:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-12
18:28:32 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> AUTHOR: deepcore

[EXPLOIT]

>> Win32k NtGdiResetDC Use-After-Free / Local Privilege Escalation

USER: deepcore // 2021-11-11 // 0 CMT

A use after free vulnerability exists in the NtGdiResetDC() function of Win32k which can be leveraged by an attacker to escalate privileges to those of NT AUTHORITY\SYSTEM. The flaw exists…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] YeaLink SIP-TXXXP 53.84.0.15 – 'cmd' Command Injection (Authenticated)

USER: deepcore // 2021-11-11 // 0 CMT

YeaLink SIP-TXXXP 53.84.0.15 – ‘cmd’ Command Injection (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Apache HTTP Server 2.4.50 – Remote Code Execution (RCE) (3)

USER: deepcore // 2021-11-11 // 0 CMT

Apache HTTP Server 2.4.50 – Remote Code Execution (RCE) (3)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] AbsoluteTelnet 11.24 – 'Username' Denial of Service (PoC)

USER: deepcore // 2021-11-11 // 0 CMT

AbsoluteTelnet 11.24 – ‘Username’ Denial of Service (PoC)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] AbsoluteTelnet 11.24 – 'Phone' Denial of Service (PoC)

USER: deepcore // 2021-11-11 // 0 CMT

AbsoluteTelnet 11.24 – ‘Phone’ Denial of Service (PoC)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] FormaLMS 2.4.4 – Authentication Bypass

USER: deepcore // 2021-11-11 // 0 CMT

FormaLMS 2.4.4 – Authentication Bypass

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Movable Type 7 r.5002 XMLRPC API Remote Command Injection

USER: deepcore // 2021-11-10 // 0 CMT

This Metasploit module exploits a remote command injection vulnerability in Movable Type versions 7 r.5002 and below.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Google Assistant Authentication Bypass

USER: deepcore // 2021-11-10 // 0 CMT

Google Assistant suffered from an authentication bypass vulnerability allowing a webpage to execute commands without permission.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Google Assistant Authentication Bypass

USER: deepcore // 2021-11-10 // 0 CMT

Google Assistant suffered from an authentication bypass vulnerability allowing a webpage to execute commands without permission.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Employee Daily Task Management System 1.0 – 'Name' Stored Cross-Site Scripting (XSS)

USER: deepcore // 2021-11-10 // 0 CMT

Employee Daily Task Management System 1.0 – ‘Name’ Stored Cross-Site Scripting (XSS)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 332 333 334 … 4,193 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-12
TIME 18:28:32 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _