:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-28
19:14:32 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> AUTHOR: deepcore

[EXPLOIT]

>> Backdoor.Win32.Androm.df Code Execution

USER: deepcore // 2021-06-04 // 0 CMT

Backdoor.Win32.Androm.df malware suffers from a code execution vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> QT TIFF Processing Heap Overflow

USER: deepcore // 2021-06-04 // 0 CMT

There is a heap corruption bug that can occur when QT processes a malformed TIFF image. It happens because the size of the QImageData backing the image is calculated is…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Chrome Legacy ipc::Message Passed Via Shared Memory

USER: deepcore // 2021-06-04 // 0 CMT

Looking at the Mojo implementation of Chrome’s legacy IPC, the legacy ipc::Message type is transferred inside a BigBuffer.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> SuiteCRM Log File Remote Code Execution

USER: deepcore // 2021-06-04 // 0 CMT

This Metasploit module exploits an input validation error on the log file extension parameter. It does not properly validate upper/lower case characters. Once this occurs, the application log file will…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Cisco HyperFlex HX Data Platform Command Execution

USER: deepcore // 2021-06-04 // 0 CMT

This Metasploit module exploits an unauthenticated command injection in Cisco HyperFlex HX Data Platform’s /storfs-asup endpoint to execute shell commands as the Tomcat user.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Monstra CMS 3.0.4 – Remote Code Execution (Authenticated)

USER: deepcore // 2021-06-04 // 0 CMT

Monstra CMS 3.0.4 – Remote Code Execution (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Gitlab 13.10.2 – Remote Code Execution (Authenticated)

USER: deepcore // 2021-06-04 // 0 CMT

Gitlab 13.10.2 – Remote Code Execution (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Inkpad Notepad & To do list 4.3.61 – Denial of Service (PoC)

USER: deepcore // 2021-06-04 // 0 CMT

Inkpad Notepad & To do list 4.3.61 – Denial of Service (PoC)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Color Notes 1.4 – Denial of Service (PoC)

USER: deepcore // 2021-06-04 // 0 CMT

Color Notes 1.4 – Denial of Service (PoC)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [dos] Macaron Notes great notebook 5.5 – Denial of Service (PoC)

USER: deepcore // 2021-06-04 // 0 CMT

Macaron Notes great notebook 5.5 – Denial of Service (PoC)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 495 496 497 … 4,193 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7110)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-26
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43704
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-28
TIME 19:14:32 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _