Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
42 Results in Path Traversal
Vite Development Server Arbitrary File Read
Explore the Vite Development Server Arbitrary File Read vulnerability and learn how to exploit it.
Vite Development Server Arbitrary File Read Bypass
Explore the Vite Development Server Arbitrary File Read Bypass vulnerability and learn how to exploit it.
GlassFish 4.1.0 Arbitrary File Read
Explore the GlassFish 4.1.0 Arbitrary File Read vulnerability and learn how to exploit it.
FFmpeg AVI Arbitrary File Read
Explore the FFmpeg AVI Arbitrary File Read vulnerability and learn how to exploit it.
Struts2 S2-067 Upload Path Traversal
Explore the Struts2 S2-067 Upload Path Traversal vulnerability and learn how to exploit it.
Struts2 S2-066 Upload Path Traversal
Explore the Struts2 S2-066 Upload Path Traversal vulnerability and learn how to exploit it.
PHP File Read to Remote Code Execution Through GNU C Library Iconv
Explore the PHP File Read to Remote Code Execution Through GNU C Library Iconv vulnerability and learn how to exploit it.
Nexus Repository Manager 3 Unauthenticated Path Traversal
Explore the Nexus Repository Manager 3 Unauthenticated Path Traversal vulnerability and learn how to exploit it.
kkFileView ZipSlip Remote Code Execution
Explore the kkFileView ZipSlip Remote Code Execution vulnerability and learn how to exploit it.
Adobe ColdFusion Local File Inclusion Leads to RCE
Explore the Adobe ColdFusion Local File Inclusion Leads to RCE vulnerability and learn how to exploit it.
Jenkins Arbitrary File Read Through the CLI
Explore the Jenkins Arbitrary File Read Through the CLI vulnerability and learn how to exploit it.
Librsvg XInclude Arbitrary file reading
Explore the Librsvg XInclude Arbitrary file reading vulnerability and learn how to exploit it.
Adminer Remote Arbitrary File Read
Explore the Adminer Remote Arbitrary File Read vulnerability and learn how to exploit it.
ImageMagick Arbitrary File Read
Explore the ImageMagick Arbitrary File Read vulnerability and learn how to exploit it.
ThinkPHP Multilingual Local File Inclusion
Explore the ThinkPHP Multilingual Local File Inclusion vulnerability and learn how to exploit it.
Metabase Arbitrary File Read
Explore the Metabase Arbitrary File Read vulnerability and learn how to exploit it.
Grafana 8.x Plug-in Module Directory Traversal
Explore the Grafana 8.x Plug-in Module Directory Traversal vulnerability and learn how to exploit it.
Apache HTTP Server 2.4.50 Path Traversal
Explore the Apache HTTP Server 2.4.50 Path Traversal vulnerability and learn how to exploit it.
Apache HTTP Server 2.4.49 Path Traversal
Explore the Apache HTTP Server 2.4.49 Path Traversal vulnerability and learn how to exploit it.
Apache Solr RemoteStreaming Arbitrary File Reading and SSRF
Explore the Apache Solr RemoteStreaming Arbitrary File Reading and SSRF vulnerability and learn how to exploit it.
Apache Flink Upload Path Traversal
Explore the Apache Flink Upload Path Traversal vulnerability and learn how to exploit it.
Apache Flink `jobmanager/logs` Path Traversal
Explore the Apache Flink `jobmanager/logs` Path Traversal vulnerability and learn how to exploit it.
SaltStack Arbitrary File Read and Write
Explore the SaltStack Arbitrary File Read and Write vulnerability and learn how to exploit it.
Apache Tomcat AJP Bug
Explore the Apache Tomcat AJP Bug vulnerability and learn how to exploit it.
Kibana Local File Inclusion
Explore the Kibana Local File Inclusion vulnerability and learn how to exploit it.
Atlassian Confluence Path Traversal Leads to RCE
Explore the Atlassian Confluence Path Traversal Leads to RCE vulnerability and learn how to exploit it.
Ruby on Rails Path Traversal and Arbitrary File Read
Explore the Ruby on Rails Path Traversal and Arbitrary File Read vulnerability and learn how to exploit it.
Gogs Session Overwrite and Arbitrary User Forge
Explore the Gogs Session Overwrite and Arbitrary User Forge vulnerability and learn how to exploit it.
ACME mini_httpd Arbitrary File Read
Explore the ACME mini_httpd Arbitrary File Read vulnerability and learn how to exploit it.
Ruby on Rails Path Traversal
Explore the Ruby on Rails Path Traversal vulnerability and learn how to exploit it.
Gitea 1.4.0 Directory Traversal Leading to Remote Command Execution
Explore the Gitea 1.4.0 Directory Traversal Leading to Remote Command Execution vulnerability and learn how to exploit it.
phpmyadmin 4.8.1 Remote File Inclusion
Explore the phpmyadmin 4.8.1 Remote File Inclusion vulnerability and learn how to exploit it.
Adobe ColdFusion File Read
Explore the Adobe ColdFusion File Read vulnerability and learn how to exploit it.
PHP Local File Inclusion RCE with PHPINFO
Explore the PHP Local File Inclusion RCE with PHPINFO vulnerability and learn how to exploit it.
uWSGI PHP Directory Traversal
Explore the uWSGI PHP Directory Traversal vulnerability and learn how to exploit it.
PHPMailer Arbitrary File Read
Explore the PHPMailer Arbitrary File Read vulnerability and learn how to exploit it.
Node.js 8.5.0 Path Traversal
Explore the Node.js 8.5.0 Path Traversal vulnerability and learn how to exploit it.
FFmpeg Arbitrary File Read and SSRF
Explore the FFmpeg Arbitrary File Read and SSRF vulnerability and learn how to exploit it.
WebLogic Weak Password, Arbitrary File Read and Remote Code Execution
Explore the WebLogic Weak Password, Arbitrary File Read and Remote Code Execution vulnerability and learn how to exploit it.
GitLab Arbitrary File Read
Explore the GitLab Arbitrary File Read vulnerability and learn how to exploit it.
ElasticSearch Snapshot and Restore Directory Traversal
Explore the ElasticSearch Snapshot and Restore Directory Traversal vulnerability and learn how to exploit it.
ElasticSearch Plug-in Directory Traversal
Explore the ElasticSearch Plug-in Directory Traversal vulnerability and learn how to exploit it.