@prefix dbo:	<http://dbpedia.org/ontology/> .
@prefix dbr:	<http://dbpedia.org/resource/> .
dbr:POODLE_attack	dbo:wikiPageWikiLink	dbr:POODLE ;
	dbo:wikiPageRedirects	dbr:POODLE .
dbr:LibreSSL	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:UC_Browser	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:JASBUG	dbo:wikiPageWikiLink	dbr:POODLE .
@prefix foaf:	<http://xmlns.com/foaf/0.1/> .
@prefix wikipedia-en:	<http://en.wikipedia.org/wiki/> .
wikipedia-en:POODLE	foaf:primaryTopic	dbr:POODLE .
dbr:Cybersecurity_information_technology_list	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Downgrade_attack	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Cipher_suite	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Padding_oracle_attack	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Transport_Layer_Security	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Apple_Push_Notification_service	dbo:wikiPageWikiLink	dbr:POODLE .
<http://dbpedia.org/resource/Logjam_(computer_security)>	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Strong_cryptography	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Comparison_of_TLS_implementations	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:FREAK	dbo:wikiPageWikiLink	dbr:POODLE .
@prefix rdfs:	<http://www.w3.org/2000/01/rdf-schema#> .
dbr:POODLE	rdfs:label	"POODLE"@ru ,
		"\u8D35\u5BBE\u72AC\u6F0F\u6D1E"@zh ,
		"POODLE"@cs ,
		"POODLE"@fr ,
		"POODLE"@en ,
		"POODLE"@pl ,
		"Poodle"@de ,
		"Ataque POODLE"@es ;
	rdfs:comment	"El ataque POODLE (del ingl\u00E9s \"Padding Oracle On Downgraded Legacy Encryption\") es un exploit man-in-the-middle que aprovecha Internet y la caracter\u00EDstica del software de clientes de bajar a SSL 3.0.\u200B\u200B\u200B Si los atacantes explotan exitosamente esta vulnerabilidad, en promedio, solo necesitan hacer 256 solicitudes SSL 3.0 para revelar un byte de los mensajes cifrados. Bodo M\u00F6ller, Thai Duong y Krzysztof Kotowicz del Equipo de Seguridad de Google descubrieron esta vulnerabilidad; la hicieron p\u00FAblica el 14 de octubre de 2014 (a pesar de que el estudio estaba fechado en \"Septiembre de 2014\"\u200B).\u200B Ivan Ristic no considera el ataque POODLE tan serio como Heartbleed o Shellshock.\u200B El 8 de diciembre de 2014 se anunci\u00F3 una variaci\u00F3n al ataque POODLE que impactaba TLS.\u200B"@es ,
		"\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF08\u53C8\u79F0 POODLE \u6F0F\u6D1E\uFF0C\u5176\u5168\u79F0\u4E3A\u201C\u964D\u7EA7\u52A0\u5BC6\u5BC6\u6587\u586B\u585E\u653B\u51FB\u201D\uFF09\u662F\u4E00\u79CD\u5229\u7528\u4E92\u8054\u7F51\u53CA\u5B89\u5168\u8F6F\u4EF6\u5BA2\u6237\u7AEF\u56DE\u6EDA SSL3.0 \u52A0\u5BC6\u7B97\u6CD5\u7684\u884C\u4E3A\u7684\u4E2D\u95F4\u4EBA\u653B\u51FB\u3002\u5728\u6F0F\u6D1E\u88AB\u6210\u529F\u5229\u7528\u7684\u60C5\u51B5\u4E0B\uFF0C\u653B\u51FB\u8005\u5E73\u5747\u53EA\u9700\u8981\u53D1\u9001 256 \u6B21 SSL3.0 \u8BF7\u6C42\u5373\u53EF\u7834\u89E3 1 \u5B57\u8282\u52A0\u5BC6\u4FE1\u606F\u3002\u6765\u81EA\u7684 Bodo M\u00F6ller, Thai Duong \u548C Krzysztof Kotowicz \u53D1\u73B0\u4E86\u8BE5\u6F0F\u6D1E\uFF1B\u5E76\u4E8E 2014 \u5E74 10 \u6708 14 \u65E5\uFF08\u62A5\u544A\u4E2D\u6807\u4E3A 2014 \u5E74 9 \u6708\uFF09\u516C\u5E03\u8BE5\u6F0F\u6D1E\u30022014 \u5E74 12 \u6708 8 \u65E5\uFF0C\u5F71\u54CD TLS \u7684\u57FA\u4E8E\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4E00\u4E2A\u53D8\u79CD\u88AB\u5E7F\u6CDB\u62A5\u9053\u3002 \u901A\u7528\u6F0F\u6D1E\u62AB\u9732\u4E2D\uFF0C\u539F\u7248\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4EE3\u53F7\u4E3A CVE-2014-3566\u3002 \u53E6\u5916\u63D0\u4EA4\u4E86 CVE-2014-8730\uFF08\u5373\u9488\u5BF9 TLS \u7684\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF09\u3002"@zh ,
		"Poodle (Abk\u00FCrzung f\u00FCr englisch Padding Oracle On Downgraded Legacy Encryption) ist eine schwerwiegende Sicherheitsl\u00FCcke in verschiedenen Internet-Protokollen, wodurch \u00FCber verschl\u00FCsselte Verbindungen private Daten von Clients und Servern ausgelesen werden k\u00F6nnen. Die Sicherheitsl\u00FCcken werden in CVE-2014-3566 und CVE-2014-8730 beschrieben."@de ,
		"POODLE (zkratka z anglick\u00E9ho \u201EPadding Oracle On Downgraded Legacy Encryption\u201C, doslova \u201E\u00DAtok na degradovan\u00E9 historick\u00E9 \u0161ifrov\u00E1n\u00ED\u201C) je zranitelnost na \u00FArovni protokolu, kter\u00E1 umo\u017E\u0148uje \u00FAtok man in the middle na komunikaci protokolem SSL verze , respektive i na komunikaci protokolem TLS, pokud klient a server povoluj\u00ED za \u00FA\u010Delem zp\u011Btn\u00E9 kompatibility jeden druh\u00E9mu vynucen\u00ED p\u0159echodu na star\u0161\u00ED protokol SSL 3.0."@cs ,
		"POODLE (akronim od \u201EPadding Oracle On Downgraded Legacy Encryption\u201D) \u2013 krytyczny b\u0142\u0105d bezpiecze\u0144stwa w trzeciej wersji protoko\u0142u SSL oznaczony numerem CVE-2014-3566. Luka w oprogramowaniu pozwala odszyfrowa\u0107 zaszyfrowane datagramy przesy\u0142ane przy u\u017Cyciu protoko\u0142u SSL przez m.in. przegl\u0105darki internetowe."@pl ,
		"POODLE (\u0430\u043D\u0433\u043B. Padding Oracle On Downgraded Legacy Encryption) \u2014 \u0432\u0438\u0434 \u0430\u0442\u0430\u043A\u0438 \u0432 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u043D\u043E\u0439 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438 \u0442\u0438\u043F\u0430 \u00AB\u0447\u0435\u043B\u043E\u0432\u0435\u043A \u043F\u043E\u0441\u0435\u0440\u0435\u0434\u0438\u043D\u0435\u00BB, \u043A\u043E\u0433\u0434\u0430 \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u043F\u0443\u0442\u0451\u043C \u0431\u043B\u043E\u043A\u0438\u0440\u043E\u0432\u043A\u0438 TLS 1.0 \u0438 \u0443\u0432\u0435\u043B\u0438\u0447\u0435\u043D\u0438\u044F \u0447\u0438\u0441\u043B\u0430 \u043F\u043E\u043F\u044B\u0442\u043E\u043A \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u044F \u0432\u044B\u0437\u044B\u0432\u0430\u0435\u0442 \u043F\u0440\u0438\u043D\u0443\u0434\u0438\u0442\u0435\u043B\u044C\u043D\u043E\u0435 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 \u0438\u043D\u0442\u0435\u0440\u043D\u0435\u0442-\u043A\u043B\u0438\u0435\u043D\u0442\u0430\u043C\u0438 \u0438 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F\u043C\u0438 \u0437\u0430\u0449\u0438\u0442\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u043D\u043E\u0433\u043E \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u044F SSL \u0432\u0435\u0440\u0441\u0438\u0438 3.0. \u041F\u043E\u0441\u043B\u0435 \u0442\u043E\u0433\u043E \u043A\u0430\u043A \u0431\u044B\u043B \u043F\u0440\u043E\u0438\u0437\u0432\u0435\u0434\u0435\u043D \u043E\u0442\u043A\u0430\u0442 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u0434\u043E SSL 3.0, \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442 \u0430\u0442\u0430\u043A\u0443 ."@ru ,
