How to remediate – ICAP Server Type and Version 1. Introduction An ICAP server is running on the remote host. This means a protocol for safely handling web traffic...
How to remediate – ICMP Domain Name Request 1. Introduction The ICMP Domain Name Request vulnerability means a remote host responds to requests for its DNS name using...
How to remediate – ICMP Netmask Request Information Disclosure 1. Introduction The ICMP Netmask Request Information Disclosure vulnerability affects systems that respond to ICMP_MASKREQ queries. This allows an attacker...
How to remediate – ICMP Node Information Query Information Disclosure 1. Introduction The ICMP Node Information Query vulnerability allows attackers to gather information about a remote host’s network configuration. This...
How to remediate – ICMP Timestamp Request Remote Date Disclosure 1. Introduction The ICMP Timestamp Request vulnerability (CVE-1999-0524) allows an attacker to determine the exact time set on a remote...
How to remediate – Identd Service Detection 1. Introduction The Identd Service Detection vulnerability means a remote host is running an identification service, also known as ‘auth’....
How to remediate – Inconsistent Hostname and IP Address 1. Introduction The remote host’s hostname is inconsistent with DNS information. This means the machine’s name doesn’t match what’s recorded...
How to remediate – Inter-Asterisk eXchange Protocol Detection 1. Introduction The Inter-Asterisk eXchange Protocol Detection vulnerability indicates that a system is running a server using the IAX2 protocol....
How to remediate – Internet Cache Protocol (ICP) Version 2 Detection 1. Introduction The Internet Cache Protocol (ICP) Version 2 Detection vulnerability indicates that an HTTP caching service is listening on...
How to remediate – Internet Gateway Device WAN Interface UPnP Access 1. Introduction The Internet Gateway Device WAN Interface UPnP Access vulnerability allows configuration changes on a remote IGD router’s WAN...