf | {} |
pdf_data/cert_filename | st_vid11249-ci.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11249-vr.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level | ||
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto | ||
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11249-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level | ||
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/convert_ok | True | False |
state/report/download_ok | True | False |
state/report/extract_ok | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |