Previous  bell    Next
bell Warning: JavaScript is turned off! Some features on this website will not work without it.

Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit

The test below (shown in red) will take a few seconds to determine if your web browser is vulnerable to the SSLv3 or POODLE exploit. Please note that JavaScript must be enabled in order for the test to work. Although SSLv3 (SSL version 3) is very old and was replaced with Transport Layer Security (TLS), it is still being widely used today.
Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit
Online Threat Alerts

Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit


Rating - Thumb up Rating - Thumb down 0   
Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit

The test below (shown in red) will take a few seconds to determine if your web browser is vulnerable to the SSLv3 or POODLE exploit. Please note that JavaScript must be enabled in order for the test to work. Although SSLv3 (SSL version 3) is very old and was replaced with Transport Layer Security (TLS), it is still being widely used today.

Please continue reading below.

>> Checking for vulnerability, please wait... If this message doesn't change after a minute, please click your browser's Refresh button.

What is the SSLv3 or POODLE exploit?

POODLE stands for Padding Oracle On Downgraded Legacy Encryption, and is a vulnerability that exploits a design flaw in SSLv3 (SSL version 3) that was created in 1996 to secure or encrypt data transmitted from one computer or device to another. The flaw or exploit allows secured or encrypted data being transmitted between two computers or devices, to be decrypted by someone other than the two computers or devices that are transmitting the data.

In other words, the exploit can allow someone to view the secured information that is being sent and received between your computer and another website. For more information please click here.

For information about protecting your web browser against the SSLv3 or POODLE exploit, please click here.

For more information about checking your web browser for the SSL 3 or POODLE vulnerability, please go to https://www.poodletest.com/

Remember to leave your question or comment, and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: info@onlinethreatalerts.com .

Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (0)