Vulhub

Vulhub is an open-source collection of pre-built vulnerable docker environments for security researchers and educators.

- Stars- Forks0 Environments
# Clone the repository
git clone --depth 1 https://github.com/vulhub/vulhub.git

# Enter the directory
cd vulhub/spring/CVE-2022-22947

# Start the environment
docker compose up -d

Why Use Vulhub?

Docker Based

All environments are built with Docker and Docker Compose, making them easy to deploy and isolate.

Real Vulnerabilities

Practice with real-world vulnerabilities in a safe, controlled environment for learning and research.

Well Documented

Each vulnerability comes with detailed documentation explaining the vulnerability and exploitation steps.

Latest Environments

View all environments
Path TraversalLLM
Created 22 days ago

Gradio Arbitrary File Read

Explore the Gradio Arbitrary File Read vulnerability and learn how to exploit it.

Learn more
CVE-2024-1561
Path TraversalLLM
Created 23 days ago

Gradio File Path Traversal

Explore the Gradio File Path Traversal vulnerability and learn how to exploit it.

Learn more
CVE-2023-51449
RCE
Created 25 days ago

Unauthenticated Remote Code Execution in Erlang/OTP SSH

Explore the Unauthenticated Remote Code Execution in Erlang/OTP SSH vulnerability and learn how to exploit it.

Learn more
CVE-2025-32433
LLMRCE
Created a month ago

Langflow `validate/code` API Pre-Auth Remote Code Execution

Explore the Langflow `validate/code` API Pre-Auth Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2025-3248
DatabaseRCE
Created a month ago

H2 Database Web Console Authentication Remote Code Execution

Explore the H2 Database Web Console Authentication Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2018-10054
DatabaseRCE
Created a month ago

H2 Database Web Console Pre-Auth JNDI Injection RCE

Explore the H2 Database Web Console Pre-Auth JNDI Injection RCE vulnerability and learn how to exploit it.

Learn more
CVE-2021-42392

Ready to start your security research?

Explore our collection of vulnerable environments and enhance your security skills today.