This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Some vulnerabilities have been reported in Horde, which can be
exploited by malicious people to conduct phishing and cross-site
- Input passed to the 'url' parameter in index.php isn't properly
verified before it is being used to include an arbitrary website in a
frameset. This can e.g. be exploited to trick a user into believing
certain malicious content is served from a trusted website.
- Some unspecified input passed in index.php isn't properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 22241 (freebsd_pkg_e2e8d3742e4011dbb6830008743bf21a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now