Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
15 Results in CMS
CraftCMS ConditionsController Pre-Auth Remote Code Execution
Explore the CraftCMS ConditionsController Pre-Auth Remote Code Execution vulnerability and learn how to exploit it.
CraftCMS register_argc_argv Leads to Remote Code Execution
Explore the CraftCMS register_argc_argv Leads to Remote Code Execution vulnerability and learn how to exploit it.
Joomla 4.2.7 Permission Bypass
Explore the Joomla 4.2.7 Permission Bypass vulnerability and learn how to exploit it.
ECShop 4.x collection_list SQL Injection
Explore the ECShop 4.x collection_list SQL Injection vulnerability and learn how to exploit it.
Drupal Core 8 PECL YAML Deserialization Remote Code Execution
Explore the Drupal Core 8 PECL YAML Deserialization Remote Code Execution vulnerability and learn how to exploit it.
Drupal Cross-Site Scripting by File Upload
Explore the Drupal Cross-Site Scripting by File Upload vulnerability and learn how to exploit it.
Drupal Remote Code Execution by phar deserialization
Explore the Drupal Remote Code Execution by phar deserialization vulnerability and learn how to exploit it.
Drupal Drupalgeddon 3 Authenticated Remote Code Execution
Explore the Drupal Drupalgeddon 3 Authenticated Remote Code Execution vulnerability and learn how to exploit it.
Magento 2.2 SQL Injection
Explore the Magento 2.2 SQL Injection vulnerability and learn how to exploit it.
ECShop 2.x/3.x SQL Injection/Arbitrary Code Execution
Explore the ECShop 2.x/3.x SQL Injection/Arbitrary Code Execution vulnerability and learn how to exploit it.
Drupal < 7.32 "Drupalgeddon" SQL Injection
Explore the Drupal < 7.32 "Drupalgeddon" SQL Injection vulnerability and learn how to exploit it.
Drupal Drupalgeddon 2 Unauthenticated Remote Code Execution
Explore the Drupal Drupalgeddon 2 Unauthenticated Remote Code Execution vulnerability and learn how to exploit it.
Joomla 3.4.5 Deserialization
Explore the Joomla 3.4.5 Deserialization vulnerability and learn how to exploit it.
Wordpress 4.6 Arbitrary Command Execution (PwnScriptum)
Explore the Wordpress 4.6 Arbitrary Command Execution (PwnScriptum) vulnerability and learn how to exploit it.
Joomla 3.7.0 SQL Injection
Explore the Joomla 3.7.0 SQL Injection vulnerability and learn how to exploit it.