http://loei.nfe.go.th/portal/phk/news/images/ashiyane.jpg defaced by Ashiyane Digital Security Team
>> AUTHOR: deepcore
http://sara.nfe.go.th/tak_ash.html defaced by Ashiyane Digital Security Team
http://www.pbi1.obec.go.th/scan_virus.txt defaced by Havittaja
http://www.khohongcity.go.th/detail.php?module2 defaced by Ashiyane Digital Security Team
http://www.tpso12.m-society.go.th/th/templates/beez/index.php defaced by iskorpitx
http://sdanc.spo.moph.go.th defaced by 3n_byt3
http://sk.nfe.go.th/hatyai/latin.html defaced by LatinHackTeam
Zero Day Initiative Advisory 11-231 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Zero Day Initiative Advisory 11-230 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles Apple Lossless Audio Codec streams.
Zero Day Initiative Advisory 11-229 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a specially formatted RIFF WAV file