This indicates detection of a malicious file access through HTTP.
Without sufficient validation, a malicious file can cause remote code execution or denial-of-service condition in the context of the affect system.
System Compromise: Remote attackers can gain control of vulnerable systems.
Use AntiVirus software to scan and clean the system.
Monitor the traffic from that network for any suspicious activity.
Apply the most recent upgrade or patch for all relevant softwares.