		"POODLE (which stands for \"Padding Oracle On Downgraded Legacy Encryption\") is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo M\u00F6ller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014 (despite the paper being dated \"September 2014\" ). On December 8, 2014 a variation of the POODLE vulnerability that affected TLS was announced."@en ,
		"POODLE (de l'anglais Padding Oracle On Downgraded Legacy Encryption) est une vuln\u00E9rabilit\u00E9 logicielle pr\u00E9sente dans le protocole SSL 3.0, qui permet de d\u00E9chiffrer les informations \u00E9chang\u00E9es entre le navigateur Web de la victime et le serveur s\u00E9curis\u00E9, avec l'attaque de l'homme du milieu. Ce probl\u00E8me fut r\u00E9v\u00E9l\u00E9 par Google dans un rapport rendu public le 14 octobre 2014. Pour s'en pr\u00E9munir, les serveurs devront donc migrer en TLS. Le 20 octobre 2014, FileZilla a d\u00E9ploy\u00E9 sa mise \u00E0 jour correctrice."@fr .
@prefix dct:	<http://purl.org/dc/terms/> .
@prefix dbc:	<http://dbpedia.org/resource/Category:> .
dbr:POODLE	dct:subject	dbc:Cryptography ,
		dbc:Internet_security ,
		dbc:Web_security_exploits ,
		dbc:Transport_Layer_Security ;
	dbo:abstract	"El ataque POODLE (del ingl\u00E9s \"Padding Oracle On Downgraded Legacy Encryption\") es un exploit man-in-the-middle que aprovecha Internet y la caracter\u00EDstica del software de clientes de bajar a SSL 3.0.\u200B\u200B\u200B Si los atacantes explotan exitosamente esta vulnerabilidad, en promedio, solo necesitan hacer 256 solicitudes SSL 3.0 para revelar un byte de los mensajes cifrados. Bodo M\u00F6ller, Thai Duong y Krzysztof Kotowicz del Equipo de Seguridad de Google descubrieron esta vulnerabilidad; la hicieron p\u00FAblica el 14 de octubre de 2014 (a pesar de que el estudio estaba fechado en \"Septiembre de 2014\"\u200B).\u200B Ivan Ristic no considera el ataque POODLE tan serio como Heartbleed o Shellshock.\u200B El 8 de diciembre de 2014 se anunci\u00F3 una variaci\u00F3n al ataque POODLE que impactaba TLS.\u200B El identificador de la vulnerabilidad del ataque POODLE original es CVE-2014-3566. La empresa F5 Networks tambi\u00E9n registr\u00F3 el CVE-2014-8730, vea ."@es ,
		"Poodle (Abk\u00FCrzung f\u00FCr englisch Padding Oracle On Downgraded Legacy Encryption) ist eine schwerwiegende Sicherheitsl\u00FCcke in verschiedenen Internet-Protokollen, wodurch \u00FCber verschl\u00FCsselte Verbindungen private Daten von Clients und Servern ausgelesen werden k\u00F6nnen. Die Sicherheitsl\u00FCcken werden in CVE-2014-3566 und CVE-2014-8730 beschrieben."@de ,
		"POODLE (which stands for \"Padding Oracle On Downgraded Legacy Encryption\") is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo M\u00F6ller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014 (despite the paper being dated \"September 2014\" ). On December 8, 2014 a variation of the POODLE vulnerability that affected TLS was announced. The CVE-ID associated with the original POODLE attack is CVE-2014-3566.F5 Networks filed for CVE-2014-8730 as well, see section below."@en ,
		"POODLE (\u0430\u043D\u0433\u043B. Padding Oracle On Downgraded Legacy Encryption) \u2014 \u0432\u0438\u0434 \u0430\u0442\u0430\u043A\u0438 \u0432 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u043D\u043E\u0439 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438 \u0442\u0438\u043F\u0430 \u00AB\u0447\u0435\u043B\u043E\u0432\u0435\u043A \u043F\u043E\u0441\u0435\u0440\u0435\u0434\u0438\u043D\u0435\u00BB, \u043A\u043E\u0433\u0434\u0430 \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u043F\u0443\u0442\u0451\u043C \u0431\u043B\u043E\u043A\u0438\u0440\u043E\u0432\u043A\u0438 TLS 1.0 \u0438 \u0443\u0432\u0435\u043B\u0438\u0447\u0435\u043D\u0438\u044F \u0447\u0438\u0441\u043B\u0430 \u043F\u043E\u043F\u044B\u0442\u043E\u043A \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u044F \u0432\u044B\u0437\u044B\u0432\u0430\u0435\u0442 \u043F\u0440\u0438\u043D\u0443\u0434\u0438\u0442\u0435\u043B\u044C\u043D\u043E\u0435 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 \u0438\u043D\u0442\u0435\u0440\u043D\u0435\u0442-\u043A\u043B\u0438\u0435\u043D\u0442\u0430\u043C\u0438 \u0438 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F\u043C\u0438 \u0437\u0430\u0449\u0438\u0442\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u043D\u043E\u0433\u043E \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u044F SSL \u0432\u0435\u0440\u0441\u0438\u0438 3.0. \u041F\u043E\u0441\u043B\u0435 \u0442\u043E\u0433\u043E \u043A\u0430\u043A \u0431\u044B\u043B \u043F\u0440\u043E\u0438\u0437\u0432\u0435\u0434\u0435\u043D \u043E\u0442\u043A\u0430\u0442 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u0434\u043E SSL 3.0, \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442 \u0430\u0442\u0430\u043A\u0443 ."@ru ,
		"POODLE (de l'anglais Padding Oracle On Downgraded Legacy Encryption) est une vuln\u00E9rabilit\u00E9 logicielle pr\u00E9sente dans le protocole SSL 3.0, qui permet de d\u00E9chiffrer les informations \u00E9chang\u00E9es entre le navigateur Web de la victime et le serveur s\u00E9curis\u00E9, avec l'attaque de l'homme du milieu. Ce probl\u00E8me fut r\u00E9v\u00E9l\u00E9 par Google dans un rapport rendu public le 14 octobre 2014. Pour s'en pr\u00E9munir, les serveurs devront donc migrer en TLS. Le 20 octobre 2014, FileZilla a d\u00E9ploy\u00E9 sa mise \u00E0 jour correctrice. Le 8 d\u00E9cembre 2014, l'entreprise de s\u00E9curit\u00E9 Qualys d\u00E9clare avoir r\u00E9ussi \u00E0 toucher TLS avec cette m\u00EAme vuln\u00E9rabilit\u00E9. Il est estim\u00E9 qu'au moins 10 % des sites web seraient touch\u00E9s."@fr ,
		"POODLE (akronim od \u201EPadding Oracle On Downgraded Legacy Encryption\u201D) \u2013 krytyczny b\u0142\u0105d bezpiecze\u0144stwa w trzeciej wersji protoko\u0142u SSL oznaczony numerem CVE-2014-3566. Luka w oprogramowaniu pozwala odszyfrowa\u0107 zaszyfrowane datagramy przesy\u0142ane przy u\u017Cyciu protoko\u0142u SSL przez m.in. przegl\u0105darki internetowe. Podatno\u015B\u0107 zosta\u0142a odkryta 14 pa\u017Adziernika 2014 przez trzech cz\u0142onk\u00F3w zespo\u0142u badaczy bezpiecze\u0144stwa w firmie Google: Bodo M\u00F6llera, Thaia Duonga oraz Krzysztofa Kotowicza. Odkrycie dowiod\u0142o, \u017Ce specyfikacja protoko\u0142u SSL uniemo\u017Cliwia napraw\u0119 luki, co podnios\u0142o znaczenie w wypieraniu protoko\u0142u przez r\u00F3wnolegle opracowywany standard TLS."@pl ,
