Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
8 Results in SSRF
GeoServer Unauthenticated Server-Side Request Forgery
Explore the GeoServer Unauthenticated Server-Side Request Forgery vulnerability and learn how to exploit it.
Apache OFBiz SSRF and Remote Code Execution
Explore the Apache OFBiz SSRF and Remote Code Execution vulnerability and learn how to exploit it.
Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse
Explore the Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse vulnerability and learn how to exploit it.
Grafana Management Background SSRF
Explore the Grafana Management Background SSRF vulnerability and learn how to exploit it.
Apache HTTP Server 2.4.48 mod_proxy SSRF
Explore the Apache HTTP Server 2.4.48 mod_proxy SSRF vulnerability and learn how to exploit it.
Apache Solr RemoteStreaming Arbitrary File Reading and SSRF
Explore the Apache Solr RemoteStreaming Arbitrary File Reading and SSRF vulnerability and learn how to exploit it.
FFmpeg Arbitrary File Read and SSRF
Explore the FFmpeg Arbitrary File Read and SSRF vulnerability and learn how to exploit it.
Weblogic UDDI Explorer Server-Side Request Forgery (SSRF)
Explore the Weblogic UDDI Explorer Server-Side Request Forgery (SSRF) vulnerability and learn how to exploit it.