[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Apache Tomcat

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 719
Security Risk Critical
R
D
Download
C
CVE-2019-0232
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
7 136
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
peewpw
Exploits:
1
BusinessLevel:
4
7 324
Security Risk High
R
D
Download
C
CVE-2016-6816
Verified by 0day Admin
free
You can open this exploit for free
justpentest
Exploits:
4
BusinessLevel:
4
8 386
Security Risk Critical
R
D
Download
C
CVE-2009-3843
CVE-2009-4189
CVE-2009-4188
CVE-2010-0557
CVE-2010-4094
CVE-2009-3548
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
8 153
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
7 770
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mywisdom
Exploits:
3
BusinessLevel:
7
6 949
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Deniz Cevik
Exploits:
1
BusinessLevel:
7
unsorted
4 498
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Kew
Exploits:
1
BusinessLevel:
8
unsorted
5 049
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
D. Matscheko
Exploits:
1
BusinessLevel:
8
5 636
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Simon Ryeo
Exploits:
3
BusinessLevel:
9
5 196
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
INetCop Security
Exploits:
3
BusinessLevel:
9
5 448
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
h3rcul3s
Exploits:
1
BusinessLevel:
9
6 088
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
eliteboy
Exploits:
5
BusinessLevel:
9
5 195
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Xpl017Elz
Exploits:
11
BusinessLevel:
11
5 599
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ScanAlert Security
Exploits:
1
BusinessLevel:
9

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
6 024
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
6 660
Security Risk High
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
5 244
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
5 073
Security Risk Critical
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
unsorted
5 552
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 823
Security Risk Medium
R
D
Download
C
CVE-2024-21733
Verified by 0day Admin
free
You can open this exploit for free
xer0dayz
Exploits:
1
BusinessLevel:
0
2 461
Security Risk Medium
R
D
Download
C
CVE-2019-0221
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
2 532
Security Risk Low
R
D
Download
C
CVE-2018-11784
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
1 643
Security Risk High
R
D
Download
C
CVE-2020-1938
Verified by 0day Admin
free
You can open this exploit for free
SunCSR
Exploits:
22
BusinessLevel:
3
4 292
Security Risk High
R
D
Download
C
CVE-2020-10487
Verified by 0day Admin
free
You can open this exploit for free
YDHCUI
Exploits:
1
BusinessLevel:
2
5 091
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
intx0x80
Exploits:
1
BusinessLevel:
4
4 414
Security Risk Critical
R
D
Download
C
CVE-2017-12615
Verified by 0day Admin
free
You can open this exploit for free
xxlegend
Exploits:
1
BusinessLevel:
4
5 982
Security Risk Low
R
D
Download
C
CVE-2013-6357
Verified by 0day Admin
free
You can open this exploit for free
Ivano Binetti
Exploits:
28
BusinessLevel:
8
unsorted
5 123
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
unsorted
4 805
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
MustLive
Exploits:
49
BusinessLevel:
11

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 115
Security Risk Medium
R
D
Download
C
CVE-2022-29885
Verified by 0day Admin
free
You can open this exploit for free
Cristian Giustini
Exploits:
2
BusinessLevel:
2
6 219
Security Risk Medium
R
D
Download
C
CVE-2014-0050
Verified by 0day Admin
free
You can open this exploit for free
Trustwave's Spide.
Exploits:
8
BusinessLevel:
6