:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-12
11:08:20 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2021-07

[EXPLOIT]

>> Online Shopping Portal 3.1 SQL Injection

USER: deepcore // 2021-07-22 // 0 CMT

Proof of concept code for a time-based blind remote SQL injection vulnerability in Online Shopping Portal version 3.1. This is a variant of the original discovery of SQL injection in…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> News Portal Project 3.1 SQL Injection

USER: deepcore // 2021-07-22 // 0 CMT

News Portal Project version 3.1 suffers from multiple remote time-based SQL injection vulnerabilities.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> CSZ CMS 1.2.9 Arbitrary File Deletion

USER: deepcore // 2021-07-22 // 0 CMT

CSZ CMS version 1.2.9 suffers from an arbitrary file deletion vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Ampache 4.4.2 Cross Site Scripting

USER: deepcore // 2021-07-22 // 0 CMT

Ampache version 4.4.2 suffers from a cross site scripting vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Sequoia: A Deep Root In Linux's Filesystem Layer

USER: deepcore // 2021-07-22 // 0 CMT

Qualys discovered a size_t-to-int conversion vulnerability in the Linux kernel’s filesystem layer: by creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB, an unprivileged local…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WordPress Backup Guard Authenticated Remote Code Execution

USER: deepcore // 2021-07-22 // 0 CMT

This Metasploit module allows an attacker with a privileged WordPress account to launch a reverse shell due to an arbitrary file upload vulnerability in WordPress plugin Backup Guard versions prior…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Sage X3 Administration Service Authentication Bypass / Command Execution

USER: deepcore // 2021-07-22 // 0 CMT

This Metasploit module leverages an authentication bypass exploit within Sage X3 AdxSrv’s administration protocol to execute arbitrary commands as SYSTEM against a Sage X3 Server running an available AdxAdmin service.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WordPress KN Fix Your Title 1.0.1 Cross Site Scripting

USER: deepcore // 2021-07-21 // 0 CMT

WordPress KN Fix Your Title plugin version 1.0.1 suffers from a cross site scripting vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Webmin 1.973 Cross Site Request Forgery

USER: deepcore // 2021-07-21 // 0 CMT

Webmin version 1.973 cross site request forgery exploit that loads a reverse shell.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microsoft Windows WFP Default Rules AppContainer Capability Bypass Privilege Escalation

USER: deepcore // 2021-07-21 // 0 CMT

The default rules for the WFP connect layers permit certain executables to connect TCP sockets in AppContainers without capabilities leading to elevation of privilege.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 8 9 10 … 32 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-12
TIME 11:08:20 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _