@prefix dbo: <http://dbpedia.org/ontology/> . @prefix dbr: <http://dbpedia.org/resource/> . dbr:POODLE_attack dbo:wikiPageWikiLink dbr:POODLE ; dbo:wikiPageRedirects dbr:POODLE . dbr:LibreSSL dbo:wikiPageWikiLink dbr:POODLE . dbr:UC_Browser dbo:wikiPageWikiLink dbr:POODLE . dbr:JASBUG dbo:wikiPageWikiLink dbr:POODLE . @prefix foaf: <http://xmlns.com/foaf/0.1/> . @prefix wikipedia-en: <http://en.wikipedia.org/wiki/> . wikipedia-en:POODLE foaf:primaryTopic dbr:POODLE . dbr:Cybersecurity_information_technology_list dbo:wikiPageWikiLink dbr:POODLE . dbr:Downgrade_attack dbo:wikiPageWikiLink dbr:POODLE . dbr:Cipher_suite dbo:wikiPageWikiLink dbr:POODLE . dbr:Padding_oracle_attack dbo:wikiPageWikiLink dbr:POODLE . dbr:Transport_Layer_Security dbo:wikiPageWikiLink dbr:POODLE . dbr:Apple_Push_Notification_service dbo:wikiPageWikiLink dbr:POODLE . <http://dbpedia.org/resource/Logjam_(computer_security)> dbo:wikiPageWikiLink dbr:POODLE . dbr:Strong_cryptography dbo:wikiPageWikiLink dbr:POODLE . dbr:Comparison_of_TLS_implementations dbo:wikiPageWikiLink dbr:POODLE . dbr:FREAK dbo:wikiPageWikiLink dbr:POODLE . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . dbr:POODLE rdfs:label "POODLE"@ru , "\u8D35\u5BBE\u72AC\u6F0F\u6D1E"@zh , "POODLE"@cs , "POODLE"@fr , "POODLE"@en , "POODLE"@pl , "Poodle"@de , "Ataque POODLE"@es ; rdfs:comment "El ataque POODLE (del ingl\u00E9s \"Padding Oracle On Downgraded Legacy Encryption\") es un exploit man-in-the-middle que aprovecha Internet y la caracter\u00EDstica del software de clientes de bajar a SSL 3.0.\u200B\u200B\u200B Si los atacantes explotan exitosamente esta vulnerabilidad, en promedio, solo necesitan hacer 256 solicitudes SSL 3.0 para revelar un byte de los mensajes cifrados. Bodo M\u00F6ller, Thai Duong y Krzysztof Kotowicz del Equipo de Seguridad de Google descubrieron esta vulnerabilidad; la hicieron p\u00FAblica el 14 de octubre de 2014 (a pesar de que el estudio estaba fechado en \"Septiembre de 2014\"\u200B).\u200B Ivan Ristic no considera el ataque POODLE tan serio como Heartbleed o Shellshock.\u200B El 8 de diciembre de 2014 se anunci\u00F3 una variaci\u00F3n al ataque POODLE que impactaba TLS.\u200B"@es , "\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF08\u53C8\u79F0 POODLE \u6F0F\u6D1E\uFF0C\u5176\u5168\u79F0\u4E3A\u201C\u964D\u7EA7\u52A0\u5BC6\u5BC6\u6587\u586B\u585E\u653B\u51FB\u201D\uFF09\u662F\u4E00\u79CD\u5229\u7528\u4E92\u8054\u7F51\u53CA\u5B89\u5168\u8F6F\u4EF6\u5BA2\u6237\u7AEF\u56DE\u6EDA SSL3.0 \u52A0\u5BC6\u7B97\u6CD5\u7684\u884C\u4E3A\u7684\u4E2D\u95F4\u4EBA\u653B\u51FB\u3002\u5728\u6F0F\u6D1E\u88AB\u6210\u529F\u5229\u7528\u7684\u60C5\u51B5\u4E0B\uFF0C\u653B\u51FB\u8005\u5E73\u5747\u53EA\u9700\u8981\u53D1\u9001 256 \u6B21 SSL3.0 \u8BF7\u6C42\u5373\u53EF\u7834\u89E3 1 \u5B57\u8282\u52A0\u5BC6\u4FE1\u606F\u3002\u6765\u81EA\u7684 Bodo M\u00F6ller, Thai Duong \u548C Krzysztof Kotowicz \u53D1\u73B0\u4E86\u8BE5\u6F0F\u6D1E\uFF1B\u5E76\u4E8E 2014 \u5E74 10 \u6708 14 \u65E5\uFF08\u62A5\u544A\u4E2D\u6807\u4E3A 2014 \u5E74 9 \u6708\uFF09\u516C\u5E03\u8BE5\u6F0F\u6D1E\u30022014 \u5E74 12 \u6708 8 \u65E5\uFF0C\u5F71\u54CD TLS \u7684\u57FA\u4E8E\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4E00\u4E2A\u53D8\u79CD\u88AB\u5E7F\u6CDB\u62A5\u9053\u3002 \u901A\u7528\u6F0F\u6D1E\u62AB\u9732\u4E2D\uFF0C\u539F\u7248\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4EE3\u53F7\u4E3A CVE-2014-3566\u3002 \u53E6\u5916\u63D0\u4EA4\u4E86 CVE-2014-8730\uFF08\u5373\u9488\u5BF9 TLS \u7684\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF09\u3002"@zh , "Poodle (Abk\u00FCrzung f\u00FCr englisch Padding Oracle On Downgraded Legacy Encryption) ist eine schwerwiegende Sicherheitsl\u00FCcke in verschiedenen Internet-Protokollen, wodurch \u00FCber verschl\u00FCsselte Verbindungen private Daten von Clients und Servern ausgelesen werden k\u00F6nnen. Die Sicherheitsl\u00FCcken werden in CVE-2014-3566 und CVE-2014-8730 beschrieben."@de , "POODLE (zkratka z anglick\u00E9ho \u201EPadding Oracle On Downgraded Legacy Encryption\u201C, doslova \u201E\u00DAtok na degradovan\u00E9 historick\u00E9 \u0161ifrov\u00E1n\u00ED\u201C) je zranitelnost na \u00FArovni protokolu, kter\u00E1 umo\u017E\u0148uje \u00FAtok man in the middle na komunikaci protokolem SSL verze , respektive i na komunikaci protokolem TLS, pokud klient a server povoluj\u00ED za \u00FA\u010Delem zp\u011Btn\u00E9 kompatibility jeden druh\u00E9mu vynucen\u00ED p\u0159echodu na star\u0161\u00ED protokol SSL 3.0."@cs , "POODLE (akronim od \u201EPadding Oracle On Downgraded Legacy Encryption\u201D) \u2013 krytyczny b\u0142\u0105d bezpiecze\u0144stwa w trzeciej wersji protoko\u0142u SSL oznaczony numerem CVE-2014-3566. Luka w oprogramowaniu pozwala odszyfrowa\u0107 zaszyfrowane datagramy przesy\u0142ane przy u\u017Cyciu protoko\u0142u SSL przez m.in. przegl\u0105darki internetowe."@pl , "POODLE (\u0430\u043D\u0433\u043B. Padding Oracle On Downgraded Legacy Encryption) \u2014 \u0432\u0438\u0434 \u0430\u0442\u0430\u043A\u0438 \u0432 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u043D\u043E\u0439 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438 \u0442\u0438\u043F\u0430 \u00AB\u0447\u0435\u043B\u043E\u0432\u0435\u043A \u043F\u043E\u0441\u0435\u0440\u0435\u0434\u0438\u043D\u0435\u00BB, \u043A\u043E\u0433\u0434\u0430 \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u043F\u0443\u0442\u0451\u043C \u0431\u043B\u043E\u043A\u0438\u0440\u043E\u0432\u043A\u0438 TLS 1.0 \u0438 \u0443\u0432\u0435\u043B\u0438\u0447\u0435\u043D\u0438\u044F \u0447\u0438\u0441\u043B\u0430 \u043F\u043E\u043F\u044B\u0442\u043E\u043A \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u044F \u0432\u044B\u0437\u044B\u0432\u0430\u0435\u0442 \u043F\u0440\u0438\u043D\u0443\u0434\u0438\u0442\u0435\u043B\u044C\u043D\u043E\u0435 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 \u0438\u043D\u0442\u0435\u0440\u043D\u0435\u0442-\u043A\u043B\u0438\u0435\u043D\u0442\u0430\u043C\u0438 \u0438 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F\u043C\u0438 \u0437\u0430\u0449\u0438\u0442\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u043D\u043E\u0433\u043E \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u044F SSL \u0432\u0435\u0440\u0441\u0438\u0438 3.0. \u041F\u043E\u0441\u043B\u0435 \u0442\u043E\u0433\u043E \u043A\u0430\u043A \u0431\u044B\u043B \u043F\u0440\u043E\u0438\u0437\u0432\u0435\u0434\u0435\u043D \u043E\u0442\u043A\u0430\u0442 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u0434\u043E SSL 3.0, \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442 \u0430\u0442\u0430\u043A\u0443 ."@ru , "POODLE (which stands for \"Padding Oracle On Downgraded Legacy Encryption\") is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo M\u00F6ller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014 (despite the paper being dated \"September 2014\" ). On December 8, 2014 a variation of the POODLE vulnerability that affected TLS was announced."@en , "POODLE (de l'anglais Padding Oracle On Downgraded Legacy Encryption) est une vuln\u00E9rabilit\u00E9 logicielle pr\u00E9sente dans le protocole SSL 3.0, qui permet de d\u00E9chiffrer les informations \u00E9chang\u00E9es entre le navigateur Web de la victime et le serveur s\u00E9curis\u00E9, avec l'attaque de l'homme du milieu. Ce probl\u00E8me fut r\u00E9v\u00E9l\u00E9 par Google dans un rapport rendu public le 14 octobre 2014. Pour s'en pr\u00E9munir, les serveurs devront donc migrer en TLS. Le 20 octobre 2014, FileZilla a d\u00E9ploy\u00E9 sa mise \u00E0 jour correctrice."@fr . @prefix dct: <http://purl.org/dc/terms/> . @prefix dbc: <http://dbpedia.org/resource/Category:> . dbr:POODLE dct:subject dbc:Cryptography , dbc:Internet_security , dbc:Web_security_exploits , dbc:Transport_Layer_Security ; dbo:abstract "El ataque POODLE (del ingl\u00E9s \"Padding Oracle On Downgraded Legacy Encryption\") es un exploit man-in-the-middle que aprovecha Internet y la caracter\u00EDstica del software de clientes de bajar a SSL 3.0.\u200B\u200B\u200B Si los atacantes explotan exitosamente esta vulnerabilidad, en promedio, solo necesitan hacer 256 solicitudes SSL 3.0 para revelar un byte de los mensajes cifrados. Bodo M\u00F6ller, Thai Duong y Krzysztof Kotowicz del Equipo de Seguridad de Google descubrieron esta vulnerabilidad; la hicieron p\u00FAblica el 14 de octubre de 2014 (a pesar de que el estudio estaba fechado en \"Septiembre de 2014\"\u200B).\u200B Ivan Ristic no considera el ataque POODLE tan serio como Heartbleed o Shellshock.\u200B El 8 de diciembre de 2014 se anunci\u00F3 una variaci\u00F3n al ataque POODLE que impactaba TLS.\u200B El identificador de la vulnerabilidad del ataque POODLE original es CVE-2014-3566. La empresa F5 Networks tambi\u00E9n registr\u00F3 el CVE-2014-8730, vea ."@es , "Poodle (Abk\u00FCrzung f\u00FCr englisch Padding Oracle On Downgraded Legacy Encryption) ist eine schwerwiegende Sicherheitsl\u00FCcke in verschiedenen Internet-Protokollen, wodurch \u00FCber verschl\u00FCsselte Verbindungen private Daten von Clients und Servern ausgelesen werden k\u00F6nnen. Die Sicherheitsl\u00FCcken werden in CVE-2014-3566 und CVE-2014-8730 beschrieben."