Intermediate Certificate is Signed Using a Weak Signature Algorithm Severity: Information Summary# Invicti detected that an intermediate certificate in the certificate chain is signed using a weak signature algorithm. The weak signature algorithm is known to be cryptographically weak and vulnerable to collision attacks. Classifications# OWASP 2017-A3, CAPEC-459, ISO27001-A.10, OWASP 2013-A6, WASC-4 Vulnerability Index You can search and find all vulnerabilities Select Category Critical High Medium Low Best Practice Information OR Search Vulnerability Tags OWASP 2013-A6 OWASP 2017-A3 Related Vulnerabilities Out of Band Code Execution via SSTI (Python Jinja) Code Evaluation (Perl) Web Cache Deception Out of Band Code Evaluation (Ruby) Code Execution via SSTI (Python Jinja)