This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
A vulnerability has been reported in Nagios, which can be exploited by
malicious users to potentially compromise a vulnerable system.
Input passed to the 'ping' parameter in statuswml.cgi is not properly
sanitised before being used to invoke the ping command. This can be
exploited to inject and execute arbitrary shell commands.
Successful exploitation requires access to the ping feature of the WAP
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true