Exercises
| Exercise | Avg. Time | Difficulty | Solved by | Tier | |
|---|---|---|---|---|---|
|
|
CVE-2008-5x8x_ii
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 544 | PRO | |
|
|
CVE-2005-2x8x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 623 | PRO | |
|
|
CVE-2022-21449
JWT
This exercise covers the exploitation of CVE-2022-21449 against a Java Application relying on JWT
|
< 1 Hr. | 169 | PRO | |
|
|
CVE-2021-33564 Argument Injection in Ruby Dragonfly
This exercise covers how you can get arbitrary file read using CVE-2021-33564 against Refinery CMS
|
< 1 Hr. | 149 | PRO | |
|
|
CVE-2021-45xx9
This challenge covers a vulnerable snippet in a real Python application
|
< 1 Hr. | 687 | PRO | |
|
|
CVE-2021-39x3x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 564 | PRO | |
|
|
CVE-2022-21724: JDBC RCE PostgreSQL
This challenge covers how to gain code execution by leveraging a JDBC connection string with PostgreSQL
|
< 1 Hr. | 180 | PRO | |
|
|
CVE-2009-3x8x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 699 | PRO | |
|
|
CVE-2021-381xx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 654 | PRO | |
|
|
CVE-2008-4x9x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 641 | PRO | |
|
|
CVE-2021-4379x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 731 | PRO | |
|
|
CVE-2021-4xx50
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 743 | PRO | |
|
|
CVE-2008-1x3x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 890 | PRO | |
|
|
CVE-2021-40438
This challenge covers how to trigger a Server-Side Request Forgery by leveraging CVE-2021-40438
|
< 1 Hr. | 341 | PRO | |
|
|
CVE-2021-41773
This challenge covers how to read arbitrary files by leveraging CVE-2021-41773
|
< 1 Hr. | 556 | PRO | |
|
|
CVE-2021-41773 II
This challenge covers how to gain code execution by leveraging CVE-2021-41773
|
1-2 Hr. | 209 | PRO | |
|
|
CVE-2006-4xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 767 | PRO | |
|
|
CVE-2006-4xxx_ii
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 650 | PRO | |
|
|
CVE-2021-37xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 716 | PRO | |
|
|
CVE-2020-17xx7
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 1109 | PRO | |
|
|
CVE-2020-9x9x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 865 | PRO | |
|
|
CVE-2020-17xx8
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 656 | PRO | |
|
|
CVE-2021-22204: Exiftool RCE
This exercise covers how you can gain code execution when an application uses exiftool on user-controlled files
|
1-2 Hr. | 175 | PRO | |
|
|
CVE-2020-11xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 669 | PRO | |
|
|
CVE-2020-14343: PyYAML unsafe loader
This exercise covers how you can gain code execution when an application use a vulnerable version of PyYAML and relies on load()
|
< 1 Hr. | 316 | PRO | |
|
|
CVE-2020-7115: Aruba Clearpass RCE
This exercise covers a remote command execution issue on Aruba Clearpass RCE
|
< 1 Hr. | 220 | PRO | |
|
|
CVE-2020-8163: Rails local name RCE
This exercise details the exploitation of CVE-2020-8163 to gain code execution
|
1-2 Hr. | 227 | PRO | |
|
|
Apache Pluto RCE
This exercise covers how to gain code execution on Apache Pluto 3.0.0 due to a flaw in the authorization logic
|
< 1 Hr. | 556 | PRO | |
|
|
CVE-2019-5418
This exercise details the exploitation of CVE-2019-5418 to get code execution
|
1-2 Hr. | 514 | PRO | |
|
|
cve-2019-5420 II
This exercise details the exploitation of CVE-2019-5420 to gain code execution
|
1-2 Hr. | 573 | PRO |
Showing 121–150 of 170 exercises
Free Labs of the Month