This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The Drupal Project reports :
Some server variables are not escaped consistently. When a malicious
user is able to entice a victim to visit a specially crafted link or
webpage, arbitrary HTML and script code can be injected and executed
in the context of the victim's session on the targeted website.
Custom content type names are not escaped consistently. A malicious
user with the 'administer content types' permission would be able to
inject and execute arbitrary HTML and script code on the website.
Revoking the 'administer content types' permission provides an
See also :
Update the affected packages.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 25803 (freebsd_pkg_1f5b711b3d0e11dcb3d30016179b2dd5.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now