The remote host is running software that should be authorized with respect to corporate policy.
Description
The remote server is running a MetaSploit Framework server. Metasploit allows users to automatically exploit and backdoor vulnerable applications via the network.
Solution
Ensure that this application is authorized according to corporate policies and guidelines.