This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
secunia reports :
Stefan Esser has reported a vulnerability in Piwik, which can be
exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to the core/Cookie.php script using
'unserialize()' with user controlled input. This can be exploited to
e.g. execute arbitrary PHP code via the '__wakeup()' or '__destruct()'
methods of a serialized object passed via an HTTP cookie.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true