:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-05-08
20:03:00 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> CATEGORY: exploit

[EXPLOIT]

>> Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation

USER: deepcore // 2018-08-04 // 0 CMT

This Metasploit module attempts to gain root privileges on Linux systems by abusing UDP Fragmentation Offload (UFO). This exploit targets only systems using Ubuntu (Trusty / Xenial) kernels 4.4.0-21 <=…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Universal Media Server 7.1.0 XML Injection

USER: deepcore // 2018-08-03 // 0 CMT

Universal Media Server version 7.1.0 suffers from an XML external entity injection vulnerability in SSDP processing.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WebRTC H264 NAL Packet Type Confusion

USER: deepcore // 2018-08-02 // 0 CMT

WebRTC suffers from a type confusion vulnerability when processing an H264 NAL packet.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WebRTC FEC Processing Overflow

USER: deepcore // 2018-08-02 // 0 CMT

There are several calls to memcpy that can overflow the destination buffer in webrtc::UlpfecReceiverImpl::AddReceivedRedPacket. The method takes a parameter incoming_rtp_packet, which is an RTP packet with a mac length that…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> WebRTC VP8 Block Decoding Use-After-Free

USER: deepcore // 2018-08-02 // 0 CMT

There is a use-after-free in VP8 block decoding in WebRTC. The contents of the freed block is then treated a pointer, leading to a crash in WebRTC.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> HRSale 1.0.6 Local File Disclosure

USER: deepcore // 2018-08-02 // 0 CMT

HRSale HR Management PHP script version 1.0.6 suffers from a local file disclosure vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Packet Storm New Exploits For July, 2018

USER: deepcore // 2018-08-02 // 0 CMT

This archive contains all of the 162 exploits added to Packet Storm in July, 2018.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> SonicWall Global Management System XMLRPC

USER: deepcore // 2018-08-01 // 0 CMT

This Metasploit module exploits a vulnerability in SonicWall Global Management System Virtual Appliance versions 8.1 (Build 8110.1197) and below. This virtual appliance can be downloaded from http://www.sonicwall.com/products/sonicwall-gms/ and is used…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Vtiger CRM 6.3.0 Authenticated Logo Upload Remote Command Execution

USER: deepcore // 2018-08-01 // 0 CMT

Vtiger version 6.3.0 CRM’s administration interface allows for the upload of a company logo. Instead of uploading an image, an attacker may choose to upload a file containing PHP code…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> MicroFocus Secure Messaging Gateway Remote Code Execution

USER: deepcore // 2018-08-01 // 0 CMT

This Metasploit module exploits a SQL injection and command injection vulnerability in MicroFocus Secure Messaging Gateway. An unauthenticated user can execute a terminal command under the context of the web…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 950 951 952 … 2,233 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7127)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-05-01
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43721
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-05-08
TIME 20:03:00 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _