The remote host has a web browser installed that is vulnerable to multiple attack vectors.
The remote host is using Firefox. The remote version of this software contains the following security flaws: 1) There is a flaw in the way that the browser handle scripting within 'tabbed' cross-domains. An attacker exploiting this flaw would need to be able to coerce a user into clicking on a malicious URL which would then open a separate 'TAB' within the browser. The attacker could then retrieve data relevant to other tabbed connections or execute code locally. 2)There is a flaw in the default about: config script that would allow an attacker to modify configuration data. In order to execute such an attack, the attacker would need to be able to entice the user into visiting or clicking on a malicious URL. A successful attacker would be able to modify the local configuration file, resulting in enhanced access rights or other potential exploits.
Upgrade to Firefox 1.0.1 or higher.