Invicti detected that an intermediate certificate in the certificate chain is signed using a weak signature algorithm.
The weak signature algorithm is known to be cryptographically weak and vulnerable to collision attacks.
You can search and find all vulnerabilities
Dead accurate, fast & easy-to-use Web Application Security Scanner
Invicti Security Corp 220 Industrial Blvd Ste 102 Austin, TX 78745
© Invicti 2022