Fraunhofer FKIE, Wachtberg, Germany
Abstract: Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a...
http://www.jocm.us/index.php?m=content&c=index&a=show&catid=124&id=600
Cisco ASA Malformed DNS Reply Denial of Service Vulnerability
Topic: phpThumb 1.7.12 Server Side Request Forgery Risk: Low Text:#phpThumb phpThumbDebug Server Side Request Forgery #Google Dork: inurl:phpThumb.php #Author: Rafay Baloch And Deepanker Ar...
http://cxsecurity.com/issue/WLB-2013120020
Folo theme for WordPress jplayer.swf cross-site scripting