Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
-
Updated
Apr 20, 2024 - Python
Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
NTPD remote DOS exploit and vulnerable container
Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container
docker-compose bringing up multiple vulnerable applications inside containers.
Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container
ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
A deliberately vulnerable java/python applications
A buffer overflow vulnerable CGI program
Vulnerable REST based PHP webservice deployed in Docker
Another vulnerable application for practicing web penetration testing.
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container
Shellshock exploit + vulnerable environment
Add a description, image, and links to the vulnerable-container topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable-container topic, visit your repo's landing page and select "manage topics."