Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3566 PoC — OpenSSL 加密问题漏洞

Source
Associated Vulnerability
Title:OpenSSL 加密问题漏洞 (CVE-2014-3566)
Description:The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
Description
:poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:
File Snapshot

[4.0K] /data/pocs/3a1bb6e414ebf4f037b8c8e57cec92bf600ea196 ├── [1.1K] LICENSE ├── [ 578] nginx-config ├── [4.4K] parallelization-poodle.py ├── [ 14K] poodle-exploit.py ├── [1.8K] poodle.js ├── [4.6K] poodle-poc.py ├── [ 12K] readme.md └── [ 940] request-splitter.py 0 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →