Vulhub
Vulhub is an open-source collection of pre-built vulnerable docker environments for security researchers and educators.
# Clone the repository
git clone --depth 1 https://github.com/vulhub/vulhub.git
# Enter the directory
cd vulhub/spring/CVE-2022-22947
# Start the environment
docker compose up -dWhy Use Vulhub?
Docker Based
All environments are built with Docker and Docker Compose, making them easy to deploy and isolate.
Real Vulnerabilities
Practice with real-world vulnerabilities in a safe, controlled environment for learning and research.
Well Documented
Each vulnerability comes with detailed documentation explaining the vulnerability and exploitation steps.
Latest Environments
View all environmentsVite Development Server Arbitrary File Read via Hash Character Bypass
Explore the Vite Development Server Arbitrary File Read via Hash Character Bypass vulnerability and learn how to exploit it.
OpenClaw Cross-Site WebSocket Hijacking
Explore the OpenClaw Cross-Site WebSocket Hijacking vulnerability and learn how to exploit it.
Apache ActiveMQ Jolokia API Unauthorized Access
Explore the Apache ActiveMQ Jolokia API Unauthorized Access vulnerability and learn how to exploit it.
Apache ActiveMQ Jolokia Remote Code Execution
Explore the Apache ActiveMQ Jolokia Remote Code Execution vulnerability and learn how to exploit it.
ComfyUI-Manager CRLF Injection in Configuration Handler
Explore the ComfyUI-Manager CRLF Injection in Configuration Handler vulnerability and learn how to exploit it.
JetBrains TeamCity Authentication Bypass
Explore the JetBrains TeamCity Authentication Bypass vulnerability and learn how to exploit it.
Ready to start your security research?
Explore our collection of vulnerable environments and enhance your security skills today.