Vulnerable Environments

Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.

15 Results in Database

SSRFDatabase

Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse

Explore the Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse vulnerability and learn how to exploit it.

CVE-2021-21311
Created 2 years ago
RCEDatabase

CouchDB Erlang Distributed Protocol Code Execution

Explore the CouchDB Erlang Distributed Protocol Code Execution vulnerability and learn how to exploit it.

CVE-2022-24706
Created 2 years ago
RCEDatabase

Redis Lua Sandbox Bypass Command Execution

Explore the Redis Lua Sandbox Bypass Command Execution vulnerability and learn how to exploit it.

CVE-2022-0543
Created 3 years ago
Auth BypassDatabase

H2 Database Console Unauthorized Access

Explore the H2 Database Console Unauthorized Access vulnerability and learn how to exploit it.

N/A
Created 5 years ago
RCEDatabase

Redis 4.x/5.x Command Execution due to Master-Slave Replication

Explore the Redis 4.x/5.x Command Execution due to Master-Slave Replication vulnerability and learn how to exploit it.

N/A
Created 6 years ago
RCEDatabase

PostgreSQL Arbitrary Command Execution with Admin Privileges

Explore the PostgreSQL Arbitrary Command Execution with Admin Privileges vulnerability and learn how to exploit it.

CVE-2019-9193
Created 6 years ago
Auth BypassDatabase

MySQL Authentication Bypass

Explore the MySQL Authentication Bypass vulnerability and learn how to exploit it.

CVE-2012-2122
Created 7 years ago
Privilege EscalationDatabase

PostgreSQL Privilege Escalation

Explore the PostgreSQL Privilege Escalation vulnerability and learn how to exploit it.

CVE-2018-1058
Created 7 years ago
RCEDatabase

CouchDB Arbitrary Command Execution

Explore the CouchDB Arbitrary Command Execution vulnerability and learn how to exploit it.

CVE-2017-12636
Created 7 years ago
Auth BypassDatabase

CouchDB Vertical Permission Bypass

Explore the CouchDB Vertical Permission Bypass vulnerability and learn how to exploit it.

CVE-2017-12635
Created 7 years ago
File UploadDatabase

ElasticSearch Arbitrary File Upload

Explore the ElasticSearch Arbitrary File Upload vulnerability and learn how to exploit it.

N/A
Created 8 years ago
Path TraversalDatabase

ElasticSearch Snapshot and Restore Directory Traversal

Explore the ElasticSearch Snapshot and Restore Directory Traversal vulnerability and learn how to exploit it.

CVE-2015-5531
Created 8 years ago
Path TraversalDatabase

ElasticSearch Plug-in Directory Traversal

Explore the ElasticSearch Plug-in Directory Traversal vulnerability and learn how to exploit it.

CVE-2015-3337
Created 8 years ago
RCEExpression InjectionDatabase

ElasticSearch Groovy Sandbox Bypass and Remote Code Execution

Explore the ElasticSearch Groovy Sandbox Bypass and Remote Code Execution vulnerability and learn how to exploit it.

CVE-2015-1427
Created 8 years ago
RCEDatabase

ElasticSearch Remote Code Execution

Explore the ElasticSearch Remote Code Execution vulnerability and learn how to exploit it.

CVE-2014-3120
Created 8 years ago