TLS 1.1 enabled


During the scan, Kayran managed to find that the web server supports encryption through TLS 1.1.
When aiming for PCI or DSS, it is recommended to use a newer version : TLS 1.3.

An attacker might be able to exploit this vulnerability to conduct MITM (Man-In-The-Middle) attacks and decrypt the traffic that takes place between the affected services and the customers.


CVSS Version 3.x – 8.2 High


In order to prevent this vulnerability, make sure that you disable TLS 1.1 and replace it with the newer version of TLS 1.3.
Always do your best to make sure it’s updated to the latest release.


< Return to all Vulnerabilities

Red Team

You’ve probably heard that there are teams in the Cyber field called Red Team and Blue Team. Let’s talk about the red one, shall we?

Read More »


You must have once wondered what HTTP means and what is the difference between that ugly word to HTTPS, and if not, then please read

Read More »

HAR Files

In this article, I’ll talk and explain about HAR Files, so if you don’t know what they are, or, what do we use them for,

Read More »

Explaining API

We’ve talked about API’s Vulnerability in here, but i feel like there’s much more to talk about and explain since this is a big and

Read More »