Recently a vulnerability in the SSLv3 protocol was discovered by Google researchers, which allows to decrypt session keys and, as a consequence, read confidential information. Much like the 2011 BEAST attack, this man-in-the-middle attack enforces an SSLv3 connection, although your Browser and the server on the other end may support higher/newer protocols.
Further information:
It is strongly recommended to deactivate SSL 3.0 completely in your Browser and on any server. You can check here, if your server configuration needs to be updated:
NEW You can also bulk check multiple servers.
Until now we found 2383 servers vulnerable to the POODLE attack. The most recent additions to this list are:
| Server | Service | letzte Prüfung |
|---|---|---|
setrowimg.com
|
https | |
register.airstrip.com
|
https | |
portal.se.com.sa
|
https | |
postar.stat.gov.rs
|
https | |
hashersystems.com
|
https | |
id.avg.com
|
https | |
id.avg.com
|
https | |
id.avg.com
|
https | |
openid.avg.com
|
https | |
openid.avg.com
|
https | |
openid.avg.com
|
https | |
desktop.haus-wieden.ch
|
https | |
citrix.gzdielsdorf.ch
|
https | |
cfdiau.sat.gob.mx
|
https | |
onholidayapi.ourpacific.co.nz
|
https |