:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-16
17:58:08 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2020-05

[EXPLOIT]

>> webERP 4.15.1 Backup Disclosure

USER: deepcore // 2020-05-06 // 0 CMT

webERP version 4.15.1 suffers from an unauthenticated backup file disclosure vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> ATutor LMS 2.2.4 Weak Password Reset Hash

USER: deepcore // 2020-05-06 // 0 CMT

ATutor LMS version 2.2.4 suffers from having a weak password reset hash.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> TrixBox CE 2.8.0.4 Command Execution

USER: deepcore // 2020-05-06 // 0 CMT

This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> IBM Data Risk Manager 2.0.3 Default Password

USER: deepcore // 2020-05-06 // 0 CMT

This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> IBM Data Risk Manager 2.0.3 Remote Code Execution

USER: deepcore // 2020-05-06 // 0 CMT

IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[DEFACEMENT]

>> http://www.laoluang101.go.th/datafile/JT.html

USER: deepcore // 2020-05-06 // 0 CMT

http://www.laoluang101.go.th/datafile/JT.html notified by Mr.GonzX

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] GitLab 12.9.0 – Arbitrary File Read

USER: deepcore // 2020-05-06 // 0 CMT

GitLab 12.9.0 – Arbitrary File Read

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] webTareas 2.0.p8 – Arbitrary File Deletion

USER: deepcore // 2020-05-06 // 0 CMT

webTareas 2.0.p8 – Arbitrary File Deletion

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Online Clothing Store 1.0 – 'username' SQL Injection

USER: deepcore // 2020-05-06 // 0 CMT

Online Clothing Store 1.0 – ‘username’ SQL Injection

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Booked Scheduler 2.7.7 – Authenticated Directory Traversal

USER: deepcore // 2020-05-06 // 0 CMT

Booked Scheduler 2.7.7 – Authenticated Directory Traversal

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 28 29 30 … 35 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-16
TIME 17:58:08 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _