:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-04
19:17:04 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> ARCHIVE: 2021-12

[EXPLOIT]

>> Chikitsa Patient Management System 2.0.2 Backup Remote Code Execution

USER: deepcore // 2021-12-10 // 0 CMT

Chikitsa Patient Management System version 2.0.2 suffers from a backup related authenticated remote code execution vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Chikitsa Patient Management System 2.0.2 Plugin Remote Code Execution

USER: deepcore // 2021-12-10 // 0 CMT

Chikitsa Patient Management System version 2.0.2 suffers from a plugin related authenticated remote code execution vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> MTPutty 1.0.1.21 SSH Password Disclosure

USER: deepcore // 2021-12-10 // 0 CMT

MTPutty version 1.0.1 suffers from an SSH password disclosure vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WordPress Catch Themes Demo Import 1.6.1 Shell Upload

USER: deepcore // 2021-12-10 // 0 CMT

WordPress Catch Themes Demo Import plugin versions 1.6.1 and below suffer from a remote shell upload vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> TestLink 1.19 Arbitrary File Download

USER: deepcore // 2021-12-10 // 0 CMT

TestLink versions 1.16 through 1.19 suffer from an arbitrary file download vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> LimeSurvey 5.2.4 Remote Code Execution

USER: deepcore // 2021-12-10 // 0 CMT

LimeSurvey version 5.2.4 remote code execution exploit with a reverse shell.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microsoft Office Word MSHTML Remote Code Execution

USER: deepcore // 2021-12-10 // 0 CMT

This Metasploit module creates a malicious docx file that when opened in Word on a vulnerable Windows system will lead to code execution. This vulnerability exists because an attacker can…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Grafana 8.3.0 Directory Traversal / Arbitrary File Read

USER: deepcore // 2021-12-10 // 0 CMT

Grafana version 8.3.0 suffers from a directory traversal vulnerability that can allow for arbitrary file reading.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] OpenCATS 0.9.4 – Remote Code Execution (RCE)

USER: deepcore // 2021-12-10 // 0 CMT

OpenCATS 0.9.4 – Remote Code Execution (RCE)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Docker runc Command Execution Proof Of Concept

USER: deepcore // 2021-12-09 // 0 CMT

Docker proof of concept command execution exploit that leverages runc.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 10 11 12 … 17 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7096)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-04
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43690
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-04
TIME 19:17:04 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _