This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
A vulnerability has been reported in Plans, which can be exploited by
malicious people to conduct SQL injection attacks.
Input passed to the 'evt_id' parameter in 'plans.cgi' isn't properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation requires that SQL database support has been
enabled in 'plans_config.pl' (the default setting is flat files).
Some vulnerabilities have been reported in Plans, which can be
exploited by malicious people to conduct cross-site scripting attacks
or gain knowledge of sensitive information.
Input passed to various unspecified parameters is not properly
sanitised before being returned to users. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of a vulnerable site.
An unspecified error can be exploited to gain knowledge of the MySQL
See also :
Update the affected package.
Risk factor :