The remote web server is running an outdated instance of OpenSSL and that is affected by a Man in the Middle (MitM) attack vector.
According to its banner, the version of OpenSSL on the remote host is 0.9.x prior to 0.9.6 and is affected by a flaw as X.509 certificates are not properly validated. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MitM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.
Upgrade OpenSSL to version 0.9.6 or higher