Recently a vulnerability in the SSLv3 protocol was discovered by Google researchers, which allows to decrypt session keys and, as a consequence, read confidential information. Much like the 2011 BEAST attack, this man-in-the-middle attack enforces an SSLv3 connection, although your Browser and the server on the other end may support higher/newer protocols.
Further information:
It is strongly recommended to deactivate SSL 3.0 completely in your Browser and on any server. You can check here, if your server configuration needs to be updated:
NEW You can also bulk check multiple servers.
Until now we found 2144 servers vulnerable to the POODLE attack. The most recent additions to this list are:
Server | Service | letzte Prüfung |
---|---|---|
dbo2.bveb.by
|
https | |
pry.rapidgator.net
|
https | |
test.genteginos.es
|
https | |
xm.trier.de
|
https | |
ufz-kemerovo.ru
|
https | |
filedepot.sobeys.com
|
https | |
remote.enquest.com
|
https | |
magic-retapi.co-mall.com
|
https | |
remote.enquest.com
|
https | |
stg-opac.vatlib.it
|
https | |
stg-digital.vatlib.it
|
https | |
api.ksbu.edu.tr
|
https | |
server-54-192-48-143.yul62.r.cloudfront.net
|
https | |
daspodium.at
|
https | |
sub-r.de
|
https |