<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>漏洞 | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/%e6%bc%8f%e6%b4%9e/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Sun, 27 Jul 2025 07:59:39 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Ollama 未授权访问漏洞,攻击者可以下载或删除私有模型文件</title>
		<link>https://blog.c1gstudio.com/archives/2060</link>
					<comments>https://blog.c1gstudio.com/archives/2060#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 03 Mar 2025 05:52:17 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[ollama]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=2060</guid>

					<description><![CDATA[<p>Ollama 是一个开源的大语言模型（LLM）运行环境和工具集，旨在帮助开发者轻松部署、管理和使用模型（如 D [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2060">Ollama 未授权访问漏洞,攻击者可以下载或删除私有模型文件</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2060/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows版PHP命令注入漏洞(CVE-2024-5585)的风险提示</title>
		<link>https://blog.c1gstudio.com/archives/2005</link>
					<comments>https://blog.c1gstudio.com/archives/2005#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 09:48:58 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2005</guid>

					<description><![CDATA[<p>一、背景介绍 近日，技术支撑单位监测到PHP官方发布了一则Windows版本PHP命令注入漏洞CVE-2024 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2005">Windows版PHP命令注入漏洞(CVE-2024-5585)的风险提示</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2005/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>阿里提示Discuz uc.key泄露导致代码注入漏洞uc.php的解决方法</title>
		<link>https://blog.c1gstudio.com/archives/1809</link>
					<comments>https://blog.c1gstudio.com/archives/1809#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 23 Aug 2016 08:28:56 +0000</pubDate>
				<category><![CDATA[安全]]></category>
		<category><![CDATA[discuz]]></category>
		<category><![CDATA[ucenter]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1809</guid>

					<description><![CDATA[<p>文件路径：bbs/api/uc.php 1查找 updatebadwords 函数： if(!API_UPDA [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1809">阿里提示Discuz uc.key泄露导致代码注入漏洞uc.php的解决方法</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1809/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>关于ImageMagick存在远程代码执行高危漏洞的安全公告</title>
		<link>https://blog.c1gstudio.com/archives/1805</link>
					<comments>https://blog.c1gstudio.com/archives/1805#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 14 Jun 2016 07:45:25 +0000</pubDate>
				<category><![CDATA[Imagemagick]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1805</guid>

					<description><![CDATA[<p>近日，国家信息安全漏洞共享平台（CNVD）收录了ImageMagick远程代码执行漏洞（CNVD-2016-0 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1805">关于ImageMagick存在远程代码执行高危漏洞的安全公告</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1805/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenSSH SFTP远程溢出漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1710</link>
					<comments>https://blog.c1gstudio.com/archives/1710#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Sat, 11 Oct 2014 02:17:48 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[openssh]]></category>
		<category><![CDATA[安全]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1710</guid>

					<description><![CDATA[<p>近日曝出OpenSSH SFTP 远程溢出漏洞。OpenSSH服务器中如果OpenSSH服务器中没有配置&#8 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1710">OpenSSH SFTP远程溢出漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1710/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Discuz! X2.5 远程代码执行漏洞及EXP[XDAY]</title>
		<link>https://blog.c1gstudio.com/archives/1438</link>
					<comments>https://blog.c1gstudio.com/archives/1438#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Sat, 28 Apr 2012 01:35:09 +0000</pubDate>
				<category><![CDATA[Discuz/Uchome/Ucenter]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[discuz]]></category>
		<category><![CDATA[安全]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1438</guid>

					<description><![CDATA[<p>发布时间: 2012-04-27 漏洞版本:Discuz! X2.5Release20120407 漏洞描述: [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1438">Discuz! X2.5 远程代码执行漏洞及EXP[XDAY]</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1438/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Oracle MySQL Server两个不明细节本地漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1395</link>
					<comments>https://blog.c1gstudio.com/archives/1395#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 12 Apr 2012 05:50:44 +0000</pubDate>
				<category><![CDATA[Mysql]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1395</guid>

					<description><![CDATA[<p>发布时间: 2012-04-09 漏洞版本: Oracle MySQL 5.x 漏洞描述: MySQL是一个小 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1395">Oracle MySQL Server两个不明细节本地漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1395/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
