BACKRONYM.FAIL SERVER
We revealed that a single page on backronym.fail took three hundred and twenty-four milliseconds to stream. We could not detect a SSL certificate, so in conclusion our parsers consider this site not secure.
Internet Protocol
216.239.32.21
BROWSER IMAGE

SERVER OS
We discovered that backronym.fail is utilizing the Google Frontend server.HTML TITLE
The BACKRONYM VulnerabilityDESCRIPTION
The BACKRONYM VulnerabilityPARSED CONTENT
The site states the following, "A new and serious vulnerability has been identified in a popular software library." We noticed that the web site also said " How do we know its serious? Because the vulnerability has a clever name, sweet logo, and as much hype as we can generate from a single web page." It also stated " This vulnerability is known as BACKRONYM. And affects Oracles popular MySQL database software. The BACKRONYM vulnerability allows for an attacker to downgrade and snoop on the SSLTLS connection that MySQL client libraries use to communicate to a MySQL server."