This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote Mac OS X host contains a web browser that is affected by
a security bypass vulnerability.
The version of Mozilla Firefox installed on the remote Mac OS X host
is prior to 44.0.2. It is, therefore, affected by a security bypass
vulnerability due to improper restriction of interaction between
service workers and plugins. An unauthenticated, remote attacker can
exploit this, via a crafted web site that triggers spoofed responses
to requests that use NPAPI, to bypass the same-origin policy.
See also :
Upgrade to Mozilla Firefox version 44.0.2 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false