Recently a vulnerability in the SSLv3 protocol was discovered by Google researchers, which allows to decrypt session keys and, as a consequence, read confidential information. Much like the 2011 BEAST attack, this man-in-the-middle attack enforces an SSLv3 connection, although your Browser and the server on the other end may support higher/newer protocols.

Further information:

It is strongly recommended to deactivate SSL 3.0 completely in your Browser and on any server. You can check here, if your server configuration needs to be updated:

NEW You can also bulk check multiple servers.

Vulnerable Server

Until now we found 2138 servers vulnerable to the POODLE attack. The most recent additions to this list are:

Server Service letzte Prüfung
remote.enquest.com https
magic-retapi.co-mall.com https
remote.enquest.com https
stg-opac.vatlib.it https
stg-digital.vatlib.it https
api.ksbu.edu.tr https
server-54-192-48-143.yul62.r.cloudfront.net https
daspodium.at https
sub-r.de https
vsrp.uhnresearch.ca https
vsrp.uhnresearch.ca https
mail.petronesia.co.id https
mail.petronesia.co.id https
park.parkcinema.ru https
mail.schweigkofler.it https