<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 12:20:21 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/csrf/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Critical CSRF Vulnerability Found In Glassdoor Platform]]></title><description><![CDATA[A serious security vulnerability affected the popular job and business review platform Glassdoor. The researcher found a CSRF vulnerability in the Glassdoor website that threatened the account security]]></description><link>http://direct.ecency.com/bug/@twr/criticalcsrfvulnerabilityfoundinglassdoorplatform-6kk6tutl5jxj8aahasl9</link><guid isPermaLink="true">http://direct.ecency.com/bug/@twr/criticalcsrfvulnerabilityfoundinglassdoorplatform-6kk6tutl5jxj8aahasl9</guid><category><![CDATA[bug]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 14 Dec 2020 03:15:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeTUEbspCueKMmbM74XfKNcaqXQx1qqswH1g9F1Tfm9RND7sKnDuzGWwFRfZLJdmzYskb4PebJmfUE9YEJpAyk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[More Bugs Discovered In Discount Rules for WooCommerce Plugin]]></title><description><![CDATA[It hasn’t been a while that we heard of multiple security bugs in the Discount Rules for WooCommerce Plugin. Yet, recently, researchers discovered some more vulnerabilities in the same plugin. Bugs In]]></description><link>http://direct.ecency.com/bug/@twr/morebugsdiscoveredindiscountrulesforwoocommerceplugin-a3bdzc3hcz</link><guid isPermaLink="true">http://direct.ecency.com/bug/@twr/morebugsdiscoveredindiscountrulesforwoocommerceplugin-a3bdzc3hcz</guid><category><![CDATA[bug]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 23 Sep 2020 16:50:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFuCTWkFvuu5WgJLySqUq4Ye72tSsp5JaXxUyES1JT1Vxo8SidJ1wquhcr9aUnuWhD84DG7Vdgm4uez9E8vCoWjkNHaVo5RRoE6oWw2vCSZcdDYa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Serious Vulnerabilities Found In MAGMI Magento Plugin]]></title><description><![CDATA[Researchers found two security vulnerabilities affecting the Magento database plugin MAGMI. These flaws could allow remote code execution attacks. MAGMI Magento Plugin Vulnerabilities The cybersecurity]]></description><link>http://direct.ecency.com/arbitrarycodeexecution/@twr/seriousvulnerabilitiesfoundinmagmimagentoplugin-061k5wej5j</link><guid isPermaLink="true">http://direct.ecency.com/arbitrarycodeexecution/@twr/seriousvulnerabilitiesfoundinmagmimagentoplugin-061k5wej5j</guid><category><![CDATA[arbitrarycodeexecution]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 08 Sep 2020 18:00:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgSGjWB17QsDvekTfn3SJfdSE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Numerous Vulnerabilities Found In Discount Rules for WooCommerce Plugin]]></title><description><![CDATA[Recently, the Discount Rules for WooCommerce Plugin has made it to the news owing to multiple vulnerabilities. Exploiting these flaws could allow remote code execution by a potential attacker. The flaws]]></description><link>http://direct.ecency.com/bug/@twr/numerousvulnerabilitiesfoundindiscountrulesforwoocommerceplugin-hxs5p5sysl</link><guid isPermaLink="true">http://direct.ecency.com/bug/@twr/numerousvulnerabilitiesfoundindiscountrulesforwoocommerceplugin-hxs5p5sysl</guid><category><![CDATA[bug]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 25 Aug 2020 17:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFuCTWkFvuu5WgJLySqUq4Ye72tSsp5JaXxUyES1JT1Vxo8SidJ1wquhcr9aUnuWhD84DG7Vdgm4uez9E8vCoWjkNHaVo5RRoE6oWw2vCSZcdDYa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Vulnerabilities In Event Service Meetup.com Could Allow Group Takeovers]]></title><description><![CDATA[Numerous vulnerabilities affected Meetup.com event service. These vulnerabilities, if exploited, could impact users’ privacy. An adversary could even takeover groups by exploiting the bugs. Vulnerabilities]]></description><link>http://direct.ecency.com/covid-19/@twr/vulnerabilitiesineventservicemeetupcomcouldallowgrouptakeovers-2fh1ygueel</link><guid isPermaLink="true">http://direct.ecency.com/covid-19/@twr/vulnerabilitiesineventservicemeetupcomcouldallowgrouptakeovers-2fh1ygueel</guid><category><![CDATA[covid-19]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 09 Aug 2020 20:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfv2WPWWJdHwQGsHXsdjdPAXMmN2EtsWmfBWDxSrLzFxCGQQSTPweuTy1Z4cfFRtNNc4NxjZXRitXvvmCyQoWurRV9Q?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[No Limit On Password Attempts Exposed Zoom Private Meetings To Cyber Attacks]]></title><description><![CDATA[Once again, a Zoom vulnerability has surfaced online that exposed Private Meetings to snoopers. The bug existed because Zoom didn’t put any limit on the number of password attempts to enter a meeting.]]></description><link>http://direct.ecency.com/bruteforce/@twr/nolimitonpasswordattemptsexposedzoomprivatemeetingstocyberattacks-r9clsgxdne</link><guid isPermaLink="true">http://direct.ecency.com/bruteforce/@twr/nolimitonpasswordattemptsexposedzoomprivatemeetingstocyberattacks-r9clsgxdne</guid><category><![CDATA[bruteforce]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 02 Aug 2020 23:45:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS4D2hbbhqdDfwx666WpMLERYaQgf33k?