Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
9 Results in Info Disclosure
MinIO Cluster Mode Information Disclosure
Explore the MinIO Cluster Mode Information Disclosure vulnerability and learn how to exploit it.
OpenSSL Heartbleed Memory Leak Leads to Information Disclosure
Explore the OpenSSL Heartbleed Memory Leak Leads to Information Disclosure vulnerability and learn how to exploit it.
Jetty WEB-INF Sensitive Information Disclosure
Explore the Jetty WEB-INF Sensitive Information Disclosure vulnerability and learn how to exploit it.
Jetty WEB-INF Sensitive Information Disclosure
Explore the Jetty WEB-INF Sensitive Information Disclosure vulnerability and learn how to exploit it.
Jetty Common Servlets Component ConcatServlet Information Disclosure
Explore the Jetty Common Servlets Component ConcatServlet Information Disclosure vulnerability and learn how to exploit it.
SaltStack Information Disclosure Leads to Privilege Escalation
Explore the SaltStack Information Disclosure Leads to Privilege Escalation vulnerability and learn how to exploit it.
OpenSSH Username Enumeration
Explore the OpenSSH Username Enumeration vulnerability and learn how to exploit it.
Nginx Cache Leak by Integer Overflow
Explore the Nginx Cache Leak by Integer Overflow vulnerability and learn how to exploit it.
ThinkPHP5 SQL Injection Vulnerabilities/Information Leakage
Explore the ThinkPHP5 SQL Injection Vulnerabilities/Information Leakage vulnerability and learn how to exploit it.