[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Apache Tomcat

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 563
Security Risk Critical
R
D
Download
C
CVE-2019-0232
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 961
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
peewpw
Exploits:
1
BusinessLevel:
3
7 174
Security Risk High
R
D
Download
C
CVE-2016-6816
Verified by 0day Admin
free
You can open this exploit for free
justpentest
Exploits:
4
BusinessLevel:
4
8 222
Security Risk Critical
R
D
Download
C
CVE-2009-3843
CVE-2009-4189
CVE-2009-4188
CVE-2010-0557
CVE-2010-4094
CVE-2009-3548
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 020
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
7 651
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mywisdom
Exploits:
3
BusinessLevel:
7
6 829
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Deniz Cevik
Exploits:
1
BusinessLevel:
7
unsorted
4 375
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Kew
Exploits:
1
BusinessLevel:
7
unsorted
4 936
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
D. Matscheko
Exploits:
1
BusinessLevel:
7
5 521
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Simon Ryeo
Exploits:
3
BusinessLevel:
8
5 071
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
INetCop Security
Exploits:
3
BusinessLevel:
8
5 327
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
h3rcul3s
Exploits:
1
BusinessLevel:
8
5 971
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
eliteboy
Exploits:
5
BusinessLevel:
9
5 076
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Xpl017Elz
Exploits:
11
BusinessLevel:
11
5 473
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ScanAlert Security
Exploits:
1
BusinessLevel:
9

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 685
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 339
Security Risk High
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 099
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
4 935
Security Risk Critical
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
unsorted
5 419
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 483
Security Risk Medium
R
D
Download
C
CVE-2024-21733
Verified by 0day Admin
free
You can open this exploit for free
xer0dayz
Exploits:
1
BusinessLevel:
0
2 320
Security Risk Medium
R
D
Download
C
CVE-2019-0221
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
2 376
Security Risk Low
R
D
Download
C
CVE-2018-11784
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
1 509
Security Risk High
R
D
Download
C
CVE-2020-1938
Verified by 0day Admin
free
You can open this exploit for free
SunCSR
Exploits:
22
BusinessLevel:
3
4 152
Security Risk High
R
D
Download
C
CVE-2020-10487
Verified by 0day Admin
free
You can open this exploit for free
YDHCUI
Exploits:
1
BusinessLevel:
2
4 922
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
intx0x80
Exploits:
1
BusinessLevel:
3
4 259
Security Risk Critical
R
D
Download
C
CVE-2017-12615
Verified by 0day Admin
free
You can open this exploit for free
xxlegend
Exploits:
1
BusinessLevel:
3
5 868
Security Risk Low
R
D
Download
C
CVE-2013-6357
Verified by 0day Admin
free
You can open this exploit for free
Ivano Binetti
Exploits:
28
BusinessLevel:
8
unsorted
5 008
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
unsorted
4 688
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
MustLive
Exploits:
49
BusinessLevel:
10

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 817
Security Risk Medium
R
D
Download
C
CVE-2022-29885
Verified by 0day Admin
free
You can open this exploit for free
Cristian Giustini
Exploits:
2
BusinessLevel:
1
6 069
Security Risk Medium
R
D
Download
C
CVE-2014-0050
Verified by 0day Admin
free
You can open this exploit for free
Trustwave's Spide.
Exploits:
8
BusinessLevel:
6