This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Mozilla Project reports :
Firefox user zbyte reported a crash that we determined could result in
an exploitable memory corruption problem. In certain cases after a
return from a native function, such as escape(), the Just-in-Time
(JIT) compiler could get into a corrupt state. This could be exploited
by an attacker to run arbitrary code such as installing malware.
This vulnerability does not affect earlier versions of Firefox which
do not support the JIT feature.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true