Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Web Exploits
Specific
SQL Injection, XSS, CSRF, Command Injection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
199312
posts in
24.2
ms
1,000,000 WordPress Sites Affected by
Arbitrary
File Read and SQL Injection Vulnerabilities in
Avada
Builder WordPress Plugin
🛡️
OWASP
malware.news
·
1d
SQL injection vulnerability
allowing
login
bypass
🔓
Hacking
infosecwriteups.com
·
9h
How We
Implemented
Content Security Policy (
CSP
) in Our Laravel App
🛡️
Content Security Policy
blog.shakiltech.com
·
6d
·
DEV
entry
date
index
🛡️
OWASP
vuxml.freebsd.org
·
4h
When Prompts Become
Payloads
: A Framework for
Mitigating
SQL Injection Attacks in Large Language Model-Driven Applications
🛡️
AI Security
arxiv.org
·
2d
Universal
Robots
Polyscope
5
🚧
Execution Guardrails
cisa.gov
·
6h
All Your
GUCs
in a Row:
backslash
_quote
📝
Format String Bugs
thebuild.com
·
20h
OffSec
’s
Exploit
Database Archive
💥
Exploit Dev
exploit-db.com
·
1d
HTB
:
Overwatch
🚩
CTF
0xdf.gitlab.io
·
5d
SQL
Injection Made Easy: A
Beginner
’s Guide
🔒
Database Security
meetcyber.net
·
2d
[
Linkpost
] Language Models Can
Autonomously
Hack and Self-Replicate
🛡️
AI Security
lesswrong.com
·
3d
The SQL Injection of Language Models:
Exploiting
an LLM in 8
Tokens
🤖
LLM
medium.com
·
2d
Cross Site Scripting (
XSS
) in WordPress
Gravity
Forms Plugin
🛡️
Content Security Policy
patchstack.com
·
1d
Avada
Builder
Flaws
Expose One Million WordPress Sites
🌍
Browser Exploits
infosecurity-magazine.com
·
1d
DVWA
(Command
injection
)
💉
Process Injection
medium.com
·
2d
IronCorp
— DNS Zone Transfer →
SSRF
→ Command Injection → SYSTEM
🔁
DNS Rebinding
infosecwriteups.com
·
9h
CISA
Adds One Known
Exploited
Vulnerability to Catalog
🐛
Bug Bounty
cisa.gov
·
6d
2nd lab
DVWA
(
XSS
)
🐛
Bug Bounty
medium.com
·
2d
Adversarial
SQL Injection Generation with LLM-Based
Architectures
🕳
LLM Vulnerabilities
arxiv.org
·
1d
Exploiting Insecure Output Handling in LLMs via
Indirect
Prompt Injection (
XSS
)
🕳
LLM Vulnerabilities
infosecwriteups.com
·
1d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help