Apache Tomcat Server is running on this host and that is prone to security bypass vulnerability.
Successful attempt could lead to remote code execution and attacker can gain access to context of the filtered value. Impact Level: Application
Upgrade to Apache Tomcat version 4.1.32, or 5.5.1, or later, http://archive.apache.org/dist/tomcat/
Flaw in the application is due to the synchronisation problem when checking IP addresses. This could allow user from a non permitted IP address to gain access to a context that is protected with a valve that extends RemoteFilterValve including the standard RemoteAddrValve and RemoteHostValve implementations.
Apache Tomcat version 4.1.x - 4.1.31, and 5.5.0