Summary
Acunetix 360 detected that an intermediate certificate in the certificate chain is signed using a weak signature algorithm.
The weak signature algorithm is known to be cryptographically weak and vulnerable to collision attacks.
Acunetix 360 detected that an intermediate certificate in the certificate chain is signed using a weak signature algorithm.
The weak signature algorithm is known to be cryptographically weak and vulnerable to collision attacks.