This host is running Arkeia Appliance and is affected by a path traversal vulnerability.
Successful exploitation will allow remote attackers to perform directory traversal attacks and read arbitrary files on the affected application. arbitrary data.
For updates refer to http://www.arkeia.com/
Path traversal enables attackers access to files and directories outside the web root through relative file paths in the user input.
Arkeia Appliance Version 10.2.7 and prior.
Send a crafted HTTP POST request and check is it possible to read a system file.