Vulnerable Environments

Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.

8 Results in SSRF

SSRF

GeoServer Unauthenticated Server-Side Request Forgery

Explore the GeoServer Unauthenticated Server-Side Request Forgery vulnerability and learn how to exploit it.

CVE-2021-40822
Created 2 months ago
RCESSRF

Apache OFBiz SSRF and Remote Code Execution

Explore the Apache OFBiz SSRF and Remote Code Execution vulnerability and learn how to exploit it.

CVE-2024-45507
Created 7 months ago
SSRFDatabase

Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse

Explore the Adminer Server-side Request Forgery on Error Page of Elasticsearch and ClickHouse vulnerability and learn how to exploit it.

CVE-2021-21311
Created 2 years ago
SSRF

Grafana Management Background SSRF

Explore the Grafana Management Background SSRF vulnerability and learn how to exploit it.

N/A
Created 3 years ago
SSRFWebserver

Apache HTTP Server 2.4.48 mod_proxy SSRF

Explore the Apache HTTP Server 2.4.48 mod_proxy SSRF vulnerability and learn how to exploit it.

CVE-2021-40438
Created 3 years ago
Path TraversalSSRF

Apache Solr RemoteStreaming Arbitrary File Reading and SSRF

Explore the Apache Solr RemoteStreaming Arbitrary File Reading and SSRF vulnerability and learn how to exploit it.

N/A
Created 4 years ago
Path TraversalSSRF

FFmpeg Arbitrary File Read and SSRF

Explore the FFmpeg Arbitrary File Read and SSRF vulnerability and learn how to exploit it.

CVE-2016-1897CVE-2016-1898
Created 8 years ago
SSRFWebserver

Weblogic UDDI Explorer Server-Side Request Forgery (SSRF)

Explore the Weblogic UDDI Explorer Server-Side Request Forgery (SSRF) vulnerability and learn how to exploit it.

N/A
Created 8 years ago