:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-05-20
02:26:47 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> CATEGORY: exploit

[EXPLOIT]

>> Samsung WifiHs20UtilityService Path Traversal

USER: deepcore // 2015-10-28 // 0 CMT

A path traversal vulnerability was found in the WifiHs20UtilityService. This service is running on a Samsung S6 Edge device, and may be present on other Samsung device models. WifiHs20UtilityService reads…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Samsung SecEmailComposer QUICK_REPLY_BACKGROUND Permission Weakness

USER: deepcore // 2015-10-28 // 0 CMT

The SecEmailComposer/EmailComposer application used by the Samsung S6 Edge has an exported service action to do quick replies to emails. It was found that this action required no permissions to…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Samsung Fimg2d FIMG2D_BITBLT_BLIT Ioctl Concurrency Flaw

USER: deepcore // 2015-10-28 // 0 CMT

The Samsung Graphics 2D driver (/dev/fimg2d) is accessible by unprivileged users/applications. It was found that the ioctl implementation for this driver contains a locking error which can lead to memory…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Samsung M2m1shot Kernel Driver Buffer Overflow

USER: deepcore // 2015-10-28 // 0 CMT

The Samsung m2m1shot driver framework is used to provide hardware acceleration for certain media functions, such as JPEG decoding and scaling images. The driver endpoint (/dev/m2m1shot_jpeg) is accessible by the…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Realtyna RPL 8.9.2 CSRF / Cross Site Scripting

USER: deepcore // 2015-10-24 // 0 CMT

The Realtyna RPL application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Zpanel 10.1.0 Remote Unauthenticated Code Execution

USER: deepcore // 2015-10-21 // 0 CMT

This Metasploit module exploits an information disclosure vulnerability found in Zpanel versions 10.1.0 and below. The vulnerability is due to a vulnerable version of pChart allowing remote, unauthenticated, users to…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> The First Rule Of Zero-Days Is No One Talks About Zero-Days

USER: deepcore // 2015-10-21 // 0 CMT

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> VLC 2.2.1 Stack Overflow

USER: deepcore // 2015-10-20 // 0 CMT

VLC version 2.2.1 libvlccore .mp3 stack overflow memory exhaustion exploit.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Belkin Router N150 Path Traversal

USER: deepcore // 2015-10-20 // 0 CMT

Belkin Router N150 suffers from a path traversal vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> RealtyScript 4.0.2 Cross Site Request Forgery / Cross Site Scripting

USER: deepcore // 2015-10-20 // 0 CMT

RealtyScript version 4.0.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 1,725 1,726 1,727 … 2,233 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7142)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-05-19
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43736
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-05-20
TIME 02:26:48 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _