Deep SSL/TLS Vulnerability Test
This report provides a deep analysis of the SSL/TLS configuration of www.uwe-henze.de. It checks for protocol support, cipher strength, and known vulnerabilities.
Scan Results
Start 2026-05-05 14:55:04 -->> 217.91.54.44:443 (www.uwe-henze.de) <<-- rDNS (217.91.54.44): pd95b362c.dip0.t-ipconnect.de. Service detected: HTTP Testing for server implementation bugs No bugs found. Testing HTTP header response @ "/" HTTP Status Code 302 Found, redirecting to "https://www.uwe-henze.de/catalog/" HTTP clock skew +256 sec from localtime Strict Transport Security not offered Public Key Pinning -- Server banner Apache/2.2.11 (Unix) DAV/2 mod_ssl/2.2.11 OpenSSL/0.9.8k PHP/5.2.9 mod_apreq2-20051231/2.6.0 mod_perl/2.0.4 Perl/v5.10.0 Application banner X-Powered-By: PHP/5.2.9 Cookie(s) (none issued at "/") -- maybe better try target URL of 30x Security headers -- Reverse Proxy banner -- Testing vulnerabilities Secure Renegotiation (RFC 5746) Not supported / VULNERABLE (NOT ok) Secure Client-Initiated Renegotiation VULNERABLE (NOT ok), DoS threat (10 attempts) CRIME, TLS (CVE-2012-4929) not vulnerable (OK) BREACH (CVE-2013-3587) no gzip/deflate/compress/br HTTP compression (OK) - only supplied "/" tested POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention NOT supported and vulnerable to POODLE SSL SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers for SSLv2 and above FREAK (CVE-2015-0204) VULNERABLE (NOT ok), uses EXPORT RSA ciphers DROWN (CVE-2016-0800, CVE-2016-0703) VULNERABLE (NOT ok), SSLv2 offered with 7 ciphers Make sure you don't use this certificate elsewhere, see: https://search.censys.io/search?resource=hosts&virtual_hosts=INCLUDE&q=CD33DBC74509ABF7CBCDD604A8D98855365BECA9DFAC830A3C09DB503C0DA4E5 LOGJAM (CVE-2015-4000), experimental VULNERABLE (NOT ok): uses DH EXPORT ciphers VULNERABLE (NOT ok): common prime: mod_ssl 2.2.x/1024-bit MODP group with safe prime modulus (1024 bits) BEAST (CVE-2011-3389) SSL3: DHE-RSA-AES256-SHA AES256-SHA DHE-RSA-AES128-SHA AES128-SHA IDEA-CBC-SHA EDH-RSA-DES-CBC3-SHA DES-CBC3-SHA EDH-RSA-DES-CBC-SHA DES-CBC-SHA EXP-EDH-RSA-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 TLS1: DHE-RSA-AES256-SHA AES256-SHA DHE-RSA-AES128-SHA AES128-SHA IDEA-CBC-SHA EDH-RSA-DES-CBC3-SHA DES-CBC3-SHA EDH-RSA-DES-CBC-SHA DES-CBC-SHA EXP-EDH-RSA-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 VULNERABLE -- and no higher protocols as mitigation supported LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses obsolete cipher block chaining ciphers with TLS, see server prefs. Winshock (CVE-2014-6321), experimental not vulnerable (OK) - doesn't seem to be IIS 8.x RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): RC4-SHA RC4-MD5 RC4-MD5 EXP-RC4-MD5 EXP-RC4-MD5 Done 2026-05-05 14:57:10 [ 137s] -->> 217.91.54.44:443 (www.uwe-henze.de) <<--
About this Scan
This scan uses testssl.sh to check for:
- Protocols: SSLv2, SSLv3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3
- Vulnerabilities: Heartbleed, POODLE, FREAK, Logjam, DROWN, etc.
- Cipher Suites: Weak ciphers, perfect forward secrecy (PFS) support.