<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>安全 | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/%e5%ae%89%e5%85%a8/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Sun, 27 Jul 2025 07:56:56 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>OpenSSH ProxyCommand命令注入漏洞（CVE-2023-51385）</title>
		<link>https://blog.c1gstudio.com/archives/1949</link>
					<comments>https://blog.c1gstudio.com/archives/1949#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 01 Apr 2024 07:10:48 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=1949</guid>

					<description><![CDATA[<p>一、背景描述 OpenSSH是SSH（Secure SHell）协议的免费开源实现。OpenSSH提供了服务端 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1949">OpenSSH ProxyCommand命令注入漏洞（CVE-2023-51385）</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1949/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>阿里提示Discuz uc.key泄露导致代码注入漏洞uc.php的解决方法</title>
		<link>https://blog.c1gstudio.com/archives/1809</link>
					<comments>https://blog.c1gstudio.com/archives/1809#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 23 Aug 2016 08:28:56 +0000</pubDate>
				<category><![CDATA[安全]]></category>
		<category><![CDATA[discuz]]></category>
		<category><![CDATA[ucenter]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1809</guid>

					<description><![CDATA[<p>文件路径：bbs/api/uc.php 1查找 updatebadwords 函数： if(!API_UPDA [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1809">阿里提示Discuz uc.key泄露导致代码注入漏洞uc.php的解决方法</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1809/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>转 实用PHP安全编程好文 PHPer都应学习</title>
		<link>https://blog.c1gstudio.com/archives/1786</link>
					<comments>https://blog.c1gstudio.com/archives/1786#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 13 Oct 2015 03:27:45 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1786</guid>

					<description><![CDATA[<p>文章所在专题列表如下： PHP安全编程：register_globals的安全性 PHP安全编程：不要让不相关 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1786">转 实用PHP安全编程好文 PHPer都应学习</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1786/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenSSH SFTP远程溢出漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1710</link>
					<comments>https://blog.c1gstudio.com/archives/1710#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Sat, 11 Oct 2014 02:17:48 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[openssh]]></category>
		<category><![CDATA[安全]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1710</guid>

					<description><![CDATA[<p>近日曝出OpenSSH SFTP 远程溢出漏洞。OpenSSH服务器中如果OpenSSH服务器中没有配置&#8 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1710">OpenSSH SFTP远程溢出漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1710/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>部署snort+base入侵检测系统</title>
		<link>https://blog.c1gstudio.com/archives/1677</link>
					<comments>https://blog.c1gstudio.com/archives/1677#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 29 May 2014 02:39:04 +0000</pubDate>
				<category><![CDATA[安全]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[snort，base]]></category>
		<category><![CDATA[入侵检测]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1677</guid>

					<description><![CDATA[<p>【简 介】 　　Snort是一个轻便的网络入侵检测系统，可以完成实时流量分析和对网络上的IP包登录进行测试等功 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1677">部署snort+base入侵检测系统</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1677/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenSSL“心脏出血”漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1668</link>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 10 Apr 2014 02:45:04 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[openssl]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1668</guid>

					<description><![CDATA[<p>OpenSSL“心脏出血”漏洞是一个非常严重的问题。这个漏洞使攻击者能够从内存中读取多达64 KB的数据。一些 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1668">OpenSSL“心脏出血”漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>PHP 5.3.x目录遍历漏洞（CVE-2012-1172）</title>
		<link>https://blog.c1gstudio.com/archives/1455</link>
					<comments>https://blog.c1gstudio.com/archives/1455#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 09 May 2012 09:01:49 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1455</guid>

					<description><![CDATA[<p>漏洞版本: PHP 5.3.x 漏洞描述: BUGTRAQ ID: 53403 CVE ID: CVE-201 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1455">PHP 5.3.x目录遍历漏洞（CVE-2012-1172）</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1455/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>注意修改康盛产品的跨域策略crossdomain.xml文件</title>
		<link>https://blog.c1gstudio.com/archives/1450</link>
					<comments>https://blog.c1gstudio.com/archives/1450#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 09 May 2012 08:03:08 +0000</pubDate>
				<category><![CDATA[Discuz/Uchome/Ucenter]]></category>
		<category><![CDATA[安全]]></category>
		<category><![CDATA[discuz]]></category>
		<category><![CDATA[flash]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1450</guid>

					<description><![CDATA[<p>discuz,uchome,ucenter的根目录下都会有这个crossdomain.xml 此文件为flas [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1450">注意修改康盛产品的跨域策略crossdomain.xml文件</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1450/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Discuz! X2.5 远程代码执行漏洞及EXP[XDAY]</title>
		<link>https://blog.c1gstudio.com/archives/1438</link>
					<comments>https://blog.c1gstudio.com/archives/1438#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Sat, 28 Apr 2012 01:35:09 +0000</pubDate>
				<category><![CDATA[Discuz/Uchome/Ucenter]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[discuz]]></category>
		<category><![CDATA[安全]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1438</guid>

					<description><![CDATA[<p>发布时间: 2012-04-27 漏洞版本:Discuz! X2.5Release20120407 漏洞描述: [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1438">Discuz! X2.5 远程代码执行漏洞及EXP[XDAY]</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1438/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache Tomcat 6.0.35前有拒绝服务,信息泄露等漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1434</link>
					<comments>https://blog.c1gstudio.com/archives/1434#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 20 Apr 2012 09:33:29 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[tomcat]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1434</guid>

					<description><![CDATA[<p>Apache Tomcat 6.0.35前有信息泄露相关的一个漏洞（CVE-2011-3375）， 以及另一个 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1434">Apache Tomcat 6.0.35前有拒绝服务,信息泄露等漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1434/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
