Hello
Nahuel,
First of all thank you for your response.
Do you have any idea how to handle this. I have searched a bit but i'm
out of options at the moment.
For my case mentioned vulnerability is on wazuh-api and it runs on port 55000.
The exact process is like below
root@w1:~# netstat -ntlpu | grep 55000
tcp 0 0
0.0.0.0:55000 0.0.0.0:* LISTEN 479452/python3
root@w1:~# ps aux | grep 479452
wazuh 479452 0.0 0.2 694336 43836 ? Sl Aug17 0:39 /var/ossec/framework/python/bin/python3 /var/ossec/api/scripts/wazuh-apid.py
root@w1:~#
Many Thanks In Advance