@de , "POODLE (which stands for \"Padding Oracle On Downgraded Legacy Encryption\") is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo M\u00F6ller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014 (despite the paper being dated \"September 2014\" ). On December 8, 2014 a variation of the POODLE vulnerability that affected TLS was announced. The CVE-ID associated with the original POODLE attack is CVE-2014-3566.F5 Networks filed for CVE-2014-8730 as well, see section below."@en , "POODLE (\u0430\u043D\u0433\u043B. Padding Oracle On Downgraded Legacy Encryption) \u2014 \u0432\u0438\u0434 \u0430\u0442\u0430\u043A\u0438 \u0432 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u043D\u043E\u0439 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438 \u0442\u0438\u043F\u0430 \u00AB\u0447\u0435\u043B\u043E\u0432\u0435\u043A \u043F\u043E\u0441\u0435\u0440\u0435\u0434\u0438\u043D\u0435\u00BB, \u043A\u043E\u0433\u0434\u0430 \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u043F\u0443\u0442\u0451\u043C \u0431\u043B\u043E\u043A\u0438\u0440\u043E\u0432\u043A\u0438 TLS 1.0 \u0438 \u0443\u0432\u0435\u043B\u0438\u0447\u0435\u043D\u0438\u044F \u0447\u0438\u0441\u043B\u0430 \u043F\u043E\u043F\u044B\u0442\u043E\u043A \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u044F \u0432\u044B\u0437\u044B\u0432\u0430\u0435\u0442 \u043F\u0440\u0438\u043D\u0443\u0434\u0438\u0442\u0435\u043B\u044C\u043D\u043E\u0435 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 \u0438\u043D\u0442\u0435\u0440\u043D\u0435\u0442-\u043A\u043B\u0438\u0435\u043D\u0442\u0430\u043C\u0438 \u0438 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F\u043C\u0438 \u0437\u0430\u0449\u0438\u0442\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u043D\u043E\u0433\u043E \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u044F SSL \u0432\u0435\u0440\u0441\u0438\u0438 3.0. \u041F\u043E\u0441\u043B\u0435 \u0442\u043E\u0433\u043E \u043A\u0430\u043A \u0431\u044B\u043B \u043F\u0440\u043E\u0438\u0437\u0432\u0435\u0434\u0435\u043D \u043E\u0442\u043A\u0430\u0442 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u0434\u043E SSL 3.0, \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442 \u0430\u0442\u0430\u043A\u0443 ."@ru , "POODLE (de l'anglais Padding Oracle On Downgraded Legacy Encryption) est une vuln\u00E9rabilit\u00E9 logicielle pr\u00E9sente dans le protocole SSL 3.0, qui permet de d\u00E9chiffrer les informations \u00E9chang\u00E9es entre le navigateur Web de la victime et le serveur s\u00E9curis\u00E9, avec l'attaque de l'homme du milieu. Ce probl\u00E8me fut r\u00E9v\u00E9l\u00E9 par Google dans un rapport rendu public le 14 octobre 2014. Pour s'en pr\u00E9munir, les serveurs devront donc migrer en TLS. Le 20 octobre 2014, FileZilla a d\u00E9ploy\u00E9 sa mise \u00E0 jour correctrice. Le 8 d\u00E9cembre 2014, l'entreprise de s\u00E9curit\u00E9 Qualys d\u00E9clare avoir r\u00E9ussi \u00E0 toucher TLS avec cette m\u00EAme vuln\u00E9rabilit\u00E9. Il est estim\u00E9 qu'au moins 10 % des sites web seraient touch\u00E9s."