Summary
This host is running osCSS2 and is to prone directory traversal vulnerability.
Impact
Successful exploitation could allow attackers to perform directory traversal attacks and read arbitrary files on the affected application.
Impact Level: Application
Solution
Upgrade to osCSS2 svn branche 2.1.0 stable version or later For updates refer to http://download.oscss.org/
Insight
The flaw is due to input validation error in 'id' parameter to 'shopping_cart.php' and 'content.php', which allows attackers to read arbitrary files via a ../(dot dot) sequences.
Affected
osCSS2 version 2.1.0
References