This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Input passed to unspecified parameters in pam_login.cgi is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true