Author Topic: Another SSL Certification glitch...  (Read 1513 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Another SSL Certification glitch...
« on: July 08, 2016, 10:09:31 PM »
See: https://www.eff.org/https-everywhere/atlas/domains/omeda.com.html
Secure calls made to other websites:
-netdna.bootstrapcdn.com is valid and secure.

-fonts.googleapis.com is valid and secure.

-www.google.com returned an error (Possibly 404 not found or other webserver error. Details:

-fonts.gstatic.com is valid and secure.

www3.omeda.com

Please contact the Certificate Authority for further verification.
You have 1 error
Certificates installed in the wrong order.
Some certificates in the chain are installed in the wrong order. See details below. Reinstall the certificates in the proper order.
Warnings
Root installed on the server.
For best practices, remove the self-signed root from the server.
Info
BEAST
The BEAST attack is not mitigated on this server.
Certificate information
This server uses a Domain Validated (DV) certificate. No information about the site owner has been validated. Data is protected, but exchanging personal or financial information is not recommended.
Common name:
 *.omeda.com
SAN:
 *.omeda.com, *.omedastaging.com, omedamail.com
Valid from:
 2015-Jul-20 00:00:00 GMT
Valid to:
 2016-Jul-16 23:59:59 GMT
Certificate status:
 Valid
Revocation check method:
 OCSP
Organization:
 
Organizational unit:
 PositiveSSL Multi-Domain,Domain Control Validated
City/locality:
 
State/province:
 
Country:
 
Certificate Transparency:
 Not embedded in certificate
Serial number:
 8c43adde540a5fdc7d68ac2c4799a9a1
Algorithm type:
 SHA256withRSA
Key size:
 2048
Certificate chainShow details
SSL.com DV CAIntermediate certificate
USERTrust RSA Certification AuthorityIntermediate certificate
AddTrust External CA RootRoot certificate
*.omeda.comTested certificat

jQuery libraries to be retired: -https://www3.omeda.com/
Detected libraries:
jquery-migrate - 1.2.1 : -https://www3.omeda.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : (active1) -https://www3.omeda.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected

Re: http://toolbar.netcraft.com/site_report?url=https://www3.omeda.com

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!