Identifying POODLE vulnerability