<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 24 May 2026 20:02:36 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/rce/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Cisco Webex Vulnerabilities Could Expose Meetings To Ghost Users]]></title><description><![CDATA[Cisco has recently addressed serious vulnerabilities affecting its Webex video conferencing app. Exploiting the bugs could allow unsolicited users to barge into meetings. Thankfully, Cisco addressed the]]></description><link>http://direct.ecency.com/cisco/@twr/ciscowebexvulnerabilitiescouldexposemeetingstoghostusers-3iencxos3a9dcna0iyd9</link><guid isPermaLink="true">http://direct.ecency.com/cisco/@twr/ciscowebexvulnerabilitiescouldexposemeetingstoghostusers-3iencxos3a9dcna0iyd9</guid><category><![CDATA[cisco]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 23 Nov 2020 14:50:03 GMT</pubDate><enclosure url="https://i.ecency.com/p/B69zEhWZA8UCiEm3eiMELoBm7j2wyGV99aq2zeonUKwxQ7XMzBj6oDizcizJTMWGEJa2DSWxPpgqYddB2pNR64oFCpnFVmyYQK3Ax4er?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Patched Multiple High-Severity Flaws In Webex Meetings Desktop App]]></title><description><![CDATA[Cisco recently issued numerous security fixes for bugs affecting a range of products. These also include some high-severity flaws in the Webex Meetings Desktop app. Serious Bug In Webex Meetings App For]]></description><link>http://direct.ecency.com/cisco/@twr/ciscopatchedmultiplehigh-severityflawsinwebexmeetingsdesktopapp-zqqrjihq75</link><guid isPermaLink="true">http://direct.ecency.com/cisco/@twr/ciscopatchedmultiplehigh-severityflawsinwebexmeetingsdesktopapp-zqqrjihq75</guid><category><![CDATA[cisco]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 22 Jun 2020 12:40:00 GMT</pubDate><enclosure url="https://i.ecency.com/p/LcTxR7u1XKacLDi8fVBKY2JFpvF6xxk8mBcKjjZUsrMJdKPKHZmwBCduPDVpnDxpfNbQo4ZxH97wyKQNUGAqREncKVsEVVk6ezfrx7XQuMxuxPU4PozDsAm7jgeTWo2RcybBL31vsLkkj7vQPX2ATRzcv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[WhatsApp Exploit POC Allows Attackers to Hijack Chat Sessions Via Malicious GIFs]]></title><description><![CDATA[Heads up WhatsApp users! If you haven’t updated your WhatsApp yet, you must do it now as a serious security flaw exposes your chats to attackers. A security researcher has discovered an RCE vulnerability]]></description><link>http://direct.ecency.com/bug/@twr/whatsappexploitpocallowsattackerstohijackchatsessionsviamaliciousgifs-t0c7kf9cio</link><guid isPermaLink="true">http://direct.ecency.com/bug/@twr/whatsappexploitpocallowsattackerstohijackchatsessionsviamaliciousgifs-t0c7kf9cio</guid><category><![CDATA[bug]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 06 Oct 2019 17:00:00 GMT</pubDate><enclosure url="https://i.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig9SuvFNdBbpg4DbwfBceWSAJNcMp11QFCvg1tFnABCcpnDbWMdfraS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Entropia Universe MMORPG]]></title><description><![CDATA[questa è la mia prima inserzione su steem sono gamer dalla tenera età di 10 anni quandi ricevetti la mia prima console(PS1), da quell anno e stata una passione sempre maggiore pure ora che ho 30 anni gioco]]></description><link>http://direct.ecency.com/entropiauniverse/@jondejip/entropia-universe-mmorpg</link><guid isPermaLink="true">http://direct.ecency.com/entropiauniverse/@jondejip/entropia-universe-mmorpg</guid><category><![CDATA[entropiauniverse]]></category><dc:creator><![CDATA[jondejip]]></dc:creator><pubDate>Mon, 30 Sep 2019 15:04:00 GMT</pubDate></item><item><title><![CDATA[via threatpost.com: Update: VLC Media Player Plagued By Unpatched Critical RCE Flaw]]></title><description><![CDATA[by