:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-03-01
12:50:15 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 
[EXPLOIT]

>> OpenNetAdmin 18.1.1 Remote Command Execution

USER: deepcore // 2021-05-11 // 0 CMT

OpenNetAdmin versions 8.5.14 through 18.1.1 remote command execution exploit written in Ruby. This exploit was based on the original discovery of the issue by mattpascoe.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> AWS CloudShell Terminal Escape Injection / Remote Code Execution

USER: deepcore // 2021-05-11 // 0 CMT

The javascript terminal emulator used by AWS CloudShell handles certain terminal escape codes incorrectly. This can lead to remote code execution if attacker controlled data is displayed in a CloudShell…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[DEFACEMENT]

>> http://www.bpp1.go.th//images/fighter.gif

USER: deepcore // 2021-05-11 // 0 CMT

http://www.bpp1.go.th//images/fighter.gif notified by Royal Battler BD

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [local] Odoo 12.0.20190101 – 'nssm.exe' Unquoted Service Path

USER: deepcore // 2021-05-11 // 0 CMT

Odoo 12.0.20190101 – ‘nssm.exe’ Unquoted Service Path

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Microweber CMS 1.1.20 – Remote Code Execution (Authenticated)

USER: deepcore // 2021-05-10 // 0 CMT

Microweber CMS 1.1.20 – Remote Code Execution (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] PHP Timeclock 1.04 – 'Multiple' Cross Site Scripting (XSS)

USER: deepcore // 2021-05-10 // 0 CMT

PHP Timeclock 1.04 – ‘Multiple’ Cross Site Scripting (XSS)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [local] TFTP Broadband 4.3.0.1465 – 'tftpt.exe' Unquoted Service Path

USER: deepcore // 2021-05-10 // 0 CMT

TFTP Broadband 4.3.0.1465 – ‘tftpt.exe’ Unquoted Service Path

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [local] BOOTP Turbo 2.0.0.1253 – 'bootpt.exe' Unquoted Service Path

USER: deepcore // 2021-05-10 // 0 CMT

BOOTP Turbo 2.0.0.1253 – ‘bootpt.exe’ Unquoted Service Path

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [local] DHCP Broadband 4.1.0.1503 – 'dhcpt.exe' Unquoted Service Path

USER: deepcore // 2021-05-10 // 0 CMT

DHCP Broadband 4.1.0.1503 – ‘dhcpt.exe’ Unquoted Service Path

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[SECURITY]

>> [webapps] Human Resource Information System 0.1 – 'First Name' Persistent Cross-Site Scripting (Authenticated)

USER: deepcore // 2021-05-10 // 0 CMT

Human Resource Information System 0.1 – ‘First Name’ Persistent Cross-Site Scripting (Authenticated)

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 577 578 579 … 4,369 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7087)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-03-01
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43681
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-03-01
TIME 12:50:15 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _