I can not correctly post the sample
<ReportItem>
<port>www (443/tcp)</port><severity>2</severity>
<pluginID>51192</pluginID>
<pluginName>SSL Certificate signed with an unknown Certificate Authority</pluginName>
<data>Synopsis :\n\nThe SSL certificate for this service is signed by an unknown\ncertificate authority.\n\nDescription :\n\nThe X.509 certificate of the remote host is not signed by a known\npublic
certificate authority. If the remote host is a public host in\nproduction, this nullifies the use of SSL as anyone could establish a\nman in the middle attack against the remote host.\n\nSolution :\n
\nPurchase or generate a proper certificate for this service.\n\nRisk factor :\n\nMedium / CVSS Base Score : 6.4\n(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)\n\n\nPlugin output :\n*** ERROR: Unknown root
CA in the chain:\nCountry: US\nCommon Name: 192.168.125.253\n\n\n\nCertificate chain:\n|-Country: US\n|-Common Name: 192.168.125.253\n|\n\n\n</data></ReportItem>
<ReportItem>
<port>www (443/tcp)</port><severity>2</severity>
<pluginID>26928</pluginID>
<pluginName>SSL Weak Cipher Suites Supported</pluginName>
<data>Synopsis :\n\nThe remote service supports the use of weak SSL ciphers.\n\nDescription :\n\nThe remote host supports the use of SSL ciphers that offer either weak\nencryption or no encryption at
all.\n\nNote: This is considerably easier to exploit if the attacker is on the\nsame physical network.\n\nSee also :\n\nhttp://www.openssl.org/docs/apps/ciphers.html\n\nSolution :\n\nReconfigure the
affected application if possible to avoid use of weak\nciphers.\n\nRisk factor :\n\nMedium / CVSS Base Score : 4.3\n(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n\nPlugin output :\nHere is the list of weak
SSL ciphers supported by the remote server :\n\n Low Strength Ciphers (< 56-bit key)\n SSLv3\n EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1
export \n EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export \n EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40)
Mac=MD5 export \n EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export \n TLSv1\n EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA
Enc=DES(40) Mac=SHA1 export \n EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export \n EXP-RC2-CBC-MD5 Kx=RSA(512)
Enc=DES(40) Mac=SHA1 export \n EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export \n EXP-RC2-CBC-MD5 Kx=RSA(512)
ciphername}\n Kx={key exchange}\n Au={authentication}\n Enc={symmetric encryption method}\n Mac={message authentication code}\n {export flag}\n\n\nOther references :
CWE:327,CWE:326,CWE:753,CWE:803,CWE:720\n</data></ReportItem>
<ReportItem>
<port>www (443/tcp)</port><severity>2</severity>
<pluginID>42873</pluginID>
<pluginName>SSL Medium Strength Cipher Suites Supported</pluginName>
<data>Synopsis :\n\nThe remote service supports the use of medium strength SSL ciphers.\n\nDescription :\n\nThe remote host supports the use of SSL ciphers that offer medium\nstrength encryption,
which we currently regard as those with key \nlengths at least 56 bits and less than 112 bits.\n\nNote: This is considerably easier to exploit if the attacker is on the\nsame physical network.\n\nSolution :\n
\nReconfigure the affected application if possible to avoid use of\nmedium strength ciphers.\n\nRisk factor :\n\nMedium / CVSS Base Score : 4.3\n(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n\nPlugin
output :\nHere is the list of medium strength SSL ciphers supported by the remote server :\n\n Medium Strength Ciphers (>= 56-bit and < 112-bit key)\n SSLv3\n EDH-RSA-DES-CBC-SHA
Kx=DH Au=RSA Enc=DES(56) Mac=SHA1 \n DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1 \n TLSv1\n EDH-RSA-DES-CBC-SHA
Kx=DH Au=RSA Enc=DES(56) Mac=SHA1 \n DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1 \n\nThe fields above are :\n\n {OpenSSL
ciphername}\n Kx={key exchange}\n Au={authentication}\n Enc={symmetric encryption method}\n Mac={message authentication code}\n {export flag}\n\n\n</data></ReportItem>
... View more