Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
5 Results in LLM
RCELLM
ComfyUI-Manager CRLF Injection in Configuration Handler
Explore the ComfyUI-Manager CRLF Injection in Configuration Handler vulnerability and learn how to exploit it.
CVE-2026-22777
Created 12 days agoRCELLM
ComfyUI-Manager Remote Code Execution
Explore the ComfyUI-Manager Remote Code Execution vulnerability and learn how to exploit it.
CVE-2025-67303
Created 2 months agoPath TraversalLLM
Gradio Arbitrary File Read
Explore the Gradio Arbitrary File Read vulnerability and learn how to exploit it.
CVE-2024-1561
Created a year agoPath TraversalLLM
Gradio File Path Traversal
Explore the Gradio File Path Traversal vulnerability and learn how to exploit it.
CVE-2023-51449
Created a year agoLLMRCE
Langflow `validate/code` API Pre-Auth Remote Code Execution
Explore the Langflow `validate/code` API Pre-Auth Remote Code Execution vulnerability and learn how to exploit it.
CVE-2025-3248
Created a year ago