![]() |
owaspbwaOWASP Broken Web Applications ProjectVersion 1.2 |
This is the VM for the Open Web Application Security Project (OWASP) Broken Web Applications project. It contains many, very vulnerable web applications, which are listed below. More information about this project can be found in the project User Guide and Home Page.
For details about the known vulnerabilities in these applications, see https://sourceforge.net/p/owaspbwa/tickets/?limit=999&sort=_severity+asc.
Realistic, Intentionally Vulnerable Applications |
|---|
OWASP Vicnum
|
OWASP 1-Liner
|
Google Gruyere
|
Hackxor
|
WackoPicko
|
BodgeIt
|
Cyclone
|
Peruggia
|
Old (Vulnerable) Versions of Real Applications |
|---|
WordPress
|
OrangeHRM
|
GetBoo
|
GTD-PHP
|
Yazd
|
WebCalendar
|
Gallery2
|
Tiki Wiki
|
Joomla
|
AWStats
|
Applications for Testing Tools |
|---|
OWASP ZAP-WAVE
|
WAVSEP
|
WIVET
|
Demonstration Pages/Small Applications | |||
|---|---|---|---|
OWASP CSRFGuard Test Application
|
Mandiant Struts Forms
|
Simple ASP.NET Forms
|
Simple Form with DOM Cross Site Scripting
|
OWASP Demonstration Application |
|---|
OWASP AppSensor Demo Application
|
For information about the known vulnerabilities in these applications (or to submit some), visit https://sourceforge.net/p/owaspbwa/tickets/?limit=999&sort=_severity+asc.
If you encounter a problem with this VM (including with any of the installed applications), please submit an issue report on Google Code at http://code.google.com/p/owaspbwa/issues/list.