This host is running Apache Struts and is prone to Directory Traversal Vulnerability.
Successful exploitation will let the attacker launch directory traversal attack and gain sensitive information about the remote system directory contents. Impact Level: System/Application
Upgrade to Apache Struts version 2.0.12, 2.1.3 or later. http://struts.apache.org/download.cgi
Input validation error within the user supplied request URI while read arbitrary files via '../' with a '/struts/' path which is related to FilterDispatcher and DefaultStaticContentLoader.
Apache Struts version 2.0.x and prior to 2.0.12 Apache Struts version 2.1.x and prior to 2.1.3