[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Apache Tomcat

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 650
Security Risk Critical
R
D
Download
C
CVE-2019-0232
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
7 065
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
peewpw
Exploits:
1
BusinessLevel:
4
7 267
Security Risk High
R
D
Download
C
CVE-2016-6816
Verified by 0day Admin
free
You can open this exploit for free
justpentest
Exploits:
4
BusinessLevel:
4
8 338
Security Risk Critical
R
D
Download
C
CVE-2009-3843
CVE-2009-4189
CVE-2009-4188
CVE-2010-0557
CVE-2010-4094
CVE-2009-3548
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
8 102
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
7 725
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mywisdom
Exploits:
3
BusinessLevel:
7
6 906
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Deniz Cevik
Exploits:
1
BusinessLevel:
7
unsorted
4 454
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Kew
Exploits:
1
BusinessLevel:
7
unsorted
5 006
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
D. Matscheko
Exploits:
1
BusinessLevel:
7
5 587
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Simon Ryeo
Exploits:
3
BusinessLevel:
8
5 144
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
INetCop Security
Exploits:
3
BusinessLevel:
8
5 400
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
h3rcul3s
Exploits:
1
BusinessLevel:
9
6 041
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
eliteboy
Exploits:
5
BusinessLevel:
9
5 146
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Xpl017Elz
Exploits:
11
BusinessLevel:
11
5 555
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ScanAlert Security
Exploits:
1
BusinessLevel:
9

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 929
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
6 578
Security Risk High
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
5 186
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
5 020
Security Risk Critical
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
unsorted
5 502
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 733
Security Risk Medium
R
D
Download
C
CVE-2024-21733
Verified by 0day Admin
free
You can open this exploit for free
xer0dayz
Exploits:
1
BusinessLevel:
0
2 420
Security Risk Medium
R
D
Download
C
CVE-2019-0221
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
2 489
Security Risk Low
R
D
Download
C
CVE-2018-11784
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
1 596
Security Risk High
R
D
Download
C
CVE-2020-1938
Verified by 0day Admin
free
You can open this exploit for free
SunCSR
Exploits:
22
BusinessLevel:
3
4 239
Security Risk High
R
D
Download
C
CVE-2020-10487
Verified by 0day Admin
free
You can open this exploit for free
YDHCUI
Exploits:
1
BusinessLevel:
2
5 022
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
intx0x80
Exploits:
1
BusinessLevel:
4
4 349
Security Risk Critical
R
D
Download
C
CVE-2017-12615
Verified by 0day Admin
free
You can open this exploit for free
xxlegend
Exploits:
1
BusinessLevel:
4
5 938
Security Risk Low
R
D
Download
C
CVE-2013-6357
Verified by 0day Admin
free
You can open this exploit for free
Ivano Binetti
Exploits:
28
BusinessLevel:
8
unsorted
5 080
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
unsorted
4 766
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
MustLive
Exploits:
49
BusinessLevel:
11

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 013
Security Risk Medium
R
D
Download
C
CVE-2022-29885
Verified by 0day Admin
free
You can open this exploit for free
Cristian Giustini
Exploits:
2
BusinessLevel:
2
6 175
Security Risk Medium
R
D
Download
C
CVE-2014-0050
Verified by 0day Admin
free
You can open this exploit for free
Trustwave's Spide.
Exploits:
8
BusinessLevel:
6