This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Two vulnerabilities have been reported in Mailman, which can be
exploited by malicious users to conduct script insertion attacks.
Certain input passed via the list descriptions is not properly
sanitised before being displayed to the user. This can be exploited to
insert arbitrary HTML and script code, which will be executed in a
user's browser session in context of an affected site when the
malicious data is being viewed.
Successful exploitation requires 'list owner' permissions.
See also :
Update the affected package.
Risk factor :
Low / CVSS Base Score : 3.5
CVSS Temporal Score : 3.0
Public Exploit Available : true