Used certificates come with serious risks
One of the risks is that of a man-in-the-middle (MitM) attack, where a valid SSL certificate for the domain would decrypt the communication between the web server and the client.
Another possibility is denial-of-service (DoS) when additional domain names are defined under the same certificate as subject alternative names. When an alternative site is no longer owned by the certificate user (also referred to as a “bygone domain”), “it is possible to revoke the certificate that has both the vulnerable alt-name and other domains. You can DoS the service if the shared certificate is still in use,”
explain the researchers.
Checking the history of a certificate was not possible before the
Certificate Transparency (CT) project launched in 2013. CT is a public framework that logs all certificates issued by public Certificate Authorities. Its database holds in excess of half a billion certificates and keeps on growing.