This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
A Mozilla Foundation Security Advisory reports :
Some security checks intended to prevent script injection were
view-source : pseudo-protocol. Michael Krax demonstrated that a
variant of his favicon exploit could still execute arbitrary code, and
the same technique could also be used to perform cross-site scripting.
with the jar: pseudo-protocol.
L. David Baron discovered a nested variant that defeated checks in the
script security manager.
See also :
Update the affected packages.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19070 (freebsd_pkg_a81746a1c2c711d989f702061b08fc24.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now