@fr , "POODLE (akronim od \u201EPadding Oracle On Downgraded Legacy Encryption\u201D) \u2013 krytyczny b\u0142\u0105d bezpiecze\u0144stwa w trzeciej wersji protoko\u0142u SSL oznaczony numerem CVE-2014-3566. Luka w oprogramowaniu pozwala odszyfrowa\u0107 zaszyfrowane datagramy przesy\u0142ane przy u\u017Cyciu protoko\u0142u SSL przez m.in. przegl\u0105darki internetowe. Podatno\u015B\u0107 zosta\u0142a odkryta 14 pa\u017Adziernika 2014 przez trzech cz\u0142onk\u00F3w zespo\u0142u badaczy bezpiecze\u0144stwa w firmie Google: Bodo M\u00F6llera, Thaia Duonga oraz Krzysztofa Kotowicza. Odkrycie dowiod\u0142o, \u017Ce specyfikacja protoko\u0142u SSL uniemo\u017Cliwia napraw\u0119 luki, co podnios\u0142o znaczenie w wypieraniu protoko\u0142u przez r\u00F3wnolegle opracowywany standard TLS."@pl , "\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF08\u53C8\u79F0 POODLE \u6F0F\u6D1E\uFF0C\u5176\u5168\u79F0\u4E3A\u201C\u964D\u7EA7\u52A0\u5BC6\u5BC6\u6587\u586B\u585E\u653B\u51FB\u201D\uFF09\u662F\u4E00\u79CD\u5229\u7528\u4E92\u8054\u7F51\u53CA\u5B89\u5168\u8F6F\u4EF6\u5BA2\u6237\u7AEF\u56DE\u6EDA SSL3.0 \u52A0\u5BC6\u7B97\u6CD5\u7684\u884C\u4E3A\u7684\u4E2D\u95F4\u4EBA\u653B\u51FB\u3002\u5728\u6F0F\u6D1E\u88AB\u6210\u529F\u5229\u7528\u7684\u60C5\u51B5\u4E0B\uFF0C\u653B\u51FB\u8005\u5E73\u5747\u53EA\u9700\u8981\u53D1\u9001 256 \u6B21 SSL3.0 \u8BF7\u6C42\u5373\u53EF\u7834\u89E3 1 \u5B57\u8282\u52A0\u5BC6\u4FE1\u606F\u3002\u6765\u81EA\u7684 Bodo M\u00F6ller, Thai Duong \u548C Krzysztof Kotowicz \u53D1\u73B0\u4E86\u8BE5\u6F0F\u6D1E\uFF1B\u5E76\u4E8E 2014 \u5E74 10 \u6708 14 \u65E5\uFF08\u62A5\u544A\u4E2D\u6807\u4E3A 2014 \u5E74 9 \u6708\uFF09\u516C\u5E03\u8BE5\u6F0F\u6D1E\u30022014 \u5E74 12 \u6708 8 \u65E5\uFF0C\u5F71\u54CD TLS \u7684\u57FA\u4E8E\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4E00\u4E2A\u53D8\u79CD\u88AB\u5E7F\u6CDB\u62A5\u9053\u3002 \u901A\u7528\u6F0F\u6D1E\u62AB\u9732\u4E2D\uFF0C\u539F\u7248\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4EE3\u53F7\u4E3A CVE-2014-3566\u3002 \u53E6\u5916\u63D0\u4EA4\u4E86 CVE-2014-8730\uFF08\u5373\u9488\u5BF9 TLS \u7684\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF09\u3002"@zh , "POODLE (zkratka z anglick\u00E9ho \u201EPadding Oracle On Downgraded Legacy Encryption\u201C, doslova \u201E\u00DAtok na degradovan\u00E9 historick\u00E9 \u0161ifrov\u00E1n\u00ED\u201C) je zranitelnost na \u00FArovni protokolu, kter\u00E1 umo\u017E\u0148uje \u00FAtok man in the middle na komunikaci protokolem SSL verze , respektive i na komunikaci protokolem TLS, pokud klient a server povoluj\u00ED za \u00FA\u010Delem zp\u011Btn\u00E9 kompatibility jeden druh\u00E9mu vynucen\u00ED p\u0159echodu na star\u0161\u00ED protokol SSL 3.0."@cs ; dbo:wikiPageWikiLink dbr:Mozilla , dbc:Web_security_exploits , dbr:OpenSSL , dbr:Microsoft , dbr:Internet_Explorer , dbr:Transport_Layer_Security , dbc:Transport_Layer_Security , dbr:LibreSSL , dbr:Cisco_Systems , dbr:Wikimedia_Foundation , dbr:Firefox , <http://dbpedia.org/resource/Safari_(web_browser)> , dbr:CBC_mode_of_operation , dbr:Common_Vulnerabilities_and_Exposures , dbr:Network_Security_Services , dbr:A10_Networks , dbr:Microsoft_Windows , <http://dbpedia.org/resource/Opera_(web_browser)> , dbr:Google_Chrome , dbc:Internet_security , dbr:Security_vulnerability , <http://dbpedia.org/resource/SSL_3.0> , dbc:Cryptography , dbr:CloudFlare , dbr:Google . @prefix dbp: <http://dbpedia.org/property/> . @prefix dbt: <http://dbpedia.org/resource/Template:> . dbr:POODLE dbp:wikiPageUsesTemplate dbt:Start_date_and_age , dbt:Short_description , dbt:Update_inline , dbt:Reflist , dbt:Citation_needed . @prefix ns9: <http://dbpedia.org/resource/Template:SSL/> . dbr:POODLE dbp:wikiPageUsesTemplate ns9:TLS , dbt:Use_mdy_dates , dbt:About , dbt:Infobox_bug , dbt:CVE , dbt:Hacking_in_the_2010s ; dbo:wikiPageRevisionID 1113875008 ; dbo:wikiPageExternalLink <https://bugzilla.mozilla.org/show_bug.cgi%3Fid=poodle> , <https://www.openssl.org/~bodo/ssl-poodle.pdf> , <https://www.acunetix.com/blog/web-security-zone/what-is-poodle-attack/> , <https://cve.mitre.org/cgi-bin/cvename.cgi%3Fname=cve-2014-3566> . @prefix xsd: <http://www.w3.org/2001/XMLSchema#> . dbr:POODLE dbo:wikiPageLength "13314"^^xsd:nonNegativeInteger ; dbo:wikiPageID 44116080 ; dbp:name "POODLE"@en . @prefix owl: <http://www.w3.org/2002/07/owl#> . @prefix dbpedia-pl: <http://pl.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-pl:POODLE . @prefix dbpedia-fr: <http://fr.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-fr:POODLE , <http://rdf.freebase.com/ns/m.0123nb37> . @prefix dbpedia-he: <http://he.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-he:POODLE , dbr:POODLE . @prefix dbpedia-de: <http://de.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-de:Poodle . @prefix dbpedia-es: <http://es.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-es:Ataque_POODLE , <http://zh.dbpedia.org/resource/\u8D35\u5BBE\u72AC\u6F0F\u6D1E> . @prefix dbpedia-ru: <http://ru.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-ru:POODLE . @prefix dbpedia-tr: <http://tr.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-tr:POODLE . @prefix ns19: <https://global.dbpedia.org/id/> . dbr:POODLE owl:sameAs ns19:mLoa . @prefix wikidata: <http://www.wikidata.org/entity/> . dbr:POODLE owl:sameAs wikidata:Q18274255 . @prefix dbpedia-cs: <http://cs.dbpedia.org/resource/> . dbr:POODLE owl:sameAs dbpedia-cs:POODLE . @prefix prov: <http://www.w3.org/ns/prov#> . dbr:POODLE prov:wasDerivedFrom <http://en.wikipedia.org/wiki/POODLE?oldid=1113875008&ns=0> ; foaf:isPrimaryTopicOf wikipedia-en:POODLE . @prefix dbpedia-ja: <http://ja.dbpedia.org/resource/> . dbr:POODLE dbo:wikiPageInterLanguageLink dbpedia-ja:POODLE ; dbp:affectedSoftware "Any software that supports a fallback to SSL 3.0"@en ; dbp:discoverer "Bodo M\u00F6ller, Thai Duong, Krzysztof Kotowicz"@en ; dbp:discovered "2014-10-14"^^xsd:date . @prefix dbd: <http://dbpedia.org/datatype/> . dbr:POODLE dbp:cve "-2014.0"^^dbd:capeVerdeEscudo . dbr:Block_cipher_mode_of_operation dbo:wikiPageWikiLink dbr:POODLE . dbr:Poodle_attack dbo:wikiPageWikiLink dbr:POODLE ; dbo:wikiPageRedirects dbr:POODLE . dbr:CVE-2014-3566 dbo:wikiPageWikiLink dbr:POODLE ; dbo:wikiPageRedirects dbr:POODLE . dbr:POODLE_vulnerability dbo:wikiPageWikiLink dbr:POODLE ; dbo:wikiPageRedirects dbr:POODLE . dbr:Padding_Oracle_On_Downgraded_Legacy_Encryption dbo:wikiPageWikiLink dbr:POODLE ; dbo:wikiPageRedirects dbr:POODLE .