| CARVIEW |
Select Language
HTTP/2 200
server: nginx
date: Sun, 28 Dec 2025 07:04:14 GMT
content-type: text/html; charset=UTF-8
vary: Accept-Encoding
set-cookie: PHPSESSID=6jlog5tn8u48sbk6b8ob6r684h; path=/
expires: Thu, 19 Nov 1981 08:52:00 GMT
cache-control: no-store, no-cache, must-revalidate
pragma: no-cache
strict-transport-security: max-age=31536000; includeSubdomains; preload
content-security-policy: default-src 'none'; script-src 'unsafe-inline' 'self' tools-7.kxcdn.com www.googletagmanager.com *.google-analytics.com cdn.carbonads.com srv.carbonads.net data:; connect-src 'self' fei.keycdn.com www.googletagmanager.com *.google-analytics.com cdn.carbonads.com srv.carbonads.net; style-src 'unsafe-inline' 'self' tools-7.kxcdn.com; font-src 'self' tools-7.kxcdn.com; img-src * data:; manifest-src 'self' tools-7.kxcdn.com;
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
content-encoding: gzip
SSL FREAK Test - Verify CVE-2015-0204 Vulnerability | KeyCDN Tools
Tools
Troubleshoot website, network, and CDN issues for fast resolutions.
- Security
- Web
- Network
- Security
- Other
SSL FREAK Test
CVE-2015-0204
SSL FREAK Test FAQ
What is the FREAK SSL attack?
Tuesday 2015/03/03 - Researchers of miTLS team (joint project between Inria and Microsoft Research) disclosed a new SSL/TLS vulnerability — the FREAK SSL attack (CVE-2015-0204). The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use 'export-grade' cryptography, which can then be decrypted or altered.
Read more about the FREAK SSL attack.
How to eliminate the vulnerability?
Upgrade the OpenSSL version to at least 1.02.
Get started for free
Try KeyCDN with a free 14 day trial, no credit card required.
Get startedPricing
KeyCDN uses cookies to make its website easier to use. Learn more about cookies.