http://petjarean.brm3.go.th/templates/ash.html
http://petjarean.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://promote.brm3.go.th/templates/ash.html
http://promote.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://prsch.brm3.go.th/templates/ash.html
http://prsch.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sadoawan.brm3.go.th/templates/ash.html
http://sadoawan.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://saloa.brm3.go.th/templates/ash.html
http://saloa.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sapkaning.brm3.go.th/templates/ash.html
http://sapkaning.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sawaisor.brm3.go.th/templates/ash.html
http://sawaisor.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
Zero Day Initiative Advisory 12-108
Zero Day Initiative Advisory 12-108 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 12-109
Zero Day Initiative Advisory 12-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file