:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-02-27
15:47:39 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2020-12

[EXPLOIT]

>> Artworks Gallery Management System 1.0 SQL Injection

USER: deepcore // 2020-12-23 // 0 CMT

Artworks Gallery Management System version 1.0 suffers from a remote SQL injection vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Android Studio Privilege Escalation

USER: deepcore // 2020-12-23 // 0 CMT

Android Studio has an issue where a malicious project can execute a custom cmd.exe allowing for privilege escalation. Google does not believe this is an issue.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> CSE Bookstore 1.0 SQL Injection

USER: deepcore // 2020-12-23 // 0 CMT

CSE Bookstore version 1.0 suffers from multiple remote SQL injection vulnerabilities. Original discovery of SQL injection in this version is attributed to Alper Basaran in October of 2020.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WordPress W3 Total Cache 0.9.3 File Read / Directory Traversal

USER: deepcore // 2020-12-23 // 0 CMT

This Metasploit module exploits an unauthenticated directory traversal vulnerability in WordPress plugin W3 Total Cache version 0.9.2.6 through 0.9.3, allowing arbitrary file read with the web server privileges.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Webmin 1.962 Remote Command Execution

USER: deepcore // 2020-12-23 // 0 CMT

This Metasploit module exploits an arbitrary command execution vulnerability in Webmin 1.962 and lower versions. Any user authorized to the Package Updates module can execute arbitrary commands with root privileges….

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Library Management System 3.0 Cross Site Scripting

USER: deepcore // 2020-12-23 // 0 CMT

Library Management System version 3.0 suffers from a persistent cross site scripting vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Multi Branch School Management System 3.5 Cross Site Scripting

USER: deepcore // 2020-12-23 // 0 CMT

Multi Branch School Management System version 3.5 suffers from a persistent cross site scripting vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Linux TIOCSPGRP Broken Locking

USER: deepcore // 2020-12-23 // 0 CMT

Linux suffers from broken locking in TIOCSPGRP that can lead to a corrupted refcount.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Baby Care System 1.0 – 'roleid' SQL Injection

USER: deepcore // 2020-12-23 // 0 CMT

Baby Care System 1.0 – ‘roleid’ SQL Injection

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] TerraMaster TOS 4.2.06 – Unauthenticated Remote Code Execution (Metasploit)

USER: deepcore // 2020-12-23 // 0 CMT

TerraMaster TOS 4.2.06 – Unauthenticated Remote Code Execution (Metasploit)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 4 5 6 … 42 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7085)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-02-24
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43679
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-02-27
TIME 15:47:39 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _