This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Opera reports :
Certain constructs are not escaped correctly by Opera's History Search
results. These can be used to inject scripts into the page, which can
then be used to look through the user's browsing history, including
the contents of the pages they have visited. These may contain
feature, when the user activates Fast Forward, the script should run
on the current page. When a page is held in a frame, the script is
incorrectly executed on the outermost page, not the page where the URL
was located. This can be used to execute scripts in the context of an
unrelated frame, which allows cross-site scripting.
When Opera is previewing a news feed, some scripts are not correctly
blocked. These scripts are able to subscribe the user to any feed URL
that the attacker chooses, and can also view the contents of any feeds
that the user is subscribed to. These may contain sensitive
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.8
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 34508 (freebsd_pkg_f5c4d7f79f4b11ddbab1001999392805.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now