http://chiangrai.cad.go.th/ash.html
http://chiangrai.cad.go.th/ash.html defaced by Ashiyane Digital Security Team
http://chiangrai.cad.go.th/ash.html
http://chiangrai.cad.go.th/ash.html defaced by Ashiyane Digital Security Team
http://chonburi.cad.go.th/ash.html
http://chonburi.cad.go.th/ash.html defaced by Ashiyane Digital Security Team
http://chonburi.cad.go.th/ash.html
http://chonburi.cad.go.th/ash.html defaced by Ashiyane Digital Security Team
http://chumphon.cad.go.th/ash.html
http://chumphon.cad.go.th/ash.html defaced by Ashiyane Digital Security Team
iDefense Security Advisory 07.20.11 – Safari Memory Corruption
iDefense Security Advisory 07.20.11 - Remote exploitation of a memory corruption vulnerability in Apple Inc.'s Safari browser could allow an attacker to execute arbitrary code with the privileges of the current user. Safari is Apple's Web browser and is based on the open source WebKit browser engine. This vulnerability occurs when Safari incorrectly handles an error state when encountering a broken XHTML tag.
iDefense Security Advisory 07.20.11 – WebKit Heap Overflow
iDefense Security Advisory 07.20.11 - Remote exploitation of a heap based buffer overflow vulnerability in WebKit, as included with Apple Inc.'s Safari Web browser, could allow an attacker to execute arbitrary code with the privileges of the current user. Safari versions prior to 5.1 and 5.0.6 are vulnerable.
http://www.yangtaladland.go.th/tmp/dz.txt
http://www.yangtaladland.go.th/tmp/dz.txt defaced by MCA-CRB
iDefense Security Advisory 07.20.11 – WebKit Use-After-Free
iDefense Security Advisory 07.20.11 - Remote exploitation of a use-after-free vulnerability in WebKit, as included with Apple Inc.'s Safari Web browser, could allow an attacker to execute arbitrary code with the privileges of the current user.
Hacking groups say they are back after FBI arrests
Lulz Security, Anonymous criticize government, companies