Previous    Next
Warning: JavaScript is turned off! Some features on this website will not work without it.

Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit

Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit

The test below (shown in red) will take a few seconds to determine if your web browser is vulnerable to the SSLv3 or POODLE exploit. Please note that JavaScript must be enabled in order for the test to work. Although SSLv3 (SSL version 3) is very old and was replaced with Transport Layer Security (TLS), it is still being widely used today.

Please continue reading below.

>> Checking for vulnerability, please wait... If this message doesn't change after a minute, please click your browser's Refresh button.

What is the SSLv3 or POODLE exploit?

POODLE stands for Padding Oracle On Downgraded Legacy Encryption, and is a vulnerability that exploits a design flaw in SSLv3 (SSL version 3) that was created in 1996 to secure or encrypt data transmitted from one computer or device to another. The flaw or exploit allows secured or encrypted data being transmitted between two computers or devices, to be decrypted by someone other than the two computers or devices that are transmitting the data.

In other words, the exploit can allow someone to view the secured information that is being sent and received between your computer and another website. For more information please click here.

For information about protecting your web browser against the SSLv3 or POODLE exploit, please click here.

For more information about checking your web browser for the SSL 3 or POODLE vulnerability, please go to https://www.poodletest.com/

Please share with us what you know or ask a question about this article, by leaving a comment below. And, forward malicious email messages to us using the following email address: info@onlinethreatalerts.com .

Tell us if you LIKE this article by clicking the following thumbs-up, or click the thumbs-down if you dislike it:

       Rating - Thumb up          Rating - Thumb down 0   
Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (0)