Vulnerable Environments

Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.

17 Results in Database

DatabaseRCE

H2 Database Web Console Authentication Remote Code Execution

Explore the H2 Database Web Console Authentication Remote Code Execution vulnerability and learn how to exploit it.

CVE-2018-10054
Created 9 days ago
DatabaseRCE

H2 Database Web Console Pre-Auth JNDI Injection RCE

Explore the H2 Database Web Console Pre-Auth JNDI Injection RCE vulnerability and learn how to exploit it.

CVE-2021-42392
Created 9 days ago
DatabaseRCE

H2 Database Web Console Pre-Auth JDBC Attack RCE

Explore the H2 Database Web Console Pre-Auth JDBC Attack RCE vulnerability and learn how to exploit it.

CVE-2022-23221
Created 9 days ago
SSRFDatabase

Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse

Explore the Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse vulnerability and learn how to exploit it.

CVE-2021-21311
Created 2 years ago
RCEDatabase

CouchDB Erlang Distributed Protocol Code Execution

Explore the CouchDB Erlang Distributed Protocol Code Execution vulnerability and learn how to exploit it.

CVE-2022-24706
Created 2 years ago
RCEDatabase

Redis Lua Sandbox Bypass Command Execution

Explore the Redis Lua Sandbox Bypass Command Execution vulnerability and learn how to exploit it.

CVE-2022-0543
Created 3 years ago
RCEDatabase

Redis 4.x/5.x Command Execution due to Master-Slave Replication

Explore the Redis 4.x/5.x Command Execution due to Master-Slave Replication vulnerability and learn how to exploit it.

N/A
Created 6 years ago
RCEDatabase

PostgreSQL Arbitrary Command Execution with Admin Privileges

Explore the PostgreSQL Arbitrary Command Execution with Admin Privileges vulnerability and learn how to exploit it.

CVE-2019-9193
Created 6 years ago
Auth BypassDatabase

MySQL Authentication Bypass

Explore the MySQL Authentication Bypass vulnerability and learn how to exploit it.

CVE-2012-2122
Created 7 years ago
Privilege EscalationDatabase

PostgreSQL Privilege Escalation

Explore the PostgreSQL Privilege Escalation vulnerability and learn how to exploit it.

CVE-2018-1058
Created 7 years ago
RCEDatabase

CouchDB Arbitrary Command Execution

Explore the CouchDB Arbitrary Command Execution vulnerability and learn how to exploit it.

CVE-2017-12636
Created 7 years ago
Auth BypassDatabase

CouchDB Vertical Permission Bypass

Explore the CouchDB Vertical Permission Bypass vulnerability and learn how to exploit it.

CVE-2017-12635
Created 7 years ago
File UploadDatabase

ElasticSearch Arbitrary File Upload

Explore the ElasticSearch Arbitrary File Upload vulnerability and learn how to exploit it.

N/A
Created 8 years ago
Path TraversalDatabase

ElasticSearch Snapshot and Restore Directory Traversal

Explore the ElasticSearch Snapshot and Restore Directory Traversal vulnerability and learn how to exploit it.

CVE-2015-5531
Created 8 years ago
Path TraversalDatabase

ElasticSearch Plug-in Directory Traversal

Explore the ElasticSearch Plug-in Directory Traversal vulnerability and learn how to exploit it.

CVE-2015-3337
Created 8 years ago
RCEExpression InjectionDatabase

ElasticSearch Groovy Sandbox Bypass and Remote Code Execution

Explore the ElasticSearch Groovy Sandbox Bypass and Remote Code Execution vulnerability and learn how to exploit it.

CVE-2015-1427
Created 8 years ago
RCEDatabase

ElasticSearch Remote Code Execution

Explore the ElasticSearch Remote Code Execution vulnerability and learn how to exploit it.

CVE-2014-3120
Created 8 years ago