Vulnerable Environments

Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.

40 Results in Auth Bypass

Auth BypassHard Coding

Apache Superset Hardcoded JWT Secret Key Leads to Authentication Bypass

Explore the Apache Superset Hardcoded JWT Secret Key Leads to Authentication Bypass vulnerability and learn how to exploit it.

CVE-2023-27524
Created 6 days ago
Auth BypassFramework

Next.js Middleware Authorization Bypass

Explore the Next.js Middleware Authorization Bypass vulnerability and learn how to exploit it.

CVE-2025-29927
Created 10 days ago
Auth BypassHard Coding

Apache HugeGraph JWT Token Secret Hardcoding Leads to Authentication Bypass

Explore the Apache HugeGraph JWT Token Secret Hardcoding Leads to Authentication Bypass vulnerability and learn how to exploit it.

CVE-2024-43441
Created 2 months ago
RCEAuth Bypass

Apache OFBiz Authentication Bypass Leads to RCE

Explore the Apache OFBiz Authentication Bypass Leads to RCE vulnerability and learn how to exploit it.

CVE-2024-45195
Created 7 months ago
RCEAuth Bypass

Apache OFBiz Authentication Bypass Leads to RCE

Explore the Apache OFBiz Authentication Bypass Leads to RCE vulnerability and learn how to exploit it.

CVE-2024-38856
Created 7 months ago
RCEAuth Bypass

Alibaba Nacos Authentication Bypass and Remote Code Execution

Explore the Alibaba Nacos Authentication Bypass and Remote Code Execution vulnerability and learn how to exploit it.

CVE-2021-29442
Created 9 months ago
RCEAuth Bypass

AJ-Report Authentication Bypass and Remote Code Execution

Explore the AJ-Report Authentication Bypass and Remote Code Execution vulnerability and learn how to exploit it.

N/A
Created 10 months ago
RCEAuth Bypass

Jetbrains TeamCity Authentication Bypass and Remote Command Execution

Explore the Jetbrains TeamCity Authentication Bypass and Remote Command Execution vulnerability and learn how to exploit it.

CVE-2023-42793
Created a year ago
RCEAuth Bypass

Apache OFBiz Authentication Bypass Leads to RCE

Explore the Apache OFBiz Authentication Bypass Leads to RCE vulnerability and learn how to exploit it.

CVE-2023-51467
Created a year ago
Auth Bypass

Atlassian Confluence Access Control Broken by Attributes Overwrite

Explore the Atlassian Confluence Access Control Broken by Attributes Overwrite vulnerability and learn how to exploit it.

CVE-2023-22515
Created a year ago
Auth Bypass

Jumpserver random seed leakage and account takeover

Explore the Jumpserver random seed leakage and account takeover vulnerability and learn how to exploit it.

CVE-2023-42820
Created 2 years ago
Auth Bypass

Openfire Management Background Authentication Bypass

Explore the Openfire Management Background Authentication Bypass vulnerability and learn how to exploit it.

CVE-2023-32315
Created 2 years ago
Auth BypassCMS

Joomla 4.2.7 Permission Bypass

Explore the Joomla 4.2.7 Permission Bypass vulnerability and learn how to exploit it.

CVE-2023-23752
Created 2 years ago
Auth Bypass

Apache Shiro Authentication Bypass

Explore the Apache Shiro Authentication Bypass vulnerability and learn how to exploit it.

CVE-2010-3863
Created 2 years ago
Auth BypassHard Coding

InfluxDB Empty JWT Secret Key Authentication Bypass

Explore the InfluxDB Empty JWT Secret Key Authentication Bypass vulnerability and learn how to exploit it.

CVE-2019-20933
Created 2 years ago
RCEAuth BypassWebserver

Apache APISIX Dashboard API Permission Bypass to RCE

Explore the Apache APISIX Dashboard API Permission Bypass to RCE vulnerability and learn how to exploit it.

CVE-2021-45232
Created 2 years ago
Auth BypassFramework

Spring Security Authorization Bypass in RegexRequestMatcher

Explore the Spring Security Authorization Bypass in RegexRequestMatcher vulnerability and learn how to exploit it.

