Vulnerable Environments

Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.

11 Results in Info Disclosure

Info Disclosure

ownCloud graphapi Information Disclosure

Explore the ownCloud graphapi Information Disclosure vulnerability and learn how to exploit it.

CVE-2023-49103
Created 7 days ago
Info Disclosure

Nginx UI Unauthenticated Backup Download with Encryption Key Disclosure

Explore the Nginx UI Unauthenticated Backup Download with Encryption Key Disclosure vulnerability and learn how to exploit it.

CVE-2026-27944
Created 9 days ago
Info Disclosure

MinIO Cluster Mode Information Disclosure

Explore the MinIO Cluster Mode Information Disclosure vulnerability and learn how to exploit it.

CVE-2023-28432
Created 3 years ago
Info Disclosure

OpenSSL Heartbleed Memory Leak Leads to Information Disclosure

Explore the OpenSSL Heartbleed Memory Leak Leads to Information Disclosure vulnerability and learn how to exploit it.

CVE-2014-0160
Created 4 years ago
Info DisclosureWebserver

Jetty WEB-INF Sensitive Information Disclosure

Explore the Jetty WEB-INF Sensitive Information Disclosure vulnerability and learn how to exploit it.

CVE-2021-34429
Created 5 years ago
Info DisclosureWebserver

Jetty WEB-INF Sensitive Information Disclosure

Explore the Jetty WEB-INF Sensitive Information Disclosure vulnerability and learn how to exploit it.

CVE-2021-28164
Created 5 years ago
Info DisclosureWebserver

Jetty Common Servlets Component ConcatServlet Information Disclosure

Explore the Jetty Common Servlets Component ConcatServlet Information Disclosure vulnerability and learn how to exploit it.

CVE-2021-28169
Created 5 years ago
Privilege EscalationInfo Disclosure

SaltStack Information Disclosure Leads to Privilege Escalation

Explore the SaltStack Information Disclosure Leads to Privilege Escalation vulnerability and learn how to exploit it.

CVE-2020-11651
Created 6 years ago
Info Disclosure

OpenSSH Username Enumeration

Explore the OpenSSH Username Enumeration vulnerability and learn how to exploit it.

CVE-2018-15473
Created 8 years ago
Info DisclosureWebserver

Nginx Cache Leak by Integer Overflow

Explore the Nginx Cache Leak by Integer Overflow vulnerability and learn how to exploit it.

CVE-2017-7529
Created 9 years ago
SQL InjectionInfo Disclosure

ThinkPHP5 SQL Injection Vulnerabilities/Information Leakage

Explore the ThinkPHP5 SQL Injection Vulnerabilities/Information Leakage vulnerability and learn how to exploit it.

N/A
Created 9 years ago