This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A race condition flaw was found in the way XULRunner handled Document
Object Model (DOM) element properties. Malicious HTML content could
cause an application linked against XULRunner (such as Firefox) to
crash or, potentially, execute arbitrary code with the privileges of
the user running the application. (CVE-2010-3765)
After installing the update, applications using XULRunner must be
restarted for the changes to take effect.
See also :
Update the affected xulrunner and / or xulrunner-devel packages.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true