<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>安全通告 | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/category/technology/cve/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Mon, 08 Dec 2025 02:28:42 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>安全公告 — CVE-2025-12914 BT宝塔面板</title>
		<link>https://blog.c1gstudio.com/archives/2178</link>
					<comments>https://blog.c1gstudio.com/archives/2178#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 02:28:42 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[宝塔面板]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2178</guid>

					<description><![CDATA[<p>https://nvd.nist.gov/vuln/detail/CVE-2025-12914 NVD 已公開 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2178">安全公告 — CVE-2025-12914 BT宝塔面板</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2178/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>win10 KB5063709 /win11 KB5063878 近期的补丁在更新后会在大量数据写入导致丢盘</title>
		<link>https://blog.c1gstudio.com/archives/2144</link>
					<comments>https://blog.c1gstudio.com/archives/2144#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 19 Aug 2025 11:51:58 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[安全，补丁]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2144</guid>

					<description><![CDATA[<p>2025 年 8 月 12 日—KB5063709（OS 内部版本 19044.6216 和 19045.62 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2144">win10 KB5063709 /win11 KB5063878 近期的补丁在更新后会在大量数据写入导致丢盘</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2144/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Git CLI高危任意文件写入漏洞曝光，PoC已公开</title>
		<link>https://blog.c1gstudio.com/archives/2134</link>
					<comments>https://blog.c1gstudio.com/archives/2134#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 10:45:16 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[git]]></category>
		<category><![CDATA[安全公告]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2134</guid>

					<description><![CDATA[<p>Git CLI存在一个高危漏洞，攻击者可利用该漏洞在Linux和macOS系统上实现任意文件写入。目前该漏洞的 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2134">Git CLI高危任意文件写入漏洞曝光，PoC已公开</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2134/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Vite 任意文件访问漏洞(CVE-2025-32395)的安全预警</title>
		<link>https://blog.c1gstudio.com/archives/2089</link>
					<comments>https://blog.c1gstudio.com/archives/2089#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 29 Apr 2025 06:27:10 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[vite]]></category>
		<category><![CDATA[漏洞，安全预警]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2089</guid>

					<description><![CDATA[<p>一、基本情况 Vite是一个现代化的前端构建工具，旨在提供更快的开发体验。它通过基于原生ES模块的开发服务器， [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2089">Vite 任意文件访问漏洞(CVE-2025-32395)的安全预警</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2089/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ollama 未授权访问漏洞,攻击者可以下载或删除私有模型文件</title>
		<link>https://blog.c1gstudio.com/archives/2060</link>
					<comments>https://blog.c1gstudio.com/archives/2060#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 03 Mar 2025 05:52:17 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[ollama]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=2060</guid>

					<description><![CDATA[<p>Ollama 是一个开源的大语言模型（LLM）运行环境和工具集，旨在帮助开发者轻松部署、管理和使用模型（如 D [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2060">Ollama 未授权访问漏洞,攻击者可以下载或删除私有模型文件</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2060/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Server远程桌面授权服务远程代码执行漏洞(CVE-2024-38077)</title>
		<link>https://blog.c1gstudio.com/archives/2016</link>
					<comments>https://blog.c1gstudio.com/archives/2016#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 09 Aug 2024 05:23:18 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[安全，远程桌面，漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=2016</guid>

					<description><![CDATA[<p>漏洞详情： 近期微软披露最新的远程代码执行超高危漏洞CVE-2024-38077， CVSS评分高达9.8 ， [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2016">Windows Server远程桌面授权服务远程代码执行漏洞(CVE-2024-38077)</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2016/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>经典输入法绕过再现，搜狗输入法可绕过windows锁屏机制</title>
		<link>https://blog.c1gstudio.com/archives/2013</link>
					<comments>https://blog.c1gstudio.com/archives/2013#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 02 Aug 2024 09:53:28 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[搜狗输入法，提权]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2013</guid>

					<description><![CDATA[<p>win10等绕过成功 通过切换到搜狗输入法，使用&#8221;游戏中心&#8221;进行提权。</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2013">经典输入法绕过再现，搜狗输入法可绕过windows锁屏机制</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2013/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Wi-Fi驱动程序远程代码执行漏洞(CVE-2024-30078) Windows所有支持版本受到威胁</title>
		<link>https://blog.c1gstudio.com/archives/2011</link>
					<comments>https://blog.c1gstudio.com/archives/2011#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 10:21:58 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[Wi-Fi漏洞]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2011</guid>

					<description><![CDATA[<p>一、 基本情况 Windows Wi-Fi 驱动程序是Windows系统的重要固件之一。 二、 漏洞描述 Wi [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2011">Windows Wi-Fi驱动程序远程代码执行漏洞(CVE-2024-30078) Windows所有支持版本受到威胁</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2011/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Splunk Enterprise Windows路径遍历漏洞（CVE-2024-36991）</title>
		<link>https://blog.c1gstudio.com/archives/2009</link>
					<comments>https://blog.c1gstudio.com/archives/2009#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 09:55:05 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[splunk]]></category>
		<category><![CDATA[安全漏洞]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2009</guid>

					<description><![CDATA[<p>Splunk Enterprise是一款专业的数据分析软件，能够对采样的数据以及统计图做出专业分析，支持跨平台 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2009">Splunk Enterprise Windows路径遍历漏洞（CVE-2024-36991）</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2009/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows版PHP命令注入漏洞(CVE-2024-5585)的风险提示</title>
		<link>https://blog.c1gstudio.com/archives/2005</link>
					<comments>https://blog.c1gstudio.com/archives/2005#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 09:48:58 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2005</guid>

					<description><![CDATA[<p>一、背景介绍 近日，技术支撑单位监测到PHP官方发布了一则Windows版本PHP命令注入漏洞CVE-2024 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2005">Windows版PHP命令注入漏洞(CVE-2024-5585)的风险提示</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2005/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
