This script is Copyright (C) 2003-2016 Digital Defense Inc.
The remote host has an application that can be accessed with
This host appears to be the running the Apache Tomcat
Servlet engine with the default accounts still configured.
A potential intruder could reconfigure this service in a way
that grants system access.
Change the default passwords by editing the admin-users.xml file
located in the /conf/users subdirectory of the Tomcat installation.
Risk factor :
High / CVSS Base Score : 7.5