:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-18
09:43:07 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> AUTHOR: deepcore

[EXPLOIT]

>> Moodle Authenticated Spelling Binary Remote Code Execution

USER: deepcore // 2021-10-13 // 0 CMT

Moodle allows an authenticated user to define spellcheck settings via the web interface. The user can update the spellcheck mechanism to point to a system-installed aspell binary. By updating the…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Moodle SpellChecker Path Authenticated Remote Command Execution

USER: deepcore // 2021-10-13 // 0 CMT

Moodle allows an authenticated administrator to define spellcheck settings via the web interface. An administrator can update the aspell path to include a command injection. This is extremely similar to…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Moodle Teacher Enrollment Privilege Escalation / Remote Code Execution

USER: deepcore // 2021-10-13 // 0 CMT

Moodle versions 3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12, and earlier unsupported versions allow for a teacher to exploit chain to remote code execution. A bug in…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Moodle Admin Shell Upload

USER: deepcore // 2021-10-13 // 0 CMT

This Metasploit module will generate a plugin which can receive a malicious payload request and upload it to a server running Moodle provided valid admin credentials are used. Then the…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Zero-Day Hunters Seek Laws To Prevent Vendors Suing Them For Helping Out And Doing Their Jobs

USER: deepcore // 2021-10-13 // 0 CMT

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Simple Payroll System 1.0 – SQLi Authentication Bypass

USER: deepcore // 2021-10-13 // 0 CMT

Simple Payroll System 1.0 – SQLi Authentication Bypass

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Company's Recruitment Management System 1.0 – 'Multiple' SQL Injection (Unauthenticated)

USER: deepcore // 2021-10-13 // 0 CMT

Company’s Recruitment Management System 1.0 – ‘Multiple’ SQL Injection (Unauthenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Keycloak 12.0.1 – 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated)

USER: deepcore // 2021-10-13 // 0 CMT

Keycloak 12.0.1 – ‘request_uri ‘ Blind Server-Side Request Forgery (SSRF) (Unauthenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [remote] Cypress Solutions CTM-200/CTM-ONE – Hard-coded Credentials Remote Root (Telnet/SSH)

USER: deepcore // 2021-10-13 // 0 CMT

Cypress Solutions CTM-200/CTM-ONE – Hard-coded Credentials Remote Root (Telnet/SSH)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Apache HTTP Server 2.4.50 – Path Traversal & Remote Code Execution (RCE)

USER: deepcore // 2021-10-13 // 0 CMT

Apache HTTP Server 2.4.50 – Path Traversal & Remote Code Execution (RCE)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 369 370 371 … 4,193 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7106)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-05
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43700
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-18
TIME 09:43:07 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _