http://sapkaning.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://sawaisor.brm3.go.th/templates/ash.html notified by Ashiyane Digital Security Team
http://school.cpn1.go.th/spv/ notified by kinG oF coNTroL
Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file
http://sakol.nfe.go.th notified by zikou-16
Read More: [local exploits] – Apple QuickTime TeXML Stack Buffer Overflow
More: [webapps / 0day] – pliggCMS (thumbnail_plus) Remote File Inclusion