<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 16:08:01 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/arbitrarycommands/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[File Manager WordPress Plugin Zero-Day Vulnerability Risked Thousands Of Websites]]></title><description><![CDATA[Heads up, WordPress admins! Another vulnerable WordPress plugin might have exposed your website to cyber threats. Reportedly, the File Manager plugin had a critical vulnerability that could allow remote]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/filemanagerwordpresspluginzero-dayvulnerabilityriskedthousandsofwebsites-nljvelhgrp</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/filemanagerwordpresspluginzero-dayvulnerabilityriskedthousandsofwebsites-nljvelhgrp</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 06 Sep 2020 16:25:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SvTrhrsmQbVyWtugtwpzVbeyrD9oPJmwyXEaeGxZt2SjQg4rra?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Quiz And Master Survey WP Plugin Vulnerabilities Allowed Site Takeover]]></title><description><![CDATA[Critical vulnerabilities existed in the Quiz and Master Survey plugin that threatened thousands of websites. Exploiting the flaw could allow an attacker to takeover the target website. Quiz And Master]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/quizandmastersurveywppluginvulnerabilitiesallowedsitetakeover-2a26z5pz1y</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/quizandmastersurveywppluginvulnerabilitiesallowedsitetakeover-2a26z5pz1y</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 18 Aug 2020 14:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig9SutMiFg5odnm2zKZHXtY1fTxYamZsqewjXPrC7cze6VkmPQEhTDQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Critical Security Vulnerability Existed in wpDiscuz WordPress Plugin]]></title><description><![CDATA[Once again, a critical security flaw in a WordPress plugin posed a threat to thousands of websites. This time, the researchers discovered the vulnerability in the wpDiscuz WordPress plugin. wpDiscuz WordPress]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalsecurityvulnerabilityexistedinwpdiscuzwordpressplugin-fomkbsx1kc</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalsecurityvulnerabilityexistedinwpdiscuzwordpressplugin-fomkbsx1kc</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 03 Aug 2020 07:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU4SxDwCTsNBPfCd8UBvGXMweRBtaB4z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Addressed Multiple Bugs In Data Center Network Manager]]></title><description><![CDATA[Cisco recently issued patches for numerous security bugs in the Data Center Network Manager. These include multiple medium and high-severity vulnerabilities and a critical-severity flaw. Critical Vulnerability]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/ciscoaddressedmultiplebugsindatacenternetworkmanager-0j18gufzmy</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/ciscoaddressedmultiplebugsindatacenternetworkmanager-0j18gufzmy</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 02 Aug 2020 23:55:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/Gr7d242AAPKf91SVyDbD9rXWPNjf8kjWzKfQEeJoSncH6wafdAyhtRNAwBSXLuDg6j5FB3sCLtgFuTC4tbUs4XW1WKRkiXpX7bN3yDAYJLFPA36GPUUEg9LFP7FfGt6DSphGfZeFhGqtEoKFA4FX5JkKDAo2N5nKAzD2sbq8Zav9mF19JEJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Addressed Multiple High-Risk Vulnerabilities In SD-WAN Solution]]></title><description><![CDATA[Cisco recently rolled- out fixes for multiple security vulnerabilities in SD-WAN Solution. These include high severity flaws that could allow compromise of routers. Cisco SD-WAN Solution High-Risk]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/ciscoaddressedmultiplehigh-riskvulnerabilitiesinsd-wansolution-n0vdmbbx9s</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/ciscoaddressedmultiplehigh-riskvulnerabilitiesinsd-wansolution-n0vdmbbx9s</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 23 Mar 2020 02:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4LLW7PvaocTNkSUvWXnxiJz1frjB5Y4fTvckrz7sc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Attack Strategy Against Smart Assistants Dubbed ‘LightCommands’]]></title><description><![CDATA[Researchers have come up with a new attack strategy against smart assistants. These attacks threaten all devices featuring voice assistants. Dubbed as ‘LightCommands’, these attacks enable a potential]]></description><link>http://direct.ecency.com/alexa/@twr/newattackstrategyagainstsmartassistantsdubbedlightcommands-sftbipzlnu</link><guid isPermaLink="true">http://direct.ecency.com/alexa/@twr/newattackstrategyagainstsmartassistantsdubbedlightcommands-sftbipzlnu</guid><category><![CDATA[alexa]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 10 Nov 2019 19:55:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pL5QgN8TiSPmncCKgPK5zu2cMNAwZR5tYwFwt5JjvUJSL4VwHqGAhzFe84JZ8EFtGpkokLbJgwFyzWs86vRnmRGPK7dUA8t3xMzG9NtRa5axcv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Critical VLC Media Player Vulnerability Discovered By German Researchers]]></title><description><![CDATA[The popular media playing software VLC was recently found to have a critical security flaw. Upon exploit, this flaw can allow potential attackers to execute remote code and conduct other malicious activities.]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalvlcmediaplayervulnerabilitydiscoveredbygermanresearchers-5t8y6k4nkn</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalvlcmediaplayervulnerabilitydiscoveredbygermanresearchers-5t8y6k4nkn</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 22 Jul 2019 23:45:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig9SutMiFekbQjdATULvX8p6N9PrAZi7WujYwyRHicJPKtsgNiqm8Ye?