This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia Research reports :
Secunia Research has discovered a vulnerability in DokuWiki, which can
be exploited by malicious people to conduct cross-site scripting
Input passed to the 'ns' POST parameter in lib/exe/ajax.php (when
'call' is set to 'medialist' and 'do' is set to 'media') is not
properly sanitised within the 'tpl_mediaFileList()' function in
inc/template.php before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 4.3