File Name:ssl_cert_wrong_host.nasl Version:1.20 Type:remote Family:General Published:4/3/2010 Updated:4/27/2020 Supported Sensors:Nessus Risk Information CVSS Score Rationale:Ssl certificate for this service is for a different host. CVSS v2 ...
The SSL certificate for this service cannot be trusted. Description The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the serve...
Update Site Binding details as below,Type: HTTPHostname: Web Site NameSSL certificate: Select the appropriate certificate from the dropdown list. List contains all installed certificates in the certificate storeclick OK to complete Step 16: Complete the Site Binding process in the IIS server Now ...
File Name:ssl_self_signed_certificate.nasl Version:1.6 Type:remote Family:General Published:1/17/2012 Updated:6/14/2022 Supported Sensors:Nessus Risk Information CVSS Score Rationale:Score based on an analysis of the vulnerability by tenable. ...
Solution Purchase or generate a new SSL certificate to replace the existing one. Plugin Details Severity:Medium ID:15901 File Name:ssl_cert_expiry.nasl Version:1.50 Type:remote Family:General Published:12/3/2004 Updated:2/3/2021 Supported Sensors:Nessus ...
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with ...
The remote service uses an SSL certificate that has been signed using a cryptographically weak hashing algorithm - MD2. These algorithms are known to be vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this weakness to generate another certificate with the ...
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. Description At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/...
The remote server uses an SSL/TLS certificate that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the...
Synopsis The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 1024 bits. Description At least one of the X.509 certificates sent by the remote host has a key that is shorter than 1024 bits. Such keys are considered weak due to advances in availab...