:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-05-12
00:30:02 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> AUTHOR: deepcore

[EXPLOIT]

>> iDS6 DSSPro Digital Signage System 6.2 Password Disclosure

USER: deepcore // 2020-11-06 // 0 CMT

iDS6 DSSPro Digital Signage System version 6.2 suffers from a cleartext transmission/storage of sensitive information in a cookie when using the Remember (autoSave=true) feature. This allows a remote attacker to…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Trend Micro IMSVA CSRF / XML Injection / SSRF / File Disclosure

USER: deepcore // 2020-11-06 // 0 CMT

Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) versions prior to 9.1.0 Critical Patch Build 2025 suffer from XML injection, over-privileged access, cross site request forgery, file disclosure, server-side request…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> iDS6 DSSPro Digital Signage System 6.2 Cross Site Request Forgery

USER: deepcore // 2020-11-06 // 0 CMT

iDS6 DSSPro Digital Signage System version 6.2 allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> iDS6 DSSPro Digital Signage System 6.2 CAPTCHA Security Bypass

USER: deepcore // 2020-11-06 // 0 CMT

The CAPTCHA function for iDS6 DSSPro Digital Signage System version 6.2 is prone to a security bypass vulnerability that occurs in the CAPTCHA authentication routine. By requesting the autoLoginVerifyCode object…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> iDS6 DSSPro Digital Signage System 6.2 Privilege Escalation

USER: deepcore // 2020-11-06 // 0 CMT

iDS6 DSSPro Digital Signage System version 6.2 suffers from a privilege escalation vulnerability. An authenticated user can elevate his/her privileges by calling JS functions from the console or by insecure…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] CMSUno 1.6.2 – 'lang' Remote Code Execution (Authenticated)

USER: deepcore // 2020-11-06 // 0 CMT

CMSUno 1.6.2 – ‘lang’ Remote Code Execution (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] SmartBlog 2.0.1 – 'id_post' Blind SQL injection

USER: deepcore // 2020-11-06 // 0 CMT

SmartBlog 2.0.1 – ‘id_post’ Blind SQL injection

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Sentrifugo 3.2 – 'assets' Remote Code Execution (Authenticated)

USER: deepcore // 2020-11-06 // 0 CMT

Sentrifugo 3.2 – ‘assets’ Remote Code Execution (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Sentrifugo Version 3.2 – 'announcements' Remote Code Execution (Authenticated)

USER: deepcore // 2020-11-06 // 0 CMT

Sentrifugo Version 3.2 – ‘announcements’ Remote Code Execution (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] BlogEngine 3.3.8 – 'Content' Stored XSS

USER: deepcore // 2020-11-06 // 0 CMT

BlogEngine 3.3.8 – ‘Content’ Stored XSS

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 738 739 740 … 4,193 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7128)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-05-10
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43722
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-05-12
TIME 00:30:02 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _