POODLE Test

Recently a vulnerability in the SSLv3 protocol was discovered by Google researchers, which allows to decrypt session keys and, as a consequence, read confidential information. Much like the 2011 BEAST attack, this man-in-the-middle attack enforces an SSLv3 connection, although your Browser and the server on the other end may support higher/newer protocols.

Further information:

It is strongly recommended to deactivate SSL 3.0 completely in your Browser and on any server. You can check here, if your server configuration needs to be updated:


NEW You can also bulk check multiple servers.

Vulnerable Server

Until now we found 8277 servers vulnerable to the POODLE attack. The most recent additions to this list are:

Server Service letzte Prüfung
www.rockstargames.com https
www.organizationcore.com https
cag3.lehnkering.com https
kiwi.qa https
safety.cju.ac.kr https
education.concordia.ca https
share.jayeapps.com https
cav.receita.fazenda.gov.br https
cav.receita.fazenda.gov.br https
artwied.de https
home.textkernel.nl https
www.fischerverein-allkofen-mintraching.de https
sso.exede.net https
www.is.inf.uni-due.de https
midcentraldhb.govt.nz https