Webopac from Grand Vice info has a SQL Injection vulnerability, allowing unauthenticated remote attacks to inject arbitrary SQL commands to read, modify, and delete database contents.
#ADVISORY

The Binarly REsearch team leads the industry in firmware vulnerability disclosure and advisories. Binarly is the world's most advanced automated firmware supply chain security platform. Using cutting-edge machine-learning techniques, Binarly identifies both known and unknown vulnerabilities, misconfigurations, and malicious code in firmware and hardware components.

Third party vulnerabilities that have been reported by VulnCheck.

a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

The world's best dynamic repository for security vulnerabilities.

Latest information and remediations available for vulnerabilities concerning Palo Alto Networks products and services.

NEW

IT Security expertise - Penetration tests, Security audits, Code review, Training, Consulting, Vulnerability research

Explore security resources, trends and updates, media, podcast episodes, and more.

Get up-to-date hot takes on the state of cybersecurity today, from responses to US-CERT alerts, to using the MITRE ATT&CK framework.

GitHub Security Lab researchers find vulnerabilities in key, widely-used open source projects. We then coordinate the disclosure of those vulnerabilities to security teams at those projects. We only publish vulnerabilities here after they’ve been announced by the affected projects' development teams and patches are available. See our disclosure policy below for more information.

Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.

The latest information and archives of advisories.

Global Security Resource. In these times where a new major data breach occurs on a daily basis, it is important for the personal Internet user, corporations, and governments to stay aware of vulnerabilities that may affect their systems. Packet Storm provides around-the-clock information and tools in order to help mitigate both personal data and fiscal loss on a global scale. As new information surfaces, Packet Storm releases everything immediately through it's RSS feeds, Twitter, and Facebook. The site is referenced in over a hundred books and has a history of being spotlighted in the news.

A list of all publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers. While the affected vendor is working on a patch for these vulnerabilities, Trend Micro customers are protected from exploitation by security filters delivered ahead of public disclosure.