Summary
The target is running at least one instance of IlohaMail version 0.7.9-RC2 or earlier. Such versions do not properly check the upload path for file attachments, which may allow an attacker to place a file on the target in a location writable by the web user if the file-based backend is in use.
For a discussion of this vulnerability, see :
http://ilohamail.org/forum/view_thread.php?topic_id=5&id=561
***** OVS has determined the vulnerability exists on the target ***** simply by looking at the version number of IlohaMail ***** installed there.
Solution
Upgrade to IlohaMail version 0.7.9 or later.