CVE-2016-2183

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

References

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759

http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html

http://rhn.redhat.com/errata/RHSA-2017-0336.html

http://rhn.redhat.com/errata/RHSA-2017-0337.html

http://rhn.redhat.com/errata/RHSA-2017-0338.html

http://rhn.redhat.com/errata/RHSA-2017-0462.html

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html

http://www.securityfocus.com/bid/92630

http://www.securityfocus.com/bid/95568

http://www.securitytracker.com/id/1036696

http://www.splunk.com/view/SP-CAAAPSV

http://www.splunk.com/view/SP-CAAAPUE

http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697

http://www-01.ibm.com/support/docview.wss?uid=swg21991482

http://www-01.ibm.com/support/docview.wss?uid=swg21995039

https://access.redhat.com/articles/2548661

https://access.redhat.com/errata/RHSA-2017:1216

https://access.redhat.com/errata/RHSA-2017:2708

https://access.redhat.com/errata/RHSA-2017:2709

https://access.redhat.com/errata/RHSA-2017:2710

https://access.redhat.com/errata/RHSA-2017:3113

https://access.redhat.com/errata/RHSA-2017:3114

https://access.redhat.com/errata/RHSA-2017:3239

https://access.redhat.com/errata/RHSA-2017:3240

https://access.redhat.com/errata/RHSA-2018:2123

https://access.redhat.com/errata/RHSA-2019:1245

https://access.redhat.com/errata/RHSA-2019:2859

https://access.redhat.com/errata/RHSA-2020:0451

https://access.redhat.com/security/cve/cve-2016-2183

https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/

https://bto.bluecoat.com/security-advisory/sa133

https://bugzilla.redhat.com/show_bug.cgi?id=1369383

https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849

https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312

https://kc.mcafee.com/corporate/index?page=content&id=SB10171

https://kc.mcafee.com/corporate/index?page=content&id=SB10310

https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/

https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/

https://security.gentoo.org/glsa/201612-16

https://security.gentoo.org/glsa/201701-65

https://security.gentoo.org/glsa/201707-01

https://security.netapp.com/advisory/ntap-20160915-0001/

https://security.netapp.com/advisory/ntap-20170119-0001/

https://sweet32.info/

https://www.ietf.org/mail-archive/web/tls/current/msg04560.html

https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008

https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/

https://www.openssl.org/blog/blog/2016/08/24/sweet32/

https://www.oracle.com/security-alerts/cpuapr2020.html

https://www.oracle.com/security-alerts/cpujan2020.html

https://www.oracle.com/security-alerts/cpujul2020.html

https://www.oracle.com/security-alerts/cpuoct2020.html

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

https://www.sigsac.org/ccs/CCS2016/accepted-papers/

https://www.tenable.com/security/tns-2016-16

https://www.tenable.com/security/tns-2016-20

https://www.tenable.com/security/tns-2016-21

https://www.tenable.com/security/tns-2017-09

https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue

Details

Source: MITRE

Published: 2016-09-01

Updated: 2021-01-06

Type: CWE-200

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*

cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*

cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:*

cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*

cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*

Tenable Plugins

View all (98 total)

IDNameProductFamilySeverity
144079IBM HTTP Server 7.0.0.0 < 7.0.0.45 / 8.0.0.0 < 8.0.0.15 / 8.5.0.0 < 8.5.5.13 / 9.0.0.0 < 9.0.0.6 Sweet32:Birthday Attack (553351)NessusWeb Servers
high
132178EulerOS 2.0 SP3 : openssl098e (EulerOS-SA-2019-2643)NessusHuawei Local Security Checks
high
131662EulerOS 2.0 SP2 : openssl098e (EulerOS-SA-2019-2509)NessusHuawei Local Security Checks
high
127201NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)NessusNewStart CGSL Local Security Checks
critical
127180NewStart CGSL CORE 5.04 / MAIN 5.04 : python Vulnerability (NS-SA-2019-0022)NessusNewStart CGSL Local Security Checks
high
124937EulerOS Virtualization 3.0.1.0 : python (EulerOS-SA-2019-1434)NessusHuawei Local Security Checks
critical
124906EulerOS Virtualization for ARM 64 3.0.1.0 : python (EulerOS-SA-2019-1403)NessusHuawei Local Security Checks
critical
124059Oracle Access Manager Multiple Vulnerabilities (Jan 2018 CPU)NessusMisc.
critical
119998SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1389-1)NessusSuSE Local Security Checks
critical
119995SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2017:0726-1)NessusSuSE Local Security Checks
high
119982SUSE SLES12 Security Update : nodejs4 (SUSE-SU-2016:2470-1)NessusSuSE Local Security Checks
high
111075CentOS 7 : python (CESA-2018:2123)NessusCentOS Local Security Checks
high
110920Scientific Linux Security Update : python on SL7.x x86_64 (20180703)NessusScientific Linux Local Security Checks
high
110919RHEL 7 : python (RHSA-2018:2123)NessusRed Hat Local Security Checks
high
110918Oracle Linux 7 : python (ELSA-2018-2123)NessusOracle Linux Local Security Checks
high
107067Arista Networks EOS 4.17 Multiple Vulnerabilities (SA0024) (SWEET32)NessusMisc.
high
107066Arista Networks EOS Multiple Vulnerabilities (SA0024) (SWEET32)NessusMisc.
high
106863openSUSE Security Update : openssl-steam (openSUSE-2018-168)NessusSuSE Local Security Checks
critical
104699RHEL 6 / 7 : JBoss EAP (RHSA-2017:3240) (Optionsbleed)NessusRed Hat Local Security Checks
critical
104456RHEL 6 / 7 : Red Hat JBoss Web Server (RHSA-2017:3113) (Optionsbleed)NessusRed Hat Local Security Checks
critical
102698ESXi 6.0 < Build 5485776 Multiple Vulnerabilities (VMSA-2017-0015) (remote check)NessusMisc.
high
103241RHEL 6 : JBoss Core Services (RHSA-2017:2710)NessusRed Hat Local Security Checks
critical
103240RHEL 7 : JBoss Core Services (RHSA-2017:2709)NessusRed Hat Local Security Checks
critical
103190AIX Java Advisory : java_jan2017_advisory.asc (January 2017 CPU) (SWEET32)NessusAIX Local Security Checks
critical
101845Oracle E-Business Multiple Vulnerabilities (July 2017 CPU) (SWEET32)NessusMisc.
critical
101836Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32)NessusDatabases
critical
101248GLSA-201707-01 : IcedTea: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
101045Tenable SecurityCenter OpenSSL 1.0.1 < 1.0.1u Multiple Vulnerabilities (SWEET32)NessusMisc.
critical
100540SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1444-1)NessusSuSE Local Security Checks
critical
100380IBM Informix Dynamic Server 11.50.xCn < 11.50.xC9 / 11.70.xCn < 11.70.xC9 / 12.10.xCn < 12.10.xC8W2 Multiple Vulnerabilities (SWEET32)NessusDatabases
critical
100094RHEL 6 : java-1.7.1-ibm (RHSA-2017:1216)NessusRed Hat Local Security Checks
critical
99930Oracle Secure Global Desktop Multiple Vulnerabilities (April 2017 CPU) (SWEET32)NessusMisc.
critical
99847EulerOS 2.0 SP1 : python (EulerOS-SA-2016-1090)NessusHuawei Local Security Checks
high
99724Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : nss vulnerabilities (USN-3270-1)NessusUbuntu Local Security Checks
critical
99594Oracle Enterprise Manager Grid Control Multiple Vulnerabilities (April 2017 CPU) (SWEET32)NessusMisc.
critical
99083SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2017:0839-1)NessusSuSE Local Security Checks
high
97830SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2017:0720-1)NessusSuSE Local Security Checks
high
97829SUSE SLES11 Security Update : java-1_7_1-ibm (SUSE-SU-2017:0719-1)NessusSuSE Local Security Checks
high
97826SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2017:0716-1)NessusSuSE Local Security Checks
high
97630RHEL 6 / 7 : java-1.8.0-ibm (RHSA-2017:0462)NessusRed Hat Local Security Checks
high
97477F5 Networks BIG-IP : OpenSSL vulnerability (K13167034)NessusF5 Networks Local Security Checks
high
97462RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2017:0338)NessusRed Hat Local Security Checks
critical
97461RHEL 5 : java-1.7.0-ibm (RHSA-2017:0337)NessusRed Hat Local Security Checks
critical
97460RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2017:0336)NessusRed Hat Local Security Checks
critical
97296SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2017:0490-1)NessusSuSE Local Security Checks
critical
97287openSUSE Security Update : java-1_7_0-openjdk (openSUSE-2017-278)NessusSuSE Local Security Checks
critical
97209Ubuntu 12.04 LTS : openjdk-6 vulnerabilities (USN-3198-1)NessusUbuntu Local Security Checks
critical
97192Tenable Nessus 6.x < 6.9 Multiple Vulnerabilities (TNS-2016-16) (SWEET32)NessusCGI abuses : XSS
critical
97187SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2017:0460-1)NessusSuSE Local Security Checks
critical