		"\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF08\u53C8\u79F0 POODLE \u6F0F\u6D1E\uFF0C\u5176\u5168\u79F0\u4E3A\u201C\u964D\u7EA7\u52A0\u5BC6\u5BC6\u6587\u586B\u585E\u653B\u51FB\u201D\uFF09\u662F\u4E00\u79CD\u5229\u7528\u4E92\u8054\u7F51\u53CA\u5B89\u5168\u8F6F\u4EF6\u5BA2\u6237\u7AEF\u56DE\u6EDA SSL3.0 \u52A0\u5BC6\u7B97\u6CD5\u7684\u884C\u4E3A\u7684\u4E2D\u95F4\u4EBA\u653B\u51FB\u3002\u5728\u6F0F\u6D1E\u88AB\u6210\u529F\u5229\u7528\u7684\u60C5\u51B5\u4E0B\uFF0C\u653B\u51FB\u8005\u5E73\u5747\u53EA\u9700\u8981\u53D1\u9001 256 \u6B21 SSL3.0 \u8BF7\u6C42\u5373\u53EF\u7834\u89E3 1 \u5B57\u8282\u52A0\u5BC6\u4FE1\u606F\u3002\u6765\u81EA\u7684 Bodo M\u00F6ller, Thai Duong \u548C Krzysztof Kotowicz \u53D1\u73B0\u4E86\u8BE5\u6F0F\u6D1E\uFF1B\u5E76\u4E8E 2014 \u5E74 10 \u6708 14 \u65E5\uFF08\u62A5\u544A\u4E2D\u6807\u4E3A 2014 \u5E74 9 \u6708\uFF09\u516C\u5E03\u8BE5\u6F0F\u6D1E\u30022014 \u5E74 12 \u6708 8 \u65E5\uFF0C\u5F71\u54CD TLS \u7684\u57FA\u4E8E\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4E00\u4E2A\u53D8\u79CD\u88AB\u5E7F\u6CDB\u62A5\u9053\u3002 \u901A\u7528\u6F0F\u6D1E\u62AB\u9732\u4E2D\uFF0C\u539F\u7248\u8D35\u5BBE\u72AC\u6F0F\u6D1E\u7684\u4EE3\u53F7\u4E3A CVE-2014-3566\u3002 \u53E6\u5916\u63D0\u4EA4\u4E86 CVE-2014-8730\uFF08\u5373\u9488\u5BF9 TLS \u7684\u8D35\u5BBE\u72AC\u6F0F\u6D1E\uFF09\u3002"@zh ,
		"POODLE (zkratka z anglick\u00E9ho \u201EPadding Oracle On Downgraded Legacy Encryption\u201C, doslova \u201E\u00DAtok na degradovan\u00E9 historick\u00E9 \u0161ifrov\u00E1n\u00ED\u201C) je zranitelnost na \u00FArovni protokolu, kter\u00E1 umo\u017E\u0148uje \u00FAtok man in the middle na komunikaci protokolem SSL verze , respektive i na komunikaci protokolem TLS, pokud klient a server povoluj\u00ED za \u00FA\u010Delem zp\u011Btn\u00E9 kompatibility jeden druh\u00E9mu vynucen\u00ED p\u0159echodu na star\u0161\u00ED protokol SSL 3.0."@cs ;
	dbo:wikiPageWikiLink	dbr:Mozilla ,
		dbc:Web_security_exploits ,
		dbr:OpenSSL ,
		dbr:Microsoft ,
		dbr:Internet_Explorer ,
		dbr:Transport_Layer_Security ,
		dbc:Transport_Layer_Security ,
		dbr:LibreSSL ,
		dbr:Cisco_Systems ,
		dbr:Wikimedia_Foundation ,
		dbr:Firefox ,
		<http://dbpedia.org/resource/Safari_(web_browser)> ,
		dbr:CBC_mode_of_operation ,
		dbr:Common_Vulnerabilities_and_Exposures ,
		dbr:Network_Security_Services ,
		dbr:A10_Networks ,
		dbr:Microsoft_Windows ,
		<http://dbpedia.org/resource/Opera_(web_browser)> ,
		dbr:Google_Chrome ,
		dbc:Internet_security ,
		dbr:Security_vulnerability ,
		<http://dbpedia.org/resource/SSL_3.0> ,
		dbc:Cryptography ,
		dbr:CloudFlare ,
		dbr:Google .
@prefix dbp:	<http://dbpedia.org/property/> .
@prefix dbt:	<http://dbpedia.org/resource/Template:> .
dbr:POODLE	dbp:wikiPageUsesTemplate	dbt:Start_date_and_age ,
		dbt:Short_description ,
		dbt:Update_inline ,
		dbt:Reflist ,
		dbt:Citation_needed .
@prefix ns9:	<http://dbpedia.org/resource/Template:SSL/> .
dbr:POODLE	dbp:wikiPageUsesTemplate	ns9:TLS ,
		dbt:Use_mdy_dates ,
		dbt:About ,
		dbt:Infobox_bug ,
		dbt:CVE ,
		dbt:Hacking_in_the_2010s ;
	dbo:wikiPageRevisionID	1113875008 ;
	dbo:wikiPageExternalLink	<https://bugzilla.mozilla.org/show_bug.cgi%3Fid=poodle> ,
		<https://www.openssl.org/~bodo/ssl-poodle.pdf> ,
		<https://www.acunetix.com/blog/web-security-zone/what-is-poodle-attack/> ,
		<https://cve.mitre.org/cgi-bin/cvename.cgi%3Fname=cve-2014-3566> .
@prefix xsd:	<http://www.w3.org/2001/XMLSchema#> .
dbr:POODLE	dbo:wikiPageLength	"13314"^^xsd:nonNegativeInteger ;
	dbo:wikiPageID	44116080 ;
	dbp:name	"POODLE"@en .
@prefix owl:	<http://www.w3.org/2002/07/owl#> .
@prefix dbpedia-pl:	<http://pl.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-pl:POODLE .
@prefix dbpedia-fr:	<http://fr.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-fr:POODLE ,
		<http://rdf.freebase.com/ns/m.0123nb37> .
@prefix dbpedia-he:	<http://he.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-he:POODLE ,
		dbr:POODLE .
@prefix dbpedia-de:	<http://de.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-de:Poodle .
@prefix dbpedia-es:	<http://es.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-es:Ataque_POODLE ,
		<http://zh.dbpedia.org/resource/\u8D35\u5BBE\u72AC\u6F0F\u6D1E> .
@prefix dbpedia-ru:	<http://ru.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-ru:POODLE .
@prefix dbpedia-tr:	<http://tr.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-tr:POODLE .
@prefix ns19:	<https://global.dbpedia.org/id/> .
dbr:POODLE	owl:sameAs	ns19:mLoa .
@prefix wikidata:	<http://www.wikidata.org/entity/> .
dbr:POODLE	owl:sameAs	wikidata:Q18274255 .
@prefix dbpedia-cs:	<http://cs.dbpedia.org/resource/> .
dbr:POODLE	owl:sameAs	dbpedia-cs:POODLE .
@prefix prov:	<http://www.w3.org/ns/prov#> .
dbr:POODLE	prov:wasDerivedFrom	<http://en.wikipedia.org/wiki/POODLE?oldid=1113875008&ns=0> ;
	foaf:isPrimaryTopicOf	wikipedia-en:POODLE .
@prefix dbpedia-ja:	<http://ja.dbpedia.org/resource/> .
dbr:POODLE	dbo:wikiPageInterLanguageLink	dbpedia-ja:POODLE ;
	dbp:affectedSoftware	"Any software that supports a fallback to SSL 3.0"@en ;
	dbp:discoverer	"Bodo M\u00F6ller, Thai Duong, Krzysztof Kotowicz"@en ;
	dbp:discovered	"2014-10-14"^^xsd:date .
@prefix dbd:	<http://dbpedia.org/datatype/> .
dbr:POODLE	dbp:cve	"-2014.0"^^dbd:capeVerdeEscudo .
dbr:Block_cipher_mode_of_operation	dbo:wikiPageWikiLink	dbr:POODLE .
dbr:Poodle_attack	dbo:wikiPageWikiLink	dbr:POODLE ;
	dbo:wikiPageRedirects	dbr:POODLE .
dbr:CVE-2014-3566	dbo:wikiPageWikiLink	dbr:POODLE ;
	dbo:wikiPageRedirects	dbr:POODLE .
dbr:POODLE_vulnerability	dbo:wikiPageWikiLink	dbr:POODLE ;
	dbo:wikiPageRedirects	dbr:POODLE .
dbr:Padding_Oracle_On_Downgraded_Legacy_Encryption	dbo:wikiPageWikiLink	dbr:POODLE ;
	dbo:wikiPageRedirects	dbr:POODLE .