<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>安全公告 | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/%e5%ae%89%e5%85%a8%e5%85%ac%e5%91%8a/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Tue, 22 Jul 2025 10:45:18 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Git CLI高危任意文件写入漏洞曝光，PoC已公开</title>
		<link>https://blog.c1gstudio.com/archives/2134</link>
					<comments>https://blog.c1gstudio.com/archives/2134#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 10:45:16 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[git]]></category>
		<category><![CDATA[安全公告]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2134</guid>

					<description><![CDATA[<p>Git CLI存在一个高危漏洞，攻击者可利用该漏洞在Linux和macOS系统上实现任意文件写入。目前该漏洞的 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2134">Git CLI高危任意文件写入漏洞曝光，PoC已公开</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2134/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>nginx &#8220;location&#8221;受限制资源服务漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1561</link>
					<comments>https://blog.c1gstudio.com/archives/1561#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 17 Oct 2012 06:52:43 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[安全公告]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1561</guid>

					<description><![CDATA[<p>发布时间: 2012-10-15 (GMT+0800) 漏洞版本: Nginx 1.2.x 漏洞描述: CVE [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1561">nginx “location”受限制资源服务漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1561/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Windows远程桌面协议对象处理漏洞 (MS12-036)</title>
		<link>https://blog.c1gstudio.com/archives/1496</link>
					<comments>https://blog.c1gstudio.com/archives/1496#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 15 Jun 2012 01:34:15 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[3389]]></category>
		<category><![CDATA[安全公告]]></category>
		<category><![CDATA[远程桌面]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1496</guid>

					<description><![CDATA[<p>发布时间: 2012-06-13 漏洞版本: Microsoft Windows XP Microsoft V [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1496">Microsoft Windows远程桌面协议对象处理漏洞 (MS12-036)</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1496/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
