<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phpmyadmin | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/phpmyadmin/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Wed, 17 Oct 2012 06:50:47 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>phpMyAdmin 3.5.x HTML注入漏洞(CVE-2012-5339)</title>
		<link>https://blog.c1gstudio.com/archives/1559</link>
					<comments>https://blog.c1gstudio.com/archives/1559#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 17 Oct 2012 06:50:47 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1559</guid>

					<description><![CDATA[<p>PMASA-2012-6 Announcement-ID: PMASA-2012-6 Date: 2012-1 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1559">phpMyAdmin 3.5.x HTML注入漏洞(CVE-2012-5339)</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1559/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>sourceforge韩国节点被入侵，前段时间下载的phpmyadmin可能受影响</title>
		<link>https://blog.c1gstudio.com/archives/1548</link>
					<comments>https://blog.c1gstudio.com/archives/1548#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 25 Sep 2012 05:50:48 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1548</guid>

					<description><![CDATA[<p>简要描述： 从微博上看到腾讯安全团队说sourceforge一些服务器被入侵，一些源码被植入后门，仔细研究了下 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1548">sourceforge韩国节点被入侵，前段时间下载的phpmyadmin可能受影响</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1548/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>phpMyAdmin 3.4.x 多个HTML注入漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1543</link>
					<comments>https://blog.c1gstudio.com/archives/1543#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 22 Aug 2012 06:24:03 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1543</guid>

					<description><![CDATA[<p>PMASA-2012-4 Announcement-ID: PMASA-2012-4 Date: 2012-0 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1543">phpMyAdmin 3.4.x 多个HTML注入漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1543/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>phpMyAdmin敏感信息泄露漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1385</link>
					<comments>https://blog.c1gstudio.com/archives/1385#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 12 Apr 2012 05:34:17 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1385</guid>

					<description><![CDATA[<p>phpMyAdmin是一个免费的WWW界面的mysql数据库管理工具。 phpMyAdmin 3.4.10.2 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1385">phpMyAdmin敏感信息泄露漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1385/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>phpMyAdmin 3.3.X and 3.4.X 含有注入漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1325</link>
					<comments>https://blog.c1gstudio.com/archives/1325#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 23 Mar 2012 02:46:35 +0000</pubDate>
				<category><![CDATA[安全通告]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1325</guid>

					<description><![CDATA[<p>测试过受影响版本 phpmyadmin versions: 3.3.6, 3.3.10, 3.4.0, 3.4 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1325">phpMyAdmin 3.3.X and 3.4.X 含有注入漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1325/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>用phpmyadmin+editplus快速导出discuz贴子列表</title>
		<link>https://blog.c1gstudio.com/archives/408</link>
					<comments>https://blog.c1gstudio.com/archives/408#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 12 Mar 2009 10:04:37 +0000</pubDate>
				<category><![CDATA[技术]]></category>
		<category><![CDATA[editplus]]></category>
		<category><![CDATA[phpmyadmin]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=408</guid>

					<description><![CDATA[<p> 进入phpmyadmin中discuz所在库，执行下面语句 SELECT subject,CONCAT(&# [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/408">用phpmyadmin+editplus快速导出discuz贴子列表</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/408/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
