Anonymous authentication
The server resources can be accessed anonymously.
The server resources can be accessed anonymously.
Brute Force attack was successful against the server.
The server can be accessed using well-known credentials.
The server contains known vulnerabilities.
The server can be accessed using unauthorized applications.
The server can be accessed using unauthorized users.
The server allows access using user-provided credentials.