<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 28 Apr 2026 05:14:58 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/xxe/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Dateien in Blockchain schpeichern]]></title><description><![CDATA[In diesem Post geht es um das Schpeichern von Dateien in der Steemit-Blockchain. Zunächst muss die Datei in Text encodiert werden. Dazu wird XXencode verwendet. Beispiel: Zunächst muss eine Datei ausgewählt]]></description><link>http://direct.ecency.com/deutsch/@felix7d2/dateien-in-blockchain-schpeichern</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@felix7d2/dateien-in-blockchain-schpeichern</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[felix7d2]]></dc:creator><pubDate>Sat, 31 Mar 2018 10:32:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWPGGUiZ9pqnZoj8JHYxCCp9dtn2QVeoPU1rfoFVgwKkKASNWvvqw8n7tyAj2JRxzhn9y6QriBwgCTPdL9qKnFBxuWTxeBLbP2DTWdRBiara?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[이것만은지키자] 보안이야기1- OWASP TOP 10 2017 의 신규 취약점. "XML 외부 개체(XXE)" 문제]]></title><description><![CDATA[안녕하세요. 첫 보안 게시글로 OWASP TOP 10 2017 버젼에서 새로 등록된 취약점인 "XML 외부 개체(XXE)" 문제에 대해 다뤄보려고 합니다. 해당 글은 상황에 따라, 주기적으로 업데이트 됩니다. [참조: OWASP TOP 10 2017 코리아챕터] 먼저 OWASP 에서 말하는 해당 공격의 정의는 아래와 같다. " 오래되고]]></description><link>http://direct.ecency.com/xxe/@beomps/1-owasp-top-10-2017-xml-xxe</link><guid isPermaLink="true">http://direct.ecency.com/xxe/@beomps/1-owasp-top-10-2017-xml-xxe</guid><category><![CDATA[xxe]]></category><dc:creator><![CDATA[beomps]]></dc:creator><pubDate>Mon, 05 Mar 2018 08:38:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYmMT3LzArDxazK4foCwJNYf46fn6vbvgBEerERVHFKt54mdareBWjZFExv5xKezk1L1uUgYYq4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[XML External Entity (XXE) Injection vulnerability in nokogiri]]></title><description><![CDATA[nokogiri is a an HTML, XML, SAX, and Reader parser, with the ability to search documents via XPath or CSS3 selectors. Affected versions of this Gem are vulnerable to XML External Entity (XXE) attacks when]]></description><link>http://direct.ecency.com/utopian-io/@caseyjparker/xml-external-entity-xxe-injection-vulnerability-in-nokogiri</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@caseyjparker/xml-external-entity-xxe-injection-vulnerability-in-nokogiri</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[caseyjparker]]></dc:creator><pubDate>Thu, 23 Nov 2017 06:55:27 GMT</pubDate></item></channel></rss>