Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:

Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:
* SSH Version
* Host key size
* Public key size
* Authentication methods in use
* Number of authorized_keys in RSA authentication
* Encryption methods in use
* Password lengths or ranges of lengths
* Lengths of shell commands
Brijeshk9Asked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
gheistConnect With a Mentor Commented:
This is not related to any sort of "website"
"may include" is not a strict expression. No action should be taken.
Event ehough if you never patched your SSH server, then you should find a way to get patches from your vendor - some real attacks are possible against 5yo SSH server.
0
 
gheistConnect With a Mentor Commented:
SSH protocol publishes first four and 6th by protocol design. You cannot avoid them. It is just for scaring you.
Rest needs authenticated session.
0
 
Brijeshk9Author Commented:
so is there any action required to remove this  kind of Website Vulnerabilities..?
0
 
Brijeshk9Author Commented:
Thanks
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.