Detailed analysis of security vulnerabilities
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.