The remote host has been found to be COMPLIANT with the PCI DSS external scanning requirements.
Description
The remote host is vulnerable to one or more conditions that are considered to be 'information leakage' and so are not automatic failures according to the PCI DSS Approved Scanning Vendors Program Guide (version 4.0). These information leakage issues include one or more of the following : - Detailed application error messages - Backup script files (for example,home.asp.bak, index.jsp.old, etc.) - Include file source code disclosure - Insecure HTTP methods enabled - WebDAV or FrontPage extensions enabled - Default web server files - Testing and diagnostics pages (for example,phpinfo.html, test-cgi, etc. Details of the failed items may be found in the 'Output' section of this plugin result.
Solution
Ensure compliance with PCI DSS Approved Scanning Vendors Program Guide (version 4.0)