Lindsey O'Donnell A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution. UPDATE After a German security agency reported]]></description><link>http://direct.ecency.com/vlc/@doifeellucky/via-threatpost-com-update-vlc-media-player-plagued-by-unpatched-critical-rce-flaw</link><guid isPermaLink="true">http://direct.ecency.com/vlc/@doifeellucky/via-threatpost-com-update-vlc-media-player-plagued-by-unpatched-critical-rce-flaw</guid><category><![CDATA[vlc]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Fri, 26 Jul 2019 10:46:15 GMT</pubDate><enclosure url="https://i.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5AYBAr6L4fJaT3hJfLtj22GnES?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[GTR vs Ferrari Street Race 🚩😮]]></title><description><![CDATA[GTR vs Ferrari Street Race 🚩😮 ▶️ DTube ▶️ IPFS]]></description><link>http://direct.ecency.com/gtr/@shahzadakram/q9ribmxl</link><guid isPermaLink="true">http://direct.ecency.com/gtr/@shahzadakram/q9ribmxl</guid><category><![CDATA[gtr]]></category><dc:creator><![CDATA[shahzadakram]]></dc:creator><pubDate>Tue, 06 Feb 2018 20:51:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM9Y8Jt268bP3uLBLJoeF882vwF3ZgThwDkrh19hiFWeDT8RhV78S5iBSixZTB?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2 0day RCE Magento Plugin's exploits]]></title><description><![CDATA[Hello. Now i want to present 2 exploitable Magento Plugins. Vuln type: RCE Method: RCE with PHP Object Injection HTTP GET PARAMETR coded in BASE64, just decode it and check payload. It's really easy. Example]]></description><link>http://direct.ecency.com/cybersecurity/@nullbyte/2-0day-rce-magento-plugin-s-exploits</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@nullbyte/2-0day-rce-magento-plugin-s-exploits</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[nullbyte]]></dc:creator><pubDate>Sun, 04 Jun 2017 19:20:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/RGgukq5E6HBS5wvERDA3ZF4P2WKQy2VoZZet1QV2g9eubrD2dxWPfkM879exDiYhs8BScZQGijjVFCHTPhm6hrHLpQbVMuBmcyFU9WfpK9kNevLV2QHxCGHoNZ1V3GS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[RCE (Remote Code Execution) - (Most Common Websites Vulnerabilities)]]></title><description><![CDATA[remote code execution (RCE) Another Name of RCE is also called arbitrary code execution.Which is used to describe an attacker's ability to execute any command of the attacker's choice on a target machine]]></description><link>http://direct.ecency.com/hacked/@ammadkhalid/rce-remote-code-execution-most-common-websites-vulnerabilities</link><guid isPermaLink="true">http://direct.ecency.com/hacked/@ammadkhalid/rce-remote-code-execution-most-common-websites-vulnerabilities</guid><category><![CDATA[hacked]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Mon, 30 Jan 2017 16:18:42 GMT</pubDate><enclosure url="https://i.ecency.com/p/8SzwQbWfyWo6W2J7TB5cPDzs1F34U8PYrEShqa5fufrDpHEgtesoucjeroXZttJ8yYp9YZ8MwF3KDAvS2rdnFikmjJavWiJgqiQFrcoaEXXuYJB25S6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[CRITICAL] Vulnerable RCE in wSecure Lite(Wordpress)]]></title><description><![CDATA[This vulnerability allows attackers to access the servers of all sites using version 2.3 of Wsecure or older with disabled "Magic Quotes" and don't require plugin be active. Plugin have more]]></description><link>http://direct.ecency.com/vulnerable/@soft/critical-vulnerable-rce-in-wsecure-lite-wordpress</link><guid isPermaLink="true">http://direct.ecency.com/vulnerable/@soft/critical-vulnerable-rce-in-wsecure-lite-wordpress</guid><category><![CDATA[vulnerable]]></category><dc:creator><![CDATA[soft]]></dc:creator><pubDate>Mon, 01 Aug 2016 12:18:39 GMT</pubDate></item></channel></rss>