:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-04
19:26:38 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2017-10

[SECURITY]

>> [webapps] OpenText Documentum Content Server – Privilege Escalation

USER: deepcore // 2017-10-17 // 0 CMT

OpenText Documentum Content Server – Privilege Escalation

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Microsoft Windows – 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memory Disclosure

USER: deepcore // 2017-10-17 // 0 CMT

Microsoft Windows – ‘nt!NtQueryObject (ObjectNameInformation)’ Kernel Pool Memory Disclosure

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [remote] Apple iOS 10.2 (14C92) – Remote Code Execution

USER: deepcore // 2017-10-17 // 0 CMT

Apple iOS 10.2 (14C92) – Remote Code Execution

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Microsoft Windows 10 – WLDP/MSHTML CLSID UMCI Bypass

USER: deepcore // 2017-10-17 // 0 CMT

Microsoft Windows 10 – WLDP/MSHTML CLSID UMCI Bypass

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Microsoft Edge Chakra – Accesses to Uninitialized Pointers in 'StackScriptFunction::BoxState::Box'

USER: deepcore // 2017-10-17 // 0 CMT

Microsoft Edge Chakra – Accesses to Uninitialized Pointers in ‘StackScriptFunction::BoxState::Box’

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Microsoft Edge Chakra JIT – 'RegexHelper::StringReplace' Must Call the Callback Function with Updating ImplicitCallFlags

USER: deepcore // 2017-10-17 // 0 CMT

Microsoft Edge Chakra JIT – ‘RegexHelper::StringReplace’ Must Call the Callback Function with Updating ImplicitCallFlags

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Microsoft Edge Chakra JIT – Incorrect GenerateBailOut Calling Patterns

USER: deepcore // 2017-10-17 // 0 CMT

Microsoft Edge Chakra JIT – Incorrect GenerateBailOut Calling Patterns

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] 3CX Phone System 15.5.3554.1 – Directory Traversal

USER: deepcore // 2017-10-16 // 0 CMT

3CX Phone System 15.5.3554.1 – Directory Traversal

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [shellcode] Windows x64 – API Hooking Shellcode (117 bytes)

USER: deepcore // 2017-10-16 // 0 CMT

Windows x64 – API Hooking Shellcode (117 bytes)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Quick CMS 6.4 SQL Injection / Authentication Bypass

USER: deepcore // 2017-10-15 // 0 CMT

Quick CMS version 6.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 13 14 15 … 31 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7096)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-04
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43690
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-04
TIME 19:26:38 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _