Vulhub

Vulhub is an open-source collection of pre-built vulnerable docker environments for security researchers and educators.

18.4k+ Stars4.5k+ Forks283 Environments
# Clone the repository
git clone --depth 1 https://github.com/vulhub/vulhub.git

# Enter the directory
cd vulhub/spring/CVE-2022-22947

# Start the environment
docker compose up -d

Why Use Vulhub?

Docker Based

All environments are built with Docker and Docker Compose, making them easy to deploy and isolate.

Real Vulnerabilities

Practice with real-world vulnerabilities in a safe, controlled environment for learning and research.

Well Documented

Each vulnerability comes with detailed documentation explaining the vulnerability and exploitation steps.

Latest Environments

View all environments
RCEDeserializationWeb Server
Created 7 days ago

Tomcat Session Deserialization Remote Code Execution

Explore the Tomcat Session Deserialization Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2025-24813
RCEDeserialization
Created 15 days ago

Apache HertzBeat SnakeYaml Deserialization Remote Code Execution

Explore the Apache HertzBeat SnakeYaml Deserialization Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2024-42323
RCE
Created 15 days ago

Kibana 7.6.2 upgrade-assistant-telemetry Prototype Pollution Leads to RCE

Explore the Kibana 7.6.2 upgrade-assistant-telemetry Prototype Pollution Leads to RCE vulnerability and learn how to exploit it.

Learn more
CVE-2020-7012
File OperationWeb Server
Created 15 days ago

GlassFish 4.1.0 Arbitrary File Read

Explore the GlassFish 4.1.0 Arbitrary File Read vulnerability and learn how to exploit it.

Learn more
CVE-2017-1000028
File Operation
Created 15 days ago

FFmpeg AVI Arbitrary File Read

Explore the FFmpeg AVI Arbitrary File Read vulnerability and learn how to exploit it.

Learn more
CVE-2017-9993
Auth Bypass
Created a month ago

Apache HugeGraph JWT Token Secret Hardcoding Leads to Authentication Bypass

Explore the Apache HugeGraph JWT Token Secret Hardcoding Leads to Authentication Bypass vulnerability and learn how to exploit it.

Learn more
CVE-2024-43441

Ready to start your security research?

Explore our collection of vulnerable environments and enhance your security skills today.