Subscribe via feed.
Archive for June, 2012

http://petjarean.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://petjarean.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , , , ,

http://promote.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://promote.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , ,

http://prsch.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://prsch.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , , ,

http://sadoawan.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://sadoawan.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , , , ,

http://saloa.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://saloa.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , , , ,

http://sapkaning.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://sapkaning.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , , ,

http://sawaisor.brm3.go.th/templates/ash.html

Posted by deepcore under defacement (No Respond)

http://sawaisor.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team

Tags: , ,

http://school.cpn1.go.th/spv/

Posted by deepcore under defacement (No Respond)

http://school.cpn1.go.th/spv/ notified by kinG oF coNTroL

Tags: , , , ,

Zero Day Initiative Advisory 12-108

Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Zero Day Initiative Advisory 12-109

Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file

Tags: , , ,