An SSH server allows authentication through the .rhosts file.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
2 reference(s) from NVD