[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-10412":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":46,"name":47,"published":48,"updated":34},10412,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":34,"public_description":35,"public_recommendation":36,"recommendation":34,"references":37,"cvssv3":34,"epss_score":40,"epss_percentile":41,"cve":42,"in_cisa_catalog":44,"date":45,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"The remote host is running a discard service. This service typically sets up a listening socket and will ignore all the data which it receives. This service is unused these days, so it is advised that you disable it.","- Under Unix systems, comment out the discard line in /etc/inetd.conf and restart the inetd process - Under Windows systems, set the following registry key to 0: HKLM\\System\\CurrentControlSet\\Services\\SimpTCP\\Parameters\\EnableTcpDiscard Then launch cmd.exe and type: net stop simptcp net start simptcp To restart the service. Notes: Some firewall devices are known to discard packets on the checked port 9/tcp or mimic such a service via other means. Scanning through a firewall should be generally avoided (Please see references). If the target was scanned through a firewall and it was determined / has been verified that no such service is running on the target please either: - create an override for this result - configure the firewall in a way that port 9/tcp is not reported as being open during the port scanning phase / it is not allowed to open a TCP connection to port 9/tcp on the target",[38,39],"https://datatracker.ietf.org/doc/html/rfc863","https://docs.greenbone.net/GSM-Manual/gos-22.04/en/read-before-use.html#scanning-through-network-equipment",0.00467,0.64436,[43],"CVE-1999-0636",false,"1999-01-01T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.11367","Check for discard Service (TCP)","2020-09-22T00:00:00Z"]