The remote host is missing an update to epiphany announced via advisory MDVSA-2009:048-2.
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:048-2
Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory (CVE-2008-5985). This update provides fix for that vulnerability. Update: The previous update package was not built against the correct (latest) libxulrunner-22.214.171.124 library (fixes #48163) Affected: 2008.1