Recently a vulnerability in the SSLv3 protocol was discovered by Google researchers, which allows to decrypt session keys and, as a consequence, read confidential information. Much like the 2011 BEAST attack, this man-in-the-middle attack enforces an SSLv3 connection, although your Browser and the server on the other end may support higher/newer protocols.

Further information:

It is strongly recommended to deactivate SSL 3.0 completely in your Browser and on any server. You can check here, if your server configuration needs to be updated:

NEW You can also bulk check multiple servers.

Vulnerable Server

Until now we found 10662 servers vulnerable to the POODLE attack. The most recent additions to this list are:

Server Service letzte Prüfung
g-systems.net https
prodlib.com https
new.sintang.go.id https
webmail.krausnaimer.com https
ssp-na.covance.com https
toolbox.summit-asp.de https
www.imprimimostusfotos.com.ar https
www.biokit.com https
gewa-comp.de https
formaxx.ag https
fempluralcode.com https
www.minfin.ru https
webmail.pivara.ba https
unimi.it https
www2.jfes.jus.br https