:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-18
18:25:22 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2021-09

[EXPLOIT]

>> FatPipe Networks WARP 10.2.2 Authorization Bypass

USER: deepcore // 2021-09-29 // 0 CMT

FatPipe Networks WARP version 10.2.2 suffers from an authorization bypass vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Configuration Disclosure

USER: deepcore // 2021-09-29 // 0 CMT

FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 is vulnerable to an unauthenticated configuration disclosure when a direct object reference is made to the backup archive file using an HTTP GET request.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Backdoor Account

USER: deepcore // 2021-09-29 // 0 CMT

FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 has the hidden administrative account cmuser that has no password and has write access permissions to the device. The user cmuser is not visible in…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Privilege Escalation

USER: deepcore // 2021-09-29 // 0 CMT

FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 suffers from a remote privilege escalation vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Pet Shop Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

USER: deepcore // 2021-09-29 // 0 CMT

Pet Shop Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [remote] Mitrastar GPT-2541GNAC-N1 – Privilege escalation

USER: deepcore // 2021-09-29 // 0 CMT

Mitrastar GPT-2541GNAC-N1 – Privilege escalation

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] WordPress Plugin Redirect 404 to Parent 1.3.0 – Reflected Cross-Site Scripting (XSS)

USER: deepcore // 2021-09-29 // 0 CMT

WordPress Plugin Redirect 404 to Parent 1.3.0 – Reflected Cross-Site Scripting (XSS)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] WordPress Plugin Select All Categories and Taxonomies 1.3.1 – Reflected Cross-Site Scripting (XSS)

USER: deepcore // 2021-09-29 // 0 CMT

WordPress Plugin Select All Categories and Taxonomies 1.3.1 – Reflected Cross-Site Scripting (XSS)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] OpenSIS 8.0 – 'cp_id_miss_attn' Reflected Cross-Site Scripting (XSS)

USER: deepcore // 2021-09-29 // 0 CMT

OpenSIS 8.0 – ‘cp_id_miss_attn’ Reflected Cross-Site Scripting (XSS)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Storage Unit Rental Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

USER: deepcore // 2021-09-29 // 0 CMT

Storage Unit Rental Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 2 3 4 … 33 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-18
TIME 18:25:22 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _