http://bmp.onab.go.th/wBm.html notified by 1923Turk
>> ARCHIVE: 2013-08
http://bmp.onab.go.th/wBm.html notified by 1923Turk
http://bdp.onab.go.th/wBm.html notified by 1923Turk
http://aya.onab.go.th/wBm.html notified by 1923Turk
http://www.patunnakure.go.th/wp-admin/x.txt notified by Dbuzz
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe
http://www.koksawang.go.th/index.php notified by G3taway19000
VLC Player 2.0.8 (.m3u) – Local Crash PoC
PCMAN FTP 2.07 STOR Command – Buffer Overflow Exploit
Mozilla Firefox 3.6 – Integer Overflow Exploit