Build precise queries to find exactly what you need
Press ESC to close
Nagios World Conference 2026: Sept. 14-17 in St. Paul, MN | Learn More
Your review has been submitted and is pending approval.
This plugin checks if a webserver has been patched for the SSLv3 POODLE vulnerability. (CVE-2014-3566)
Current Version
1.0
Last Release Date
October 27, 2014
Owner
Gerhard Lausser
Download URL
http://labs.consol.de/download/shinken-nagios-plugins/check_poodle
License
GPL
Compatible With
$ check_poodle –hostname www.google.com CRITICAL – Established SSLv3 connection using cipher RC4-SHA. Vulnerable! $ check_poodle –hostname www.yahoo.com CRITICAL – Established SSLv3 connection using cipher RC4-SHA. Vulnerable! $ check_poodle –hostname www.exchange.nagios.org OK – Could not establish ssl connection. Not vulnerable $ check_poodle –hostname exchange.nagios.org OK – Could not establish ssl connection. Not vulnerable $ check_poodle –hostname www.twitter.com OK – Could not establish ssl connection. Not vulnerable $ check_poodle –hostname labs.consol.de OK – Could not establish ssl connection. Not vulnerable
You must be logged in to submit a review.
To:
From: