This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Monitorix Project reports :
A serious bug in the built-in HTTP server. It was discovered that the
handle_request() routine did not properly perform input sanitization
which led into a number of security vulnerabilities. An
unauthenticated, remote attacker could exploit this flaw to execute
arbitrary commands on the remote host. All users still using older
versions are advised to upgrade to this version, which resolves this
See also :
Update the affected package.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now