<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>安全通告 | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/%e5%ae%89%e5%85%a8%e9%80%9a%e5%91%8a/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Tue, 01 Aug 2023 13:07:36 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>OpenSSH ssh-agent 客户端远程代码执行漏洞CVE-2023-38408</title>
		<link>https://blog.c1gstudio.com/archives/1938</link>
					<comments>https://blog.c1gstudio.com/archives/1938#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 01 Aug 2023 13:07:34 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[openssh]]></category>
		<category><![CDATA[ssh-agent]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1938</guid>

					<description><![CDATA[<p>漏洞描述： SSH-Agent是SSH的一部分，它是一个用于管理私钥并支持公钥身份验证的程序。 用户使用 SS [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1938">OpenSSH ssh-agent 客户端远程代码执行漏洞CVE-2023-38408</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1938/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PHP曝DOS漏洞可致CPU灌满 涉及多个PHP版本</title>
		<link>https://blog.c1gstudio.com/archives/1774</link>
					<comments>https://blog.c1gstudio.com/archives/1774#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 21 May 2015 03:22:03 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[PHPDOS漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1774</guid>

					<description><![CDATA[<p>近日，PHP被爆出存在远程DOS漏洞，若黑客利用该漏洞构造PoC发起连接，容易导致目标主机CPU被迅速消耗。此 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1774">PHP曝DOS漏洞可致CPU灌满 涉及多个PHP版本</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1774/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>曝Bash安全漏洞 比心血还严重 附测试及补救</title>
		<link>https://blog.c1gstudio.com/archives/1707</link>
					<comments>https://blog.c1gstudio.com/archives/1707#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 25 Sep 2014 04:02:52 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[bash]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1707</guid>

					<description><![CDATA[<p>20140925曝出的来的漏洞,该漏洞对电脑用户构成的威胁可能比今年4月发现的“心脏流血”(Heartblee [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1707">曝Bash安全漏洞 比心血还严重 附测试及补救</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1707/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache Tomcat FORM身份验证安全绕过漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1582</link>
					<comments>https://blog.c1gstudio.com/archives/1582#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 10 Dec 2012 01:24:53 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1582</guid>

					<description><![CDATA[<p>发布时间: 2012-12-04 (GMT+0800) 漏洞版本: Apache Group Tomcat 7 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1582">Apache Tomcat FORM身份验证安全绕过漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1582/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache Tomcat DIGEST身份验证多个安全漏洞(CVE-2012-3439)</title>
		<link>https://blog.c1gstudio.com/archives/1571</link>
					<comments>https://blog.c1gstudio.com/archives/1571#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 08 Nov 2012 07:50:56 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1571</guid>

					<description><![CDATA[<p>发布时间: 2012-11-05 (GMT+0800) 漏洞版本: Apache Group Tomcat 7 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1571">Apache Tomcat DIGEST身份验证多个安全漏洞(CVE-2012-3439)</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1571/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>phpMyAdmin 3.5.x HTML注入漏洞(CVE-2012-5339)</title>
		<link>https://blog.c1gstudio.com/archives/1559</link>
					<comments>https://blog.c1gstudio.com/archives/1559#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 17 Oct 2012 06:50:47 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1559</guid>

					<description><![CDATA[<p>PMASA-2012-6 Announcement-ID: PMASA-2012-6 Date: 2012-1 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1559">phpMyAdmin 3.5.x HTML注入漏洞(CVE-2012-5339)</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1559/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>dedecms(织梦) &lt; 5.7 多个SQL注入漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1552</link>
					<comments>https://blog.c1gstudio.com/archives/1552#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 26 Sep 2012 13:03:28 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[dedecms]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1552</guid>

					<description><![CDATA[<p>漏洞版本: dedecms &#60; 5.7 漏洞描述: BUGTRAQ ID: 51211 CVE ID:  [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1552">dedecms(织梦) < 5.7 多个SQL注入漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1552/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>sourceforge韩国节点被入侵，前段时间下载的phpmyadmin可能受影响</title>
		<link>https://blog.c1gstudio.com/archives/1548</link>
					<comments>https://blog.c1gstudio.com/archives/1548#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 25 Sep 2012 05:50:48 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1548</guid>

					<description><![CDATA[<p>简要描述： 从微博上看到腾讯安全团队说sourceforge一些服务器被入侵，一些源码被植入后门，仔细研究了下 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1548">sourceforge韩国节点被入侵，前段时间下载的phpmyadmin可能受影响</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1548/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Oracle MySQL 5.1.x 拒绝服务漏洞（CVE-2012-2749）</title>
		<link>https://blog.c1gstudio.com/archives/1545</link>
					<comments>https://blog.c1gstudio.com/archives/1545#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 23 Aug 2012 06:13:38 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[mysql]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1545</guid>

					<description><![CDATA[<p>发布时间: 2012-08-21 (GMT+0800) 漏洞版本: MySQL 5.1.x 漏洞描述: BUG [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1545">Oracle MySQL 5.1.x 拒绝服务漏洞（CVE-2012-2749）</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1545/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>phpMyAdmin 3.4.x 多个HTML注入漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1543</link>
					<comments>https://blog.c1gstudio.com/archives/1543#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 22 Aug 2012 06:24:03 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1543</guid>

					<description><![CDATA[<p>PMASA-2012-4 Announcement-ID: PMASA-2012-4 Date: 2012-0 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1543">phpMyAdmin 3.4.x 多个HTML注入漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1543/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
