Looking for the vulnerability index of Invicti's legacy products?
Certificate is Signed Using a Weak Signature Algorithm - Vulnerability Database

Certificate is Signed Using a Weak Signature Algorithm

Description

Invicti detected that a certificate is signed using a weak signature algorithm.

The weak signature algorithm is known to be cryptographically weak and vulnerable to collision attacks.

Remediation

<p><span>You'll need to generate a new certificate request, and get your CA to issue you a new certificate using SHA-2.</span></p>