EnglishArabicBulgarianCroatianCzechDanishDutchFinnishFrenchGermanGreekHindiItalianJapaneseKoreanNorwegianPolishPortugueseRomanianRussianSpanishSwedishCatalanFilipinoHebrewIndonesianLatvianLithuanianSerbianSlovakSlovenianUkrainianVietnameseAlbanianEstonianGalicianHungarianMalteseThaiTurkishPersianAfrikaansMalaySwahiliIrishWelshBelarusianIcelandicMacedonianYiddishArmenianAzerbaijaniBasqueGeorgianHaitian CreoleUrduChinese (S)Chinese (T)
You are here:: Software Zeitgeist VRAD (BETA)

Zeitgeist VRA

Quite simply put a powerful indexed "Vulnerability Research Advisory" is something that is lacking in today's software world. Zeigeist VRA bridges the gap by providing a searchable ajax database with vulnerability profiles for software from all across the board.

Tags: software, providing, vulnerability, bridges, searchable, ajax, board, profiles, database, zeigeist, today's, powerful

Share:Ask!BlinkBits!Blinklist!Blogmarks!BlogRolling!Cannotea!Del.icio.us!Digg!Diigo!DZone!Free and Open Source Software NewsFacebook!Fark!Faves!FeedMeLinks!Furl! GodSurfer!Google!linkaGoGo!Live!Ma.gnolia!Maple!Mister-Wong!Mixx!MyLinkVault!MySpace!Netscape!Netvouz!Newsvine!RawSugar!Reddit!ShoutWire!Simpy!Slashdot!Smarking!

  • Zeitgeist Hacking Team News ( 0 Articles )

    Interested in seeing what's being compromised on a daily basis? Here you go.

  • Remote Exploits ( 1 Article )

    A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system.

  • Local Exploits ( 1 Article )

    A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator.

  • Web Applications ( 1 Article )

    Content management systems, web scripts and form builders are all examples of "Web Applications".

  • Denial Of Service / POC ( 1 Article )

    A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users

  • Shellcode ( 1 Article )

    In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine.

  • Miscellaneous ( 0 Articles )

    Generally every type of Vulnerability that doesn't fit into the above categories goes here.

  • Search Engines ( 0 Articles )

    Google, Yahoo, Bing, & more. Break into them all.

  • White Papers ( 0 Articles )

    Education in scripting keeps you from getting hacked. Check out our white paper collection.