This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
A Mozilla Foundation Security Advisory reports :
Two vulnerabilities have been discovered in Firefox, which can be
exploited by malicious people to conduct cross-site scripting attacks
and compromise a user's system.
protected from being executed in context of another URL in the history
list. This can be exploited to execute arbitrary HTML and script code
in a user's browser session in context of an arbitrary site.
- Input passed to the 'IconURL' parameter in
'InstallTrigger.install()' is not properly verified before being used.
Successful exploitation requires that the site is allowed to install
software (default sites are 'update.mozilla.org' and
A combination of vulnerability 1 and 2 can be exploited to execute
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.1
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19155 (freebsd_pkg_eca6195ac23311d9804c02061b08fc24.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now