This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Input passed via the HTTP 'Host' header is not properly sanitised
before being used. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected site
if malicious data is viewed.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.3