:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-01
22:46:18 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> CATEGORY: exploit

[EXPLOIT]

>> Grafana Arbitrary File Reading

USER: deepcore // 2021-12-09 // 0 CMT

Grafana suffers from an unauthorized arbitrary file reading vulnerability. Version 8.3.1 addresses this issue.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> ETS5 Password Recovery Tool

USER: deepcore // 2021-12-09 // 0 CMT

ETS Password Recovery Tool allows you to recover passwords for an ETS5 project. This is due to a significant design flaw as ETS5 uses a hard-coded password and salt to…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Simple Online Men's Salon Management System 1.0 SQL Injection

USER: deepcore // 2021-12-07 // 0 CMT

Simple Online Men’s Salon Management System version 1.0 appears to suffer from a time-based remote SQL injection vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> HCL Lotus Notes 12 Unquoted Service Path

USER: deepcore // 2021-12-07 // 0 CMT

HCL Lotus Notes version 12 suffers from an unquoted service path vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microsoft Internet Explorer Active-X Control Security Bypass

USER: deepcore // 2021-12-07 // 0 CMT

Microsoft Internet Explorer suffers from an active-x related bypass vulnerability. Microsoft will not address the issue as it is end of life.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Auerswald COMfortel 1400/2600/3600 IP 2.8F Authentication Bypass

USER: deepcore // 2021-12-07 // 0 CMT

RedTeam Pentesting discovered a vulnerability in the web-based configuration management interface of the Auerswald COMfortel 1400 and 2600 IP desktop phones. The vulnerability allows accessing configuration data and settings in…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Croogo 3.0.2 Remote Code Execution

USER: deepcore // 2021-12-07 // 0 CMT

Croogo version 3.0.2 suffers from an authenticated remote code execution vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Auerswald COMpact 8.0B Privilege Escalation

USER: deepcore // 2021-12-07 // 0 CMT

RedTeam Pentesting discovered a vulnerability in the web-based management interface of the Auerswald COMpact 5500R PBX which allows low-privileged users to access passwords of administrative user accounts. Affected versions include…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> runc / libcontainer Bind Mount Sources Insecure Handling

USER: deepcore // 2021-12-07 // 0 CMT

The recent commit #9c4440 introduces two vulnerabilities to libcontainer that can be exploited by an attacker with partial control over the bind mount sources of a new container.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Auerswald COMpact 8.0B Arbitrary File Disclosure

USER: deepcore // 2021-12-07 // 0 CMT

RedTeam Pentesting discovered a vulnerability in the web-based management interface of the Auerswald COMpact 5500R PBX which allows users with the “sub-admin” privilege to access any files on the PBX’s…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 215 216 217 … 2,233 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7087)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-01
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43681
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-01
TIME 22:46:19 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _