»

Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit

 +
Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit

Would you share this article with others to help inform them?

The link to the test below will take a few seconds to determine if your web browser is vulnerable to the SSLv3 or POODLE exploit. Please note that JavaScript must be enabled in order for the test to work. Although SSLv3 (SSL version 3) is very old and was replaced with Transport Layer Security (TLS), it is still being widely used today.

What is the SSLv3 or POODLE exploit?

POODLE stands for Padding Oracle On Downgraded Legacy Encryption and is a vulnerability that exploits a design flaw in SSLv3 (SSL version 3) that was created in 1996 to secure or encrypt data transmitted from one computer or device to another. The flaw or exploit allows secured or encrypted data being transmitted between two computers or devices, to be decrypted by someone other than the two computers or devices that are transmitting the data.

In other words, the exploit can allow someone to view the secured information that is being sent and received between your computer and another website. For more information please click here.

To check your web browser for the SSL 3 or POODLE vulnerability, please click the following link: https://www.poodletest.com/

For information about protecting your web browser against the SSLv3 or POODLE exploit, please click here.

Note: Some of the names, addresses, email addresses and telephone numbers in email samples on this website may have been impersonated.

Please share what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

You can help maintain Online Threat Alerts by paying a service fee. Click here to make payment.

Comments, Questions, Answers, or Reviews
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. Also, anonymous posts cannot be deleted or edited, and when you make a post, we will use your IP address to display your approximate location to other users.

Write Your Comment, Question, Answer, or Review
Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.

Check Your Web Browser for the SSLv3 POODLE Vulnerability or Exploit