97122Scientific Linux Security Update : java-1.7.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64 (20170213)NessusScientific Linux Local Security Checks
critical
97084Ubuntu 12.04 LTS / 14.04 LTS : openjdk-7 vulnerabilities (USN-3194-1)NessusUbuntu Local Security Checks
critical
97002openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2017-201)NessusSuSE Local Security Checks
critical
96926SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2017:0346-1)NessusSuSE Local Security Checks
critical
96809Amazon Linux AMI : java-1.8.0-openjdk (ALAS-2017-791)NessusAmazon Linux Local Security Checks
critical
96796Ubuntu 16.04 LTS / 16.10 : openjdk-8 vulnerabilities (USN-3179-1)NessusUbuntu Local Security Checks
critical
96787GLSA-201701-65 : Oracle JRE/JDK: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
96771MySQL Enterprise Monitor 3.3.x < 3.3.1.1112 Multiple Vulnerabilities (SWEET32) (January 2017 CPU)NessusCGI abuses
critical
96770MySQL Enterprise Monitor 3.2.x < 3.2.5.1141 Multiple Vulnerabilities (SWEET32) (January 2017 CPU)NessusCGI abuses
critical
96767MySQL Enterprise Monitor 3.1.x < 3.1.5.7958 Multiple Vulnerabilities (SWEET32) (January 2017 CPU)NessusCGI abuses
high
96757Scientific Linux Security Update : java-1.8.0-openjdk on SL6.x, SL7.x i386/x86_64 (20170120)NessusScientific Linux Local Security Checks
critical
96629Oracle Java SE Multiple Vulnerabilities (January 2017 CPU) (Unix) (SWEET32)NessusMisc.
critical
96628Oracle Java SE Multiple Vulnerabilities (January 2017 CPU) (SWEET32)NessusWindows
critical
96337Tenable Passive Vulnerability Scanner 5.x < 5.2.0 Multiple Vulnerabilities (SWEET32)NessusMisc.
critical
96316Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10759) (SWEET32)NessusJunos Local Security Checks
critical
96165Slackware 14.0 / 14.1 / 14.2 / current : python (SSA:2016-363-01) (httpoxy)NessusSlackware Local Security Checks
high
96145IBM BigFix Remote Control < 9.1.3 Multiple Vulnerabilities (SWEET32)NessusCGI abuses
critical
95602GLSA-201612-16 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
95255AIX OpenSSL Advisory : openssl_advisory21.asc (SWEET32)NessusAIX Local Security Checks
critical
94437SSL 64-bit Block Size Cipher Suites Supported (SWEET32)NessusGeneral
high
94198MySQL 5.7.x < 5.7.16 Multiple Vulnerabilities (October 2016 CPU) (SWEET32)NessusDatabases
critical
94197MySQL 5.6.x < 5.6.34 Multiple Vulnerabilities (October 2016 CPU) (SWEET32)NessusDatabases
critical
94167MySQL 5.7.x < 5.7.16 Multiple Vulnerabilities (October 2016 CPU) (SWEET32)NessusDatabases
critical
94166MySQL 5.6.x < 5.6.34 Multiple Vulnerabilities (October 2016 CPU) (SWEET32)NessusDatabases
critical
94095OracleVM 3.2 : openssl (OVMSA-2016-0141)NessusOracleVM Local Security Checks
critical
94094Oracle Linux 5 : openssl (ELSA-2016-3627)NessusOracle Linux Local Security Checks
critical
94086openSUSE Security Update : compat-openssl098 (openSUSE-2016-1189)NessusSuSE Local Security Checks
critical
94021Amazon Linux AMI : openssl (ALAS-2016-755)NessusAmazon Linux Local Security Checks
critical
94002openSUSE Security Update : nodejs (openSUSE-2016-1172)NessusSuSE Local Security Checks
high
93909SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2016:2468-1)NessusSuSE Local Security Checks
critical
93893SUSE SLES11 Security Update : openssl (SUSE-SU-2016:2458-1)NessusSuSE Local Security Checks
critical
93815OpenSSL 1.0.2 < 1.0.2i Multiple Vulnerabilities (SWEET32)NessusWeb Servers
critical
93814OpenSSL 1.0.1 < 1.0.1u Multiple Vulnerabilities (SWEET32)NessusWeb Servers
critical
93795Scientific Linux Security Update : openssl on SL6.x, SL7.x i386/x86_64 (20160927)NessusScientific Linux Local Security Checks
critical
93783openSUSE Security Update : openssl (openSUSE-2016-1134)NessusSuSE Local Security Checks
critical
93765SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2016:2394-1)NessusSuSE Local Security Checks
critical
93761OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0135)NessusOracleVM Local Security Checks
critical
93756openSUSE Security Update : openssl (openSUSE-2016-1130)NessusSuSE Local Security Checks
critical
93734SUSE SLES12 Security Update : openssl (SUSE-SU-2016:2387-1)NessusSuSE Local Security Checks
critical
93715Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : openssl regression (USN-3087-2)NessusUbuntu Local Security Checks
critical
93684Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : openssl vulnerabilities (USN-3087-1)NessusUbuntu Local Security Checks
critical
93674FreeBSD : OpenSSL -- multiple vulnerabilities (43eaa656-80bc-11e6-bf52-b499baebfeaf)NessusFreeBSD Local Security Checks
critical
93668Debian DSA-3673-1 : openssl - security updateNessusDebian Local Security Checks
critical
93663Slackware 14.0 / 14.1 / 14.2 / current : openssl (SSA:2016-266-01)NessusSlackware Local Security Checks
critical
93112OpenSSL < 1.0.2i Default Weak 64-bit Block Cipher (SWEET32)NessusWeb Servers
high
92542Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (July 2016 CPU)NessusWeb Servers
low
86569Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (October 2015 CPU)NessusWeb Servers
high
81002Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2015 CPU)NessusWeb Servers
high
42873SSL Medium Strength Cipher Suites Supported (SWEET32)NessusGeneral
high