Another check on Bitdefender's at /www.digicert.com:
DNS resolves '
www.wdc1.vdc.bitdefender.net' to 184.173.143.50
HTTP Server Header: Apache
Heartbleed Vulnerability
This server is not vulnerable to the Heartbleed Bug.
Protocol Support
TLS 1.2, TLS 1.1, TLS 1.0, SSL 3.0
SSL 3.0 is an outdated protocol version with known vulnerabilities. This should be fixed.
SSL certificate
Common Name = -www.wdc1.vdc.bitdefender.net
Issuer = -www.wdc1.vdc.bitdefender.net
Serial Number = 2DD3
SHA1 Thumbprint = 7D24AD78188015088D7FDCD70E6C53BFE655D618
Key Length = 1024 bit
Signature algorithm = SHA1 + RSA (good)
Secure Renegotiation: Supported
This certificate does not use a vulnerable Debian key (this is good)
SSL Certificate has not been revoked
OCSP Staple: Not Enabled
OCSP Origin: Not Enabled
CRL Status: Not Enabled
SSL Certificate is expired.
The certificate was valid from 04/01/2012 through 04/01/2013.
Certificate Name matches -www.wdc1.vdc.bitdefender.net
Subject -www.wdc1.vdc.bitdefender.net
Valid from 01/Apr/2012 to 01/Apr/2013
Issuer -www.wdc1.vdc.bitdefender.net
SSL Certificate is not trusted
The certificate is not signed by a trusted authority (checking against Mozilla's root store). If you bought the certificate from a trusted authority, you probably just need to install one or more Intermediate certificates. Contact your certificate provider for assistance doing this for your server platform.
polonus