<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 14:01:47 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/arbitraryfileupload/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Serious File Upload Vulnerability In Contact Form 7 Threatened Millions Of Websites]]></title><description><![CDATA[Heads up, WordPress admins. A critical vulnerability that potentially threatened the security of millions of websites has recently received a fix. Specifically, a file upload vulnerability in the WordPress]]></description><link>http://direct.ecency.com/arbitraryfileupload/@twr/seriousfileuploadvulnerabilityincontactform7threatenedmillionsofwebsites-7axo0pebjwz796y9fjws</link><guid isPermaLink="true">http://direct.ecency.com/arbitraryfileupload/@twr/seriousfileuploadvulnerabilityincontactform7threatenedmillionsofwebsites-7axo0pebjwz796y9fjws</guid><category><![CDATA[arbitraryfileupload]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 18 Dec 2020 13:55:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU3Mz7kr1tbSNcRf1avDdstFumnUFzwg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Starbucks Mobile Platform Vulnerability Could Lead To Remote Code Execution]]></title><description><![CDATA[Starbucks has recently addressed a critical vulnerability affecting its mobile platform. The bug, upon exploitation, could severely threaten the platform security as it allowed code execution attacks.]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/starbucksmobileplatformvulnerabilitycouldleadtoremotecodeexecution-5cjjriltfh43wc7j3a9j</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/starbucksmobileplatformvulnerabilitycouldleadtoremotecodeexecution-5cjjriltfh43wc7j3a9j</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 12 Dec 2020 21:10:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU2pW1T7E9nmLckrsTY1JSuBBv2eVZLA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[File Manager WordPress Plugin Zero-Day Vulnerability Risked Thousands Of Websites]]></title><description><![CDATA[Heads up, WordPress admins! Another vulnerable WordPress plugin might have exposed your website to cyber threats. Reportedly, the File Manager plugin had a critical vulnerability that could allow remote]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/filemanagerwordpresspluginzero-dayvulnerabilityriskedthousandsofwebsites-nljvelhgrp</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/filemanagerwordpresspluginzero-dayvulnerabilityriskedthousandsofwebsites-nljvelhgrp</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 06 Sep 2020 16:25:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SvTrhrsmQbVyWtugtwpzVbeyrD9oPJmwyXEaeGxZt2SjQg4rra?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Quiz And Master Survey WP Plugin Vulnerabilities Allowed Site Takeover]]></title><description><![CDATA[Critical vulnerabilities existed in the Quiz and Master Survey plugin that threatened thousands of websites. Exploiting the flaw could allow an attacker to takeover the target website. Quiz And Master]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/quizandmastersurveywppluginvulnerabilitiesallowedsitetakeover-2a26z5pz1y</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/quizandmastersurveywppluginvulnerabilitiesallowedsitetakeover-2a26z5pz1y</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 18 Aug 2020 14:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig9SutMiFg5odnm2zKZHXtY1fTxYamZsqewjXPrC7cze6VkmPQEhTDQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Critical Security Vulnerability Existed in wpDiscuz WordPress Plugin]]></title><description><![CDATA[Once again, a critical security flaw in a WordPress plugin posed a threat to thousands of websites. This time, the researchers discovered the vulnerability in the wpDiscuz WordPress plugin. wpDiscuz WordPress]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalsecurityvulnerabilityexistedinwpdiscuzwordpressplugin-fomkbsx1kc</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalsecurityvulnerabilityexistedinwpdiscuzwordpressplugin-fomkbsx1kc</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 03 Aug 2020 07:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU4SxDwCTsNBPfCd8UBvGXMweRBtaB4z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Realtek Patched DLL Hijacking Vulnerability In HD Audio Driver]]></title><description><![CDATA[Realtek has recently confirmed a serious vulnerability in its HD Audio Driver Package for Windows. Upon exploit it could allow an adversary to evade security mechanisms and gain persistence on the target]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/realtekpatcheddllhijackingvulnerabilityinhdaudiodriver-h469e7hmlm</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/realtekpatcheddllhijackingvulnerabilityinhdaudiodriver-h469e7hmlm</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 10 Feb 2020 14:10:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgSGjWAzhFv3mUKBmDRdMvs6v?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Multiple RCE Vulnerabilities Found In Siemens Power Generation Plants]]></title><description><![CDATA[Like every other thing connected to the internet, power plants are also vulnerable to cyber attacks. Recently, researchers caught numerous vulnerabilities in Siemens equipment installed at power generation]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/multiplercevulnerabilitiesfoundinsiemenspowergenerationplants-fw5nfa9la8</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/multiplercevulnerabilitiesfoundinsiemenspowergenerationplants-fw5nfa9la8</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 16 Dec 2019 08:50:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNbgWqLjvdaPqD9RmZVAY3F45qZteHQajVXsWerTgBJWnAJZPGbVp4PwXAJWohcBAodiU7hwVpCDTis2fYLSZwtbDF37spoFKjVkTyYvzBsUSa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Privilege Escalation Vulnerability Discovered In Check Point’s Endpoint Security]]></title><description><![CDATA[A serious vulnerability was discovered in the Check Point Software that could allow an attacker elevate privileges and execute arbitrary code. Researchers spotted the flaw and reported it to Check Point]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/aprivilegeescalationvulnerabilitydiscoveredincheckpointsendpointsecurity-kmgmmq4qwv</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/aprivilegeescalationvulnerabilitydiscoveredincheckpointsendpointsecurity-kmgmmq4qwv</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 29 Aug 2019 14:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDSo5wavrnZYWhf6NUVUiYs2vVj2RvPXYxqQKVUffSViUCMUAFwxYTZbBpnSZQunDJX2sgFhNaKPo4rDiJG7TnwTjNGJjmPudvBVY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Critical Vulnerabilities Patched In Cisco Data Center Network Manager Software]]></title><description><![CDATA[Cisco has recently rolled-out fixes for multiple vulnerabilities in its Data Center Network Manager (DCNM) software. These include a total of four security fixes for vulnerabilities with varying severity]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalvulnerabilitiespatchedinciscodatacenternetworkmanagersoftware-er1rm2rtja</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/criticalvulnerabilitiespatchedinciscodatacenternetworkmanagersoftware-er1rm2rtja</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 02 Jul 2019 13:09:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/Gr7d242AAPKf91SVyDbD9rXWPNjf8kjWzKfQEeJoSncH6wafdAyhtRNAwBSXLuDg6j5FB3sCLtgFuTC4tbUs4XW1WKRkiXpX7bN3yDAYJLFPA36GPUUEg9LFP7FfGt6DSphGfZeFhGqtEoKFA4FX5JkKDAo2N5nKAzD2sbq8Zav9mF19JEJ?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>