The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the e0f26ac5-6a17-11ed-93e7-901b0e9408dc advisory. - Tailscale team reports: A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. (CVE-2022-41925) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Tailscale daemon is vulnerable to information disclosure via CSRF