Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
15 Results in Database
Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse
Explore the Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse vulnerability and learn how to exploit it.
CouchDB Erlang Distributed Protocol Code Execution
Explore the CouchDB Erlang Distributed Protocol Code Execution vulnerability and learn how to exploit it.
Redis Lua Sandbox Bypass Command Execution
Explore the Redis Lua Sandbox Bypass Command Execution vulnerability and learn how to exploit it.
H2 Database Console Unauthorized Access
Explore the H2 Database Console Unauthorized Access vulnerability and learn how to exploit it.
Redis 4.x/5.x Command Execution due to Master-Slave Replication
Explore the Redis 4.x/5.x Command Execution due to Master-Slave Replication vulnerability and learn how to exploit it.
PostgreSQL Arbitrary Command Execution with Admin Privileges
Explore the PostgreSQL Arbitrary Command Execution with Admin Privileges vulnerability and learn how to exploit it.
MySQL Authentication Bypass
Explore the MySQL Authentication Bypass vulnerability and learn how to exploit it.
PostgreSQL Privilege Escalation
Explore the PostgreSQL Privilege Escalation vulnerability and learn how to exploit it.
CouchDB Arbitrary Command Execution
Explore the CouchDB Arbitrary Command Execution vulnerability and learn how to exploit it.
CouchDB Vertical Permission Bypass
Explore the CouchDB Vertical Permission Bypass vulnerability and learn how to exploit it.
ElasticSearch Arbitrary File Upload
Explore the ElasticSearch Arbitrary File Upload vulnerability and learn how to exploit it.
ElasticSearch Snapshot and Restore Directory Traversal
Explore the ElasticSearch Snapshot and Restore Directory Traversal vulnerability and learn how to exploit it.
ElasticSearch Plug-in Directory Traversal
Explore the ElasticSearch Plug-in Directory Traversal vulnerability and learn how to exploit it.
ElasticSearch Groovy Sandbox Bypass and Remote Code Execution
Explore the ElasticSearch Groovy Sandbox Bypass and Remote Code Execution vulnerability and learn how to exploit it.
ElasticSearch Remote Code Execution
Explore the ElasticSearch Remote Code Execution vulnerability and learn how to exploit it.