This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Some vulnerabilities have been reported in Joomla!, where some have
unknown impacts and one can be exploited by malicious people to
conduct cross-site scripting attacks.
- Input passed to an unspecified parameter is not properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
- The vulnerabilities are caused due to unspecified errors in Joomla!.
The vendor describes them as 'several low level security issues'. No
further information is currently available.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 24227 (freebsd_pkg_7bb127c1a5aa11db9ddc0011098b2f36.nasl)
Bugtraq ID: 21810
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now