This document lists various web applications that contain known vulnerabilities for testing purposes. It provides the name, URL, technologies used (e.g. programming languages, web servers, databases), and credentials if available for each application listed. A total of 24 vulnerable web applications are described without credentials and 13 are described with credentials to allow access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
142 views1 page
Entranamiento Aplicación Web
This document lists various web applications that contain known vulnerabilities for testing purposes. It provides the name, URL, technologies used (e.g. programming languages, web servers, databases), and credentials if available for each application listed. A total of 24 vulnerable web applications are described without credentials and 13 are described with credentials to allow access.