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Vulnerability In WPvivid Backup Plugin Could Expose Files Of WordPress Sites]]></title><description><![CDATA[Researchers found a serious security vulnerability in the WPvivid Backup plugin threatening numerous WordPress sites. Upon exploitation, this plugin vulnerability could expose all files of the target website]]></description><link>http://direct.ecency.com/bug/@twr/vulnerabilityinwpvividbackupplugincouldexposefilesofwordpresssites-1e7g9v0a1l</link><guid isPermaLink="true">http://direct.ecency.com/bug/@twr/vulnerabilityinwpvividbackupplugincouldexposefilesofwordpresssites-1e7g9v0a1l</guid><category><![CDATA[bug]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 31 Mar 2020 18:55:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU3Mz7kr1tbSNcRf1avDdstFumnUFzwg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bug Hunter Nets $15K Bounty For Discovering Exposed User Credentials in Paypal]]></title><description><![CDATA[PayPal has confirmed a bug in its website that could expose users’ email addresses and passwords. Considering the seriousness of the vulnerability, PayPal even awarded a $15K bounty to the researcher for]]></description><link>http://direct.ecency.com/accesstoken/@twr/bughunternets15kbountyfordiscoveringexposedusercredentialsinpaypal-640pqub6ba</link><guid isPermaLink="true">http://direct.ecency.com/accesstoken/@twr/bughunternets15kbountyfordiscoveringexposedusercredentialsinpaypal-640pqub6ba</guid><category><![CDATA[accesstoken]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 13 Jan 2020 21:25:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPVVD3ibm9RpkTRNtA9gBoU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Multiple TikTok Vulnerabilities Could Exploit Or Delete Users’ Personal Data]]></title><description><![CDATA[Social media craze TikTok has now made it to the news owing to security issues. Researchers have found numerous vulnerabilities in the TikTok app that could risk users’ security. Exploiting the bugs could]]></description><link>http://direct.ecency.com/checkpoint/@twr/multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or</link><guid isPermaLink="true">http://direct.ecency.com/checkpoint/@twr/multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or</guid><category><![CDATA[checkpoint]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 11 Jan 2020 06:25:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsNuKMjTPzqrTVdzWyJsSYQeeW5hs5MpYqS57uqhf2fWjowfP4xA9pj7uL2wPbA6WBiBFG8w2xVuAvDHEmEKtWycX9jc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Effectively Using Laravel Csrf_token in  a vue component]]></title><description><![CDATA[Laravel Submitting a form in laravel always requires a {{csrf_token}} field else we get a page expired error. Luckily for us laravel enables us to pass this into forms as a hidden input field with {{csrf}}]]></description><link>http://direct.ecency.com/laravel/@awamviktor/effectively-using-laravel-csrftoken-in-a-vue-component</link><guid isPermaLink="true">http://direct.ecency.com/laravel/@awamviktor/effectively-using-laravel-csrftoken-in-a-vue-component</guid><category><![CDATA[laravel]]></category><dc:creator><![CDATA[awamviktor]]></dc:creator><pubDate>Thu, 24 Jan 2019 13:09:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/D5zH9SyxCKd9GJ4T6rkBdeqZw1coQAaQyCUzUF4FozBvW7feKJaJ7CyqMiB5BLExVTwUTKo2ZzpMfSdRJ8DPyqKVyZu4ubZAjz5Ba61nXSkq5x4gf6TJjWXp27AfXRPDnxDFqY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Understanding & Mitigating Cross-Site Request Forgery (CSRF)]]></title><description><![CDATA[CSRF. Easy, enormously effective, frequently misunderstood. This attack can be called a sleeping lion because it is not taken as seriously as it should be. But what and just how bad is it? Cross-Site Request]]></description><link>http://direct.ecency.com/hacking/@cryptonvester/understanding-and-mitigating-cross-site-request-forgery-csrf</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@cryptonvester/understanding-and-mitigating-cross-site-request-forgery-csrf</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[cryptonvester]]></dc:creator><pubDate>Mon, 30 Apr 2018 16:50:57 GMT</pubDate></item><item><title><![CDATA[Wordpress CSRF Upload Bug]]></title><description><![CDATA[Hi all I will tell you today the gap found on Wordpress. Although it may seem like a small open, shell installations can do a lot of damage to our site. We need to be careful about this. Wordpress is the]]></description><link>http://direct.ecency.com/utopian-io/@ahmetbozkurt/wordpress-csrf-upload-bug-or-turkish</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@ahmetbozkurt/wordpress-csrf-upload-bug-or-turkish</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[ahmetbozkurt]]></dc:creator><pubDate>Wed, 17 Jan 2018 19:59:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPG8TiaYmgCjooQEJuEgzA6U6KSrwFVUDtWAgRCW7FXnEJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cross-Site Request Forgery (CSRF) | (Most Common Vulnerabilities to Hack Websites)]]></title><description><![CDATA[Cross-Site Request Forgery (CSRF) | (Most Common Vulnerabilities to Hack Websites) Today i will explain another way of how hackers hack people accounts but first let's what is CSRF? Cross-Site Request]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/cross-site-request-forgery-csrf-or-most-common-vulnerabilities-to-hack-websites</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/cross-site-request-forgery-csrf-or-most-common-vulnerabilities-to-hack-websites</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Sat, 28 Jan 2017 09:39:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/x7L2VSNEiyAJGtud3yLTYqEboHShHzKgzVuXKMkzLaGc3QiCEzcFU2Fg9EqCoqu19nifCbKibdGNZF4?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>