Build precise queries to find exactly what you need
Press ESC to close
Your review has been submitted and is pending approval.
This plugin checks if a webserver has been patched for the SSLv3 POODLE vulnerability. (CVE-2014-3566)
Current Version
1.0
Last Release Date
October 27, 2014
Owner
Gerhard Lausser
Download URL
http://labs.consol.de/download/shinken-nagios-plugins/check_poodle
License
GPL
Compatible With
$ check_poodle --hostname www.google.com CRITICAL - Established SSLv3 connection using cipher RC4-SHA. Vulnerable! $ check_poodle --hostname www.yahoo.com CRITICAL - Established SSLv3 connection using cipher RC4-SHA. Vulnerable! $ check_poodle --hostname www.exchange.nagios.org OK - Could not establish ssl connection. Not vulnerable $ check_poodle --hostname exchange.nagios.org OK - Could not establish ssl connection. Not vulnerable $ check_poodle --hostname www.twitter.com OK - Could not establish ssl connection. Not vulnerable $ check_poodle --hostname labs.consol.de OK - Could not establish ssl connection. Not vulnerable
You must be logged in to submit a review.
To:
From:
We’ve completely redesigned the world’s largest repository of Nagios plugins and monitoring tools. Join thousands of users sharing monitoring solutions for servers, applications, and everything in between.
Due to our redesign, all existing accounts require a password reset to access your account again.
Ready to explore 6,100+ projects and contribute to the community?
Reset Password Create Account
Happy Monitoring!