Summary
The remote host is running the QuiXplorer CGI suite, a file manager for websites written in PHP.
There is a floaw in the remote version of this CGI which makes it vulnerable to a directory traversal bug.
This could, for instance, lead to an attacker downloading the /etc/passwd file.
Solution
Upgrade to version 2.3.1 - http://quixplorer.sourceforge.net/