Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
8 Results in File Upload
Apache RocketMQ NameServer Arbitrary File Write
Explore the Apache RocketMQ NameServer Arbitrary File Write vulnerability and learn how to exploit it.
SaltStack Arbitrary File Read and Write
Explore the SaltStack Arbitrary File Read and Write vulnerability and learn how to exploit it.
Drupal Cross-Site Scripting by File Upload
Explore the Drupal Cross-Site Scripting by File Upload vulnerability and learn how to exploit it.
WebLogic Arbitrary File Upload
Explore the WebLogic Arbitrary File Upload vulnerability and learn how to exploit it.
Aria2 Arbitrary File Write
Explore the Aria2 Arbitrary File Write vulnerability and learn how to exploit it.
Tomcat Arbitrary Writing of Files in the PUT Method
Explore the Tomcat Arbitrary Writing of Files in the PUT Method vulnerability and learn how to exploit it.
Apache ActiveMQ Arbitrary File Write
Explore the Apache ActiveMQ Arbitrary File Write vulnerability and learn how to exploit it.
ElasticSearch Arbitrary File Upload
Explore the ElasticSearch Arbitrary File Upload vulnerability and learn how to exploit it.