CVE-2022-22978
Created 3 years ago
Auth Bypass

Apache Airflow Permission Bypass

Explore the Apache Airflow Permission Bypass vulnerability and learn how to exploit it.

CVE-2020-17526
Created 3 years ago
Auth Bypass

Nacos Authentication Bypass

Explore the Nacos Authentication Bypass vulnerability and learn how to exploit it.

CVE-2021-29441
Created 3 years ago
DeserializationAuth Bypass

Celery <4.0 Redis Unauthorized Access and Pickle Deserialization

Explore the Celery <4.0 Redis Unauthorized Access and Pickle Deserialization vulnerability and learn how to exploit it.

N/A
Created 4 years ago
Auth Bypass

Apache Shiro Authentication Bypass

Explore the Apache Shiro Authentication Bypass vulnerability and learn how to exploit it.

CVE-2020-1957
Created 4 years ago
Auth Bypass

ntopng Permission Bypass

Explore the ntopng Permission Bypass vulnerability and learn how to exploit it.

CVE-2021-28073
Created 4 years ago
Auth Bypass

Tiki Wiki CMS Groupware Authentication Bypass

Explore the Tiki Wiki CMS Groupware Authentication Bypass vulnerability and learn how to exploit it.

CVE-2020-15906
Created 4 years ago
RCEAuth Bypass

PHP-FPM FastCGI Unauthorized Access Leads to Remote Code Execution

Explore the PHP-FPM FastCGI Unauthorized Access Leads to Remote Code Execution vulnerability and learn how to exploit it.

N/A
Created 4 years ago
Auth Bypass

XXL-JOB Executor Unauthorized Access

Explore the XXL-JOB Executor Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 4 years ago
Auth BypassDatabase

H2 Database Console Unauthorized Access

Explore the H2 Database Console Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 5 years ago
Auth BypassPath TraversalWebserver

Apache Tomcat AJP Bug

Explore the Apache Tomcat AJP Bug vulnerability and learn how to exploit it.

CVE-2020-1938
Created 5 years ago
Auth BypassRCE

Scrapyd Unauthorized Access

Explore the Scrapyd Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 6 years ago
Auth BypassWebserver

AppWeb Authentication Bypass

Explore the AppWeb Authentication Bypass vulnerability and learn how to exploit it.

CVE-2018-8715
Created 6 years ago
Auth BypassRCE

uWSGI Unauthorized Access

Explore the uWSGI Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 6 years ago
Auth BypassPath Traversal

Gogs Session Overwrite and Arbitrary User Forge

Explore the Gogs Session Overwrite and Arbitrary User Forge vulnerability and learn how to exploit it.

CVE-2018-18925
Created 6 years ago
Auth Bypass

libssh Server-side Authentication Bypass

Explore the libssh Server-side Authentication Bypass vulnerability and learn how to exploit it.

CVE-2018-10933
Created 6 years ago
RCEAuth Bypass

Apache Spark Unauthorized Access Leads to Remote Code Execution

Explore the Apache Spark Unauthorized Access Leads to Remote Code Execution vulnerability and learn how to exploit it.

N/A
Created 7 years ago
RCEAuth Bypass

Docker Remote API Unauthorized Access Leads to Remote Code Execution

Explore the Docker Remote API Unauthorized Access Leads to Remote Code Execution vulnerability and learn how to exploit it.

N/A
Created 7 years ago
Auth BypassDatabase

MySQL Authentication Bypass

Explore the MySQL Authentication Bypass vulnerability and learn how to exploit it.

CVE-2012-2122
Created 7 years ago
RCEAuth Bypass

Hadoop YARN ResourceManager Unauthorized Access

Explore the Hadoop YARN ResourceManager Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 7 years ago
Auth Bypass

Rsync Unauthorized Access

Explore the Rsync Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 7 years ago
Auth Bypass

Jupyter Notebook Unauthorized Access

Explore the Jupyter Notebook Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 7 years ago
Auth BypassDatabase

CouchDB Vertical Permission Bypass

Explore the CouchDB Vertical Permission Bypass vulnerability and learn how to exploit it.

CVE-2017-12635
Created 7 years ago
Auth BypassWebserver

Tomcat Weak Password

Explore the Tomcat Weak Password vulnerability and learn how to exploit it.

N/A
Created 8 years ago