<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PHP | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/php/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Sun, 27 Jul 2025 07:59:06 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Windows版PHP命令注入漏洞(CVE-2024-5585)的风险提示</title>
		<link>https://blog.c1gstudio.com/archives/2005</link>
					<comments>https://blog.c1gstudio.com/archives/2005#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 09:48:58 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">https://blog.c1gstudio.com/?p=2005</guid>

					<description><![CDATA[<p>一、背景介绍 近日，技术支撑单位监测到PHP官方发布了一则Windows版本PHP命令注入漏洞CVE-2024 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/2005">Windows版PHP命令注入漏洞(CVE-2024-5585)的风险提示</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/2005/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>存货重新发布php后门查找自动版</title>
		<link>https://blog.c1gstudio.com/archives/1931</link>
					<comments>https://blog.c1gstudio.com/archives/1931#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 09:01:58 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[shell]]></category>
		<category><![CDATA[后门]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1931</guid>

					<description><![CDATA[<p>php后门查找自动版 介绍 跟据样本及关键字定时查找php后门自动版，适合小网站运行。首次运行会跟据当前web [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1931">存货重新发布php后门查找自动版</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1931/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>转 实用PHP安全编程好文 PHPer都应学习</title>
		<link>https://blog.c1gstudio.com/archives/1786</link>
					<comments>https://blog.c1gstudio.com/archives/1786#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 13 Oct 2015 03:27:45 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1786</guid>

					<description><![CDATA[<p>文章所在专题列表如下： PHP安全编程：register_globals的安全性 PHP安全编程：不要让不相关 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1786">转 实用PHP安全编程好文 PHPer都应学习</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1786/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>给nagios增加监控当前php进程数的插件,并用pnp出图</title>
		<link>https://blog.c1gstudio.com/archives/1748</link>
					<comments>https://blog.c1gstudio.com/archives/1748#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 16 Jan 2015 09:25:19 +0000</pubDate>
				<category><![CDATA[Nagios]]></category>
		<category><![CDATA[check_phpprocs]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[plugin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1748</guid>

					<description><![CDATA[<p>脚本说明 脚本默认监控为php-fpm 以TCP方式运行在本机的端口php php-fpm.conf例 127 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1748">给nagios增加监控当前php进程数的插件,并用pnp出图</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1748/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>将php出错日志同步输出到splunk</title>
		<link>https://blog.c1gstudio.com/archives/1660</link>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 14 Jan 2014 07:47:19 +0000</pubDate>
				<category><![CDATA[日志]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[splunk]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1660</guid>

					<description><![CDATA[<p>vi /opt/php/etc/php.ini 打开syslog ; Log errors to specif [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1660">将php出错日志同步输出到splunk</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>PHP源代码安全漏洞自动化挖掘工具RIPS</title>
		<link>https://blog.c1gstudio.com/archives/1492</link>
					<comments>https://blog.c1gstudio.com/archives/1492#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 14 Jun 2012 05:23:54 +0000</pubDate>
				<category><![CDATA[安全]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[rips]]></category>
		<category><![CDATA[安全工具]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1492</guid>

					<description><![CDATA[<p>RIPS是一个用php编写的源代码分析工具，它使用了静态分析技术，能够自动化地挖掘PHP源代码潜在的安全漏洞。 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1492">PHP源代码安全漏洞自动化挖掘工具RIPS</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1492/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lempelf一键包更新至1.1.0</title>
		<link>https://blog.c1gstudio.com/archives/1481</link>
					<comments>https://blog.c1gstudio.com/archives/1481#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 04 Jun 2012 09:11:26 +0000</pubDate>
				<category><![CDATA[Lempelf一键包]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1481</guid>

					<description><![CDATA[<p>Lempelf一键安装包是什么? Lempelf一键安装包是用Shell编写的在Linux平台快速安装常用服务 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1481">Lempelf一键包更新至1.1.0</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1481/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>PHP 5.3.x目录遍历漏洞（CVE-2012-1172）</title>
		<link>https://blog.c1gstudio.com/archives/1455</link>
					<comments>https://blog.c1gstudio.com/archives/1455#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 09 May 2012 09:01:49 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1455</guid>

					<description><![CDATA[<p>漏洞版本: PHP 5.3.x 漏洞描述: BUGTRAQ ID: 53403 CVE ID: CVE-201 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1455">PHP 5.3.x目录遍历漏洞（CVE-2012-1172）</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1455/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>【转】php-5.3.x中弃用的功能和函数</title>
		<link>https://blog.c1gstudio.com/archives/1443</link>
					<comments>https://blog.c1gstudio.com/archives/1443#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Sat, 28 Apr 2012 02:14:04 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1443</guid>

					<description><![CDATA[<p>PHP 5.3.0 新增了两个错误等级: E_DEPRECATED 和 E_USER_DEPRECATED.  [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1443">【转】php-5.3.x中弃用的功能和函数</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1443/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>安装discuz启用flash验证码需要的ming库</title>
		<link>https://blog.c1gstudio.com/archives/1399</link>
					<comments>https://blog.c1gstudio.com/archives/1399#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 13 Apr 2012 07:30:35 +0000</pubDate>
				<category><![CDATA[Discuz/Uchome/Ucenter]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[discuz]]></category>
		<category><![CDATA[ming]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1399</guid>

					<description><![CDATA[<p>近日不断有人换ip来暴力猜discuz密码,开启验证码机制可以减少成功率. 让php支持flash需安装min [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1399">安装discuz启用flash验证码需要的ming库</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1399/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
