:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-13
05:08:39 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2018-02

[EXPLOIT]

>> LogicalDOC Enterprise 7.7.4 Post-Auth Command Execution

USER: deepcore // 2018-02-13 // 0 CMT

LogicalDOC Enterprise version 7.7.4 suffers from a post-authentication command execution vulnerability via binary path manipulation.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> CloudMe Sync 1.10.9 Remote Buffer Overflow

USER: deepcore // 2018-02-13 // 0 CMT

CloudMe Sync versions 1.10.9 and below suffer from an unauthenticated remote buffer overflow vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [remote] CloudMe Sync < 1.11.0 – Buffer Overflow

USER: deepcore // 2018-02-13 // 0 CMT

CloudMe Sync < 1.11.0 – Buffer Overflow

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] TypeSetter CMS 5.1 – 'Host' Header Injection

USER: deepcore // 2018-02-13 // 0 CMT

TypeSetter CMS 5.1 – ‘Host’ Header Injection

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] TypeSetter CMS 5.1 – Cross-Site Request Forgery

USER: deepcore // 2018-02-13 // 0 CMT

TypeSetter CMS 5.1 – Cross-Site Request Forgery

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] News Website Script 2.0.4 – 'search' SQL Injection

USER: deepcore // 2018-02-13 // 0 CMT

News Website Script 2.0.4 – ‘search’ SQL Injection

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[DEFACEMENT]

>> http://www.omkoi.go.th/readme.htm

USER: deepcore // 2018-02-12 // 0 CMT

http://www.omkoi.go.th/readme.htm notified by Dijehaji

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> SoapUI 5.3.0 Code Execution

USER: deepcore // 2018-02-12 // 0 CMT

SoapUI suffers from an arbitrary code execution vulnerability via a maliciously imported project.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Juju-run Agent Privilege Escalation

USER: deepcore // 2018-02-12 // 0 CMT

This Metasploit module attempts to gain root privileges on Juju agent systems running the juju-run agent utility. Juju agent systems running agent tools prior to version 1.25.12, 2.0.x before 2.0.4,…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [local] glibc – '$ORIGIN' Expansion Privilege Escalation (Metasploit)

USER: deepcore // 2018-02-12 // 0 CMT

glibc – ‘$ORIGIN’ Expansion Privilege Escalation (Metasploit)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 20 21 22 … 37 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-13
TIME 05:08:39 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _