http://promote.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
>> AUTHOR: deepcore
http://prsch.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sadoawan.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://saloa.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sapkaning.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sawaisor.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://school.cpn1.go.th/spv/ notified by kinG oF coNTroL
Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file