Build precise queries to find exactly what you need
Press ESC to close
Join our next live webinar: “Advanced Nagios Monitoring Techniques” – Register Now
Your review has been submitted and is pending approval.
This plugin checks if a webserver has been patched for the SSLv3 POODLE vulnerability. (CVE-2014-3566)
Current Version
1.0
Last Release Date
October 27, 2014
Owner
Gerhard Lausser
Download URL
http://labs.consol.de/download/shinken-nagios-plugins/check_poodle
License
GPL
Compatible With
$ check_poodle --hostname www.google.com CRITICAL - Established SSLv3 connection using cipher RC4-SHA. Vulnerable! $ check_poodle --hostname www.yahoo.com CRITICAL - Established SSLv3 connection using cipher RC4-SHA. Vulnerable! $ check_poodle --hostname www.exchange.nagios.org OK - Could not establish ssl connection. Not vulnerable $ check_poodle --hostname exchange.nagios.org OK - Could not establish ssl connection. Not vulnerable $ check_poodle --hostname www.twitter.com OK - Could not establish ssl connection. Not vulnerable $ check_poodle --hostname labs.consol.de OK - Could not establish ssl connection. Not vulnerable
You must be logged in to submit a review.
To:
From: