This script is Copyright (C) 2003-2013 Digital Defense Inc.
The remote host has an application that can be accessed with
This host appears to be the running the Apache Tomcat
Servlet engine with the default accounts still configured.
A potential intruder could reconfigure this service in a way
that grants system access.
Change the default passwords by editing the
admin-users.xml file located in the /conf/users
subdirectory of the Tomcat installation.
Risk factor :
High / CVSS Base Score : 7.5