[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Apache Tomcat

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 597
Security Risk Critical
R
D
Download
C
CVE-2019-0232
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
7 003
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
peewpw
Exploits:
1
BusinessLevel:
3
7 212
Security Risk High
R
D
Download
C
CVE-2016-6816
Verified by 0day Admin
free
You can open this exploit for free
justpentest
Exploits:
4
BusinessLevel:
4
8 271
Security Risk Critical
R
D
Download
C
CVE-2009-3843
CVE-2009-4189
CVE-2009-4188
CVE-2010-0557
CVE-2010-4094
CVE-2009-3548
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 045
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
7 679
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mywisdom
Exploits:
3
BusinessLevel:
7
6 856
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Deniz Cevik
Exploits:
1
BusinessLevel:
7
unsorted
4 400
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Kew
Exploits:
1
BusinessLevel:
7
unsorted
4 960
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
D. Matscheko
Exploits:
1
BusinessLevel:
7
5 548
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Simon Ryeo
Exploits:
3
BusinessLevel:
8
5 098
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
INetCop Security
Exploits:
3
BusinessLevel:
8
5 351
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
h3rcul3s
Exploits:
1
BusinessLevel:
8
5 994
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
eliteboy
Exploits:
5
BusinessLevel:
9
5 098
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Xpl017Elz
Exploits:
11
BusinessLevel:
11
5 498
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ScanAlert Security
Exploits:
1
BusinessLevel:
9

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 783
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
6 433
Security Risk High
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
5 140
Security Risk High
R
D
Download
C
CVE-2016-5425
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
4 971
Security Risk Critical
R
D
Download
C
CVE-2016-1240
Verified by 0day Admin
free
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
unsorted
5 450
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 587
Security Risk Medium
R
D
Download
C
CVE-2024-21733
Verified by 0day Admin
free
You can open this exploit for free
xer0dayz
Exploits:
1
BusinessLevel:
0
2 359
Security Risk Medium
R
D
Download
C
CVE-2019-0221
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
2 412
Security Risk Low
R
D
Download
C
CVE-2018-11784
Verified by 0day Admin
free
You can open this exploit for free
Central InfoSec
Exploits:
5
BusinessLevel:
2
1 537
Security Risk High
R
D
Download
C
CVE-2020-1938
Verified by 0day Admin
free
You can open this exploit for free
SunCSR
Exploits:
22
BusinessLevel:
3
4 181
Security Risk High
R
D
Download
C
CVE-2020-10487
Verified by 0day Admin
free
You can open this exploit for free
YDHCUI
Exploits:
1
BusinessLevel:
2
4 955
Security Risk Critical
R
D
Download
C
CVE-2017-12617
Verified by 0day Admin
free
You can open this exploit for free
intx0x80
Exploits:
1
BusinessLevel:
3
4 288
Security Risk Critical
R
D
Download
C
CVE-2017-12615
Verified by 0day Admin
free
You can open this exploit for free
xxlegend
Exploits:
1
BusinessLevel:
3
5 894
Security Risk Low
R
D
Download
C
CVE-2013-6357
Verified by 0day Admin
free
You can open this exploit for free
Ivano Binetti
Exploits:
28
BusinessLevel:
8
unsorted
5 035
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
unsorted
4 716
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
MustLive
Exploits:
49
BusinessLevel:
10

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 891
Security Risk Medium
R
D
Download
C
CVE-2022-29885
Verified by 0day Admin
free
You can open this exploit for free
Cristian Giustini
Exploits:
2
BusinessLevel:
1
6 107
Security Risk Medium
R
D
Download
C
CVE-2014-0050
Verified by 0day Admin
free
You can open this exploit for free
Trustwave's Spide.
Exploits:
8
BusinessLevel:
6