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Critical Vulnerabilities Patched In Cisco Data Center Network Manager Software]]></title><description><![CDATA[Cisco has recently rolled-out fixes for multiple vulnerabilities in its Data Center Network Manager (DCNM) software. These include a total of four security fixes for vulnerabilities with varying severity]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalvulnerabilitiespatchedinciscodatacenternetworkmanagersoftware-er1rm2rtja</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalvulnerabilitiespatchedinciscodatacenternetworkmanagersoftware-er1rm2rtja</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 02 Jul 2019 13:09:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/Gr7d242AAPKf91SVyDbD9rXWPNjf8kjWzKfQEeJoSncH6wafdAyhtRNAwBSXLuDg6j5FB3sCLtgFuTC4tbUs4XW1WKRkiXpX7bN3yDAYJLFPA36GPUUEg9LFP7FfGt6DSphGfZeFhGqtEoKFA4FX5JkKDAo2N5nKAzD2sbq8Zav9mF19JEJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Another Zero-Day Vulnerability Hits NUUO Surveillance Cameras]]></title><description><![CDATA[A couple of months ago, a zero-day vulnerability, named Peekaboo, threatened NUUO surveillance cameras. The vulnerability could allow an attacker to take control of the cameras and execute arbitrary code.]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/anotherzero-dayvulnerabilityhitsnuuosurveillancecameras-hkvow8rpkh</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/anotherzero-dayvulnerabilityhitsnuuosurveillancecameras-hkvow8rpkh</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 02 Dec 2018 15:18:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjW9xF8C5uEukYkbcUJFrB2NYTQmKsPZZjiS3BqpH8KU8y2iKe4jn6kiMRmJB8PSv3ocKxob6wzX7MUKKgYbNrvcc7yspPmpun53eXeNJY6wp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Patches Multiple Critical Security Flaws Affecting Different Products]]></title><description><![CDATA[Once again, Cisco has addressed multiple security vulnerabilities affecting different Cisco products. As disclosed via separate advisories, Cisco patches multiple critical security flaws that could allow]]></description><link>http://direct.ecency.com/arbitrarycommands/@twr/ciscopatchesmultiplecriticalsecurityflawsaffectingdifferentproducts-t78ry0cro7</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycommands/@twr/ciscopatchesmultiplecriticalsecurityflawsaffectingdifferentproducts-t78ry0cro7</guid><category><![CDATA[arbitrarycommands]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 11 Nov 2018 23:30:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/gPCasciUWmF1t2qk9kCnSQ78yJVZJEYafEVBNTUuVg2vsxiEpE78eF8DWYASwjiUYnZsu7Z9o5DQ9zHFyeEzhfC5bRX98hsL49qyZh88U8cbAcycrNBfrozDxD4waismQdmBWYYPABMwR4xPqg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Patched Privilege Escalation Vulnerability In Webex Meetings Desktop App]]></title><description><![CDATA[Cisco has recently fixed a serious privilege escalation vulnerability in its Webex Meetings app. The vulnerability could allow an attacker to execute arbitrary code. Fortunately, two researchers from Counter]]></description><link>http://direct.ecency.com/arbitrarycommands/@twr/ciscopatchedprivilegeescalationvulnerabilityinwebexmeetingsdesktopapp-w44zmwum5y</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycommands/@twr/ciscopatchedprivilegeescalationvulnerabilityinwebexmeetingsdesktopapp-w44zmwum5y</guid><category><![CDATA[arbitrarycommands]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 28 Oct 2018 17:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHTm4RuGqGWJGkBjGyUHZzjqitdP5R3LBSF8gS6feSsTMium7fp4dTH3UVrU9TjueQokVMtBECzKN8sAUiyUWZJp4iAnfocbtWETsCfVTTUu2xJ9aiuKgjYUde845CX5p?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Mozilla Patched Multiple Vulnerabilities In Thunderbird 60.2.1]]></title><description><![CDATA[Mozilla’s email client Thunderbird exhibited several security flaws that posed a threat to users’ security. As reported, upon discovering these vulnerabilities in Thunderbird, Mozilla released patches]]></description><link>http://direct.ecency.com/arbitrarycommands/@twr/mozillapatchedmultiplevulnerabilitiesinthunderbird6021-vm8yodwsi9</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycommands/@twr/mozillapatchedmultiplevulnerabilitiesinthunderbird6021-vm8yodwsi9</guid><category><![CDATA[arbitrarycommands]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 08 Oct 2018 19:31:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3Uq1Ke2N96GGxXzYfhcPyiRbLXG4bsCZyvY1872UFdc41eAvyTk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Patched Critical Vulnerability In Its Video Surveillance Manager Software]]></title><description><![CDATA[Recently, Cisco discovered a critical vulnerability in its Video Surveillance Manager during an internal security review. The vulnerability could allow an attacker to remotely access any target system]]></description><link>http://direct.ecency.com/arbitrarycommands/@twr/ciscopatchedcriticalvulnerabilityinitsvideosurveillancemanagersoftware-2rhc0tvwuh</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycommands/@twr/ciscopatchedcriticalvulnerabilityinitsvideosurveillancemanagersoftware-2rhc0tvwuh</guid><category><![CDATA[arbitrarycommands]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 24 Sep 2018 07:35:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2VZXybTSZJq1Lwq6YpsNYovjASW1FL13PG1puhcrN3SpcoJ9Vi7fL82MtD4ADtcDPNNJt2JkSCscXqyPYThiWMXxGSc4nJGng91Arvg6viP8HbfET7sP5vUYaBxnQSTDfAHmbQSxLC7Ss9mLJLvSeFfeqJe?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>