Messente avatar logo

Security Notification – SSLv3 POODLE Vulnerability

- 5 MIN READ - 20 Oct 2014

On 14th October the OpenSSL team reported that version 3 of Secure Sockets Layer (SSLv3) is vulnerable at protocol level – called Phttp://en.wikipedia.org/wiki/POODLE OODLE attack (Padding Oracle On Downgraded Legacy Encryption).

As a security precaution Messente has disabled SSLv3 in our servers therefore Messente HTTP API is no more vulnerable to the POODLE exploit.

In most cases your Messente https:// API integration should already support secure TLS protocol and no action is needed for Messente HTTP API users.

You can also take a look at Scott Helme’s step-by-step guide on mitigating this vulnerability on multiple platforms, web servers and clients.

If you notice any issues with the API calls to Messente servers, please let us know at support@messente.com and we will help you with integration to new and secure TLS protocol.

Jaanus Rõõmus

Jaanus Rõõmus - CTO

Jaanus is co-founder and CTO of Messente and makes sure its wheels keep spinning and Messente always has a full tank of fuel.

Messente meets Zapier

17 Mar 2017

Good news, we’ve launched an integration with Zapier
Joosep Merelaht

Joosep Merelaht

Digging for Gold

21 Feb 2017

What to look for in sales research
Uku Tomikas

Uku Tomikas

Messente API official python library

30 Nov 2016

Our collection of API libraries now include official Python language support.
Bartlomiej Kurek

Bartlomiej Kurek

Start sending messages to

for € N/A

Contact us