[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Apache Tomcat

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 692
Security Risk Critical
R
D
Download
C
CVE-2019-0232
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
7 111
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
peewpw
Exploits:
1
BusinessLevel:
4
7 301
Security Risk High
R
D
Download
C
CVE-2016-6816
Verified by 0day Admin
free
You can open this exploit for free
justpentest
Exploits:
4
BusinessLevel:
4
8 368
Security Risk Critical
R
D
Download
C
CVE-2009-3843
CVE-2009-4189
CVE-2009-4188
CVE-2010-0557
CVE-2010-4094
CVE-2009-3548
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
8 135
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
7 754
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mywisdom
Exploits:
3
BusinessLevel:
7
6 932
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Deniz Cevik
Exploits:
1
BusinessLevel:
7
unsorted
4 480
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Kew
Exploits:
1
BusinessLevel:
8
unsorted
5 032
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
D. Matscheko
Exploits:
1
BusinessLevel:
8
5 616
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Simon Ryeo
Exploits:
3
BusinessLevel:
8
5 174
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
INetCop Security
Exploits:
3
BusinessLevel:
8
5 431
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
h3rcul3s
Exploits:
1
BusinessLevel:
9
6 070
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
eliteboy
Exploits:
5
BusinessLevel:
9
5 175
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Xpl017Elz
Exploits:
11
BusinessLevel:
11
5 583
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ScanAlert Security
Exploits:
1
BusinessLevel:
9

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 984
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
6 622
Security Risk High
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 222
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
5 054
Security Risk Critical
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
unsorted
5 528
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 779
Security Risk Medium
R
D
Download
C
CVE-2024-21733
Verified by 0day Admin
free
You can open this exploit for free
xer0dayz
Exploits:
1
BusinessLevel:
0
2 442
Security Risk Medium
R
D
Download
C
CVE-2019-0221
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
2 514
Security Risk Low
R
D
Download
C
CVE-2018-11784
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
1 624
Security Risk High
R
D
Download
C
CVE-2020-1938
Verified by 0day Admin
free
You can open this exploit for free
SunCSR
Exploits:
22
BusinessLevel:
3
4 270
Security Risk High
R
D
Download
C
CVE-2020-10487
Verified by 0day Admin
free
You can open this exploit for free
YDHCUI
Exploits:
1
BusinessLevel:
2
5 069
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
intx0x80
Exploits:
1
BusinessLevel:
4
4 392
Security Risk Critical
R
D
Download
C
CVE-2017-12615
Verified by 0day Admin
free
You can open this exploit for free
xxlegend
Exploits:
1
BusinessLevel:
4
5 968
Security Risk Low
R
D
Download
C
CVE-2013-6357
Verified by 0day Admin
free
You can open this exploit for free
Ivano Binetti
Exploits:
28
BusinessLevel:
8
unsorted
5 106
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
unsorted
4 791
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
MustLive
Exploits:
49
BusinessLevel:
11

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 056
Security Risk Medium
R
D
Download
C
CVE-2022-29885
Verified by 0day Admin
free
You can open this exploit for free
Cristian Giustini
Exploits:
2
BusinessLevel:
2
6 203
Security Risk Medium
R
D
Download
C
CVE-2014-0050
Verified by 0day Admin
free
You can open this exploit for free
Trustwave's Spide.
Exploits:
8
BusinessLevel:
6