This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Windows host has a web browser installed that is affected
by multiple vulnerabilities.
The remote host is using Mozilla and/or Firefox, an alternative web
browser. This web browser supports the XUL (XML User Interface
Language), a language designed to manipulate the user interface of the
Since XUL gives the full control of the browser GUI to the visited
websites, an attacker may use it to spoof a third-party website and,
therefore, pretend that the URL and Certificates of the website are
In addition to this, the remote version of this browser is vulnerable
to a flaw which may allow a malicious website to spoof security
properties such as SSL certificates and URIs.
See also :
There is no known solution at this time.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true