:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-19
11:33:27 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2016-04

[SECURITY]

>> [remote] – Advantech WebAccess Dashboard Viewer Arbitrary File Upload

USER: deepcore // 2016-04-26 // 0 CMT

Advantech WebAccess Dashboard Viewer Arbitrary File Upload

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Notes v4.5 iOS – File Include Web Vulnerability

USER: deepcore // 2016-04-25 // 0 CMT

The vulnerability laboratory core research team discovered a local file include vulnerability in the official Notes v4.5 iOS mobile web-application (wifi).

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> VoipNow v4.0.1 – (xajax_handler) Persistent Vulnerability

USER: deepcore // 2016-04-25 // 0 CMT

The vulnerability laboratory core research team discovered an application-side input validation vulnerability in the VoipNow v4.0.1 web-application.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Sophos XG Firewall (SF01V) – Persistent Web Vulnerability

USER: deepcore // 2016-04-25 // 0 CMT

An independent vulnerability laboratory researcher discovered an application-side validation vulnerability in the official Sophos XG Firewall (SF01V) appliance web-application.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Trend Micro (Account) – Email Spoofing Web Vulnerability

USER: deepcore // 2016-04-25 // 0 CMT

The Vulnerability Laboratory Core Research Team discovered an application-side vulnerability in the official Trend Micro Accounts online service web-application.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Negin Group CMS – (v) Multiple Web Vulnerabilities

USER: deepcore // 2016-04-25 // 0 CMT

The vulnerability laboratory core research team discovered multiple web vulnerabilities in the official Negin Group content management system.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] – Gemtek CPE7000 – WLTCS-106 Administrator SID Retriever (MSF)

USER: deepcore // 2016-04-25 // 0 CMT

Gemtek CPE7000 – WLTCS-106 Administrator SID Retriever (MSF)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] – C/C++ Offline Compiler and C For OS – Persistent XSS

USER: deepcore // 2016-04-25 // 0 CMT

C/C++ Offline Compiler and C For OS – Persistent XSS

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [local] – CompuSource Systems – Real Time Home Banking – Local Privilege Escalation

USER: deepcore // 2016-04-25 // 0 CMT

CompuSource Systems – Real Time Home Banking – Local Privilege Escalation

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] – Gemtek CPE7000 – WLTCS-106 sysconf.cgi Unauthenticated Remote Command Execution (MSF)

USER: deepcore // 2016-04-25 // 0 CMT

Gemtek CPE7000 – WLTCS-106 sysconf.cgi Unauthenticated Remote Command Execution (MSF)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 6 7 8 … 37 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-19
TIME 11:33:27 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _