
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Guge&#39;sBlog</title>
      <link>https://gugesay.com/blog</link>
      <description>骨哥说事公众号首发地</description>
      <language>zh-CN</language>
      <managingEditor>undefined (Guge)</managingEditor>
      <webMaster>undefined (Guge)</webMaster>
      <lastBuildDate>Tue, 10 Feb 2026 08:25:23 GMT</lastBuildDate>
      <atom:link href="https://gugesay.com/tags/rce/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://gugesay.com/blog/10000美元赏金的炼成：在google-ai代码编辑器antigravity中实现远程</guid>
    <title>10000美元赏金的炼成：在Google AI代码编辑器Antigravity中实现远程代码执行的技术剖析</title>
    <link>https://gugesay.com/blog/10000美元赏金的炼成：在google-ai代码编辑器antigravity中实现远程</link>
    undefined
    <pubDate>Tue, 10 Feb 2026 08:25:23 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Antigravity</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/40000！如何从路径遍历升级rce！</guid>
    <title>$40,000！如何将路径遍历升级为RCE！</title>
    <link>https://gugesay.com/blog/40000！如何从路径遍历升级rce！</link>
    undefined
    <pubDate>Fri, 17 Jan 2025 06:34:57 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>rce</category><category>白帽故事</category><category>路径遍历</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/apache-kafka-ui-远程代码执行漏洞：cve-2023-52251、cve-2024-32030</guid>
    <title>Apache Kafka UI 远程代码执行漏洞：CVE-2023-52251、CVE-2024-32030</title>
    <link>https://gugesay.com/blog/apache-kafka-ui-远程代码执行漏洞：cve-2023-52251、cve-2024-32030</link>
    undefined
    <pubDate>Wed, 26 Jun 2024 04:08:45 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2023-52251</category><category>CVE-2024-32030</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/arc-浏览器：uxss本地文件窃取任意文件写入，路径穿越</guid>
    <title>Arc 浏览器：UXSS+本地文件窃取+任意文件写入，路径穿越直通RCE！​</title>
    <link>https://gugesay.com/blog/arc-浏览器：uxss本地文件窃取任意文件写入，路径穿越</link>
    undefined
    <pubDate>Mon, 23 Jun 2025 07:06:16 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Arc 浏览器</category><category>rce</category><category>UXSS</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/cve-2024-30104：office-365-rce【poc】</guid>
    <title>CVE-2024-30104：Office 365 RCE【PoC】</title>
    <link>https://gugesay.com/blog/cve-2024-30104：office-365-rce【poc】</link>
    undefined
    <pubDate>Tue, 09 Jul 2024 08:16:15 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2024-30104</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/cve-2024-4358，将反序列化变为未经身份验证的rce</guid>
    <title>CVE-2024-4358，将反序列化变为未经身份验证的RCE</title>
    <link>https://gugesay.com/blog/cve-2024-4358，将反序列化变为未经身份验证的rce</link>
    undefined
    <pubDate>Tue, 11 Jun 2024 04:16:34 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>cve-2024-4358</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/hello-lucee-让我们再次黑掉apple～</guid>
    <title>Hello Lucee! 让我们再次黑掉Apple～</title>
    <link>https://gugesay.com/blog/hello-lucee-让我们再次黑掉apple～</link>
    undefined
    <pubDate>Wed, 21 Feb 2024 07:24:50 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Apple</category><category>bugbounty</category><category>Lucee</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/tomcat-cve-2025-24813-从计算器到getshell</guid>
    <title>Tomcat CVE-2025-24813 从计算器到GetShell</title>
    <link>https://gugesay.com/blog/tomcat-cve-2025-24813-从计算器到getshell</link>
    undefined
    <pubDate>Fri, 14 Mar 2025 10:18:02 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2025-24813</category><category>rce</category><category>Tomcat</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/windows-电话服务远程代码执行漏洞剖析</guid>
    <title>Windows 电话服务远程代码执行漏洞剖析</title>
    <link>https://gugesay.com/blog/windows-电话服务远程代码执行漏洞剖析</link>
    undefined
    <pubDate>Wed, 28 Jan 2026 06:08:43 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>Windows</category><category>电话服务</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【25000】cve-2025-52665-unifi-access-中的-rce</guid>
    <title>【$25,000】CVE-2025-52665 - Unifi Access 中的 RCE</title>
    <link>https://gugesay.com/blog/【25000】cve-2025-52665-unifi-access-中的-rce</link>
    undefined
    <pubDate>Mon, 03 Nov 2025 07:21:46 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【2500】通过无人认领的node包实施rce攻击</guid>
    <title>【$2500】通过无人认领的Node包实施RCE攻击</title>
    <link>https://gugesay.com/blog/【2500】通过无人认领的node包实施rce攻击</link>
    undefined
    <pubDate>Fri, 14 Feb 2025 06:57:12 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>NPM</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【6000】mozilla-vpn-客户端通过文件写入和路径遍历的-rce</guid>
    <title>【$6,000】Mozilla VPN 客户端通过文件写入和路径遍历的 RCE</title>
    <link>https://gugesay.com/blog/【6000】mozilla-vpn-客户端通过文件写入和路径遍历的-rce</link>
    undefined
    <pubDate>Wed, 30 Jul 2025 01:30:13 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Mozilla</category><category>rce</category><category>VPN</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【cve-2024-22274】vmware-vcenter-server远程代码执行漏洞</guid>
    <title>【CVE-2024–22274】VMware vCenter Server远程代码执行漏洞</title>
    <link>https://gugesay.com/blog/【cve-2024-22274】vmware-vcenter-server远程代码执行漏洞</link>
    undefined
    <pubDate>Wed, 17 Jul 2024 06:45:17 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2024–22274</category><category>rce</category><category>vCenter</category><category>VMWare</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【cve-2024-42327】zabbix-rce-poc-公布</guid>
    <title>【CVE-2024-42327】Zabbix RCE PoC 公布</title>
    <link>https://gugesay.com/blog/【cve-2024-42327】zabbix-rce-poc-公布</link>
    undefined
    <pubDate>Mon, 17 Feb 2025 01:05:07 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2024-42327</category><category>rce</category><category>信息差</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【cve-2024-54887】tp-link路由器的逆向、发现与利用</guid>
    <title>【CVE-2024–54887】TP-Link路由器的逆向、发现与利用</title>
    <link>https://gugesay.com/blog/【cve-2024-54887】tp-link路由器的逆向、发现与利用</link>
    undefined
    <pubDate>Mon, 13 Jan 2025 06:55:05 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2024-54887</category><category>rce</category><category>TP-Link</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【cve-2025-20188】思科上传漏洞分析</guid>
    <title>【CVE-2025-20188】思科上传漏洞分析</title>
    <link>https://gugesay.com/blog/【cve-2025-20188】思科上传漏洞分析</link>
    undefined
    <pubDate>Tue, 03 Jun 2025 02:45:23 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Cisco</category><category>CVE-2025-20188</category><category>rce</category><category>思科</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【cve-2025-21298】严重级-0-click-的漏洞成因与复现</guid>
    <title>【CVE-2025-21298】严重级 0-Click 的漏洞成因与复现</title>
    <link>https://gugesay.com/blog/【cve-2025-21298】严重级-0-click-的漏洞成因与复现</link>
    undefined
    <pubDate>Tue, 15 Apr 2025 06:29:58 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>0-click</category><category>CVE-2025-21298</category><category>OLE</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【天价漏洞】11-7万美元！一个文件攻破meta-messenger，实现远</guid>
    <title>【天价漏洞】11.7万美元！一个文件攻破Meta Messenger，实现远程代码执行</title>
    <link>https://gugesay.com/blog/【天价漏洞】11-7万美元！一个文件攻破meta-messenger，实现远</link>
    undefined
    <pubDate>Wed, 17 Sep 2025 06:52:06 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>DLL劫持</category><category>facebook</category><category>Messenger</category><category>Meta</category><category>rce</category><category>白帽故事</category><category>远程代码执行</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/【赏金15000美元】通过监控调试模式实现-rce</guid>
    <title>【赏金15000美元】通过监控调试模式实现 RCE</title>
    <link>https://gugesay.com/blog/【赏金15000美元】通过监控调试模式实现-rce</link>
    undefined
    <pubDate>Sat, 14 Sep 2024 08:35:58 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>LFI</category><category>rce</category><category>白帽故事</category><category>调试模式</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/一个简单的-ssti-如何变为-rce</guid>
    <title>一个简单的 SSTI 如何变为 RCE</title>
    <link>https://gugesay.com/blog/一个简单的-ssti-如何变为-rce</link>
    undefined
    <pubDate>Wed, 29 Oct 2025 06:25:52 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>SSTI</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/一则图片上传到-getshell-的故事</guid>
    <title>一则图片上传到 GetShell 的故事</title>
    <link>https://gugesay.com/blog/一则图片上传到-getshell-的故事</link>
    undefined
    <pubDate>Fri, 08 Aug 2025 02:51:07 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>getshell</category><category>rce</category><category>图片上传</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/一周三步曲：从开放重定向到远程代码执行！</guid>
    <title>一周三步曲：从开放重定向到远程代码执行！</title>
    <link>https://gugesay.com/blog/一周三步曲：从开放重定向到远程代码执行！</link>
    undefined
    <pubDate>Tue, 19 Mar 2024 14:28:56 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/从-cookie-同意到命令执行</guid>
    <title>从 Cookie 同意到命令执行</title>
    <link>https://gugesay.com/blog/从-cookie-同意到命令执行</link>
    undefined
    <pubDate>Fri, 25 Jul 2025 02:46:17 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>sql注入</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/从-self-xss-到-rce</guid>
    <title>从 Self XSS 到 RCE</title>
    <link>https://gugesay.com/blog/从-self-xss-到-rce</link>
    undefined
    <pubDate>Fri, 11 Apr 2025 01:47:24 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>XSS</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/从LFI到RCE</guid>
    <title>从LFI到RCE</title>
    <link>https://gugesay.com/blog/从LFI到RCE</link>
    undefined
    <pubDate>Mon, 20 Nov 2023 02:38:43 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>LFI</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/从提示注入到rce：剖析ai智能体中的参数注入攻击</guid>
    <title>从提示注入到RCE：剖析AI智能体中的参数注入攻击</title>
    <link>https://gugesay.com/blog/从提示注入到rce：剖析ai智能体中的参数注入攻击</link>
    undefined
    <pubDate>Thu, 26 Feb 2026 02:18:32 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>提示注入</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/利用操作顺序漏洞实现 Oracle Opera RCE</guid>
    <title>利用操作顺序漏洞实现 Oracle Opera RCE</title>
    <link>https://gugesay.com/blog/利用操作顺序漏洞实现 Oracle Opera RCE</link>
    undefined
    <pubDate>Fri, 11 Aug 2023 11:33:17 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Oracle Opera</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/利用英雄无敌5自定义地图实现远程控制对方电脑</guid>
    <title>利用英雄无敌5自定义地图实现远程控制对方电脑</title>
    <link>https://gugesay.com/blog/利用英雄无敌5自定义地图实现远程控制对方电脑</link>
    undefined
    <pubDate>Wed, 24 Sep 2025 07:50:57 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>白帽故事</category><category>英雄无敌</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/国外车企安全渗透案例【1】-发现法拉利、宝马、</guid>
    <title>国外车企安全渗透案例【1】-- 发现法拉利、宝马、劳斯莱斯、保时捷等车企关键漏洞</title>
    <link>https://gugesay.com/blog/国外车企安全渗透案例【1】-发现法拉利、宝马、</link>
    undefined
    <pubDate>Mon, 22 Jul 2024 06:22:51 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>保时捷</category><category>劳斯莱斯</category><category>宝马</category><category>法拉利</category><category>白帽故事</category><category>车企安全</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/国外车企安全渗透案例【2】-发现法拉利、宝马、</guid>
    <title>国外车企安全渗透案例【2】– 发现法拉利、宝马、劳斯莱斯、保时捷等车企关键漏洞</title>
    <link>https://gugesay.com/blog/国外车企安全渗透案例【2】-发现法拉利、宝马、</link>
    undefined
    <pubDate>Tue, 23 Jul 2024 04:17:27 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>保时捷</category><category>劳斯莱斯</category><category>宝马</category><category>法拉利</category><category>白帽故事</category><category>车企安全</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/国外车企安全渗透案例【3】-发现法拉利、宝马、</guid>
    <title>国外车企安全渗透案例【3】– 发现法拉利、宝马、劳斯莱斯、保时捷等车企关键漏洞</title>
    <link>https://gugesay.com/blog/国外车企安全渗透案例【3】-发现法拉利、宝马、</link>
    undefined
    <pubDate>Wed, 24 Jul 2024 01:29:44 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>白帽故事</category><category>车企安全</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/在outlook上寻找远程代码执行漏洞【部分】</guid>
    <title>在Outlook上寻找远程代码执行漏洞【部分】</title>
    <link>https://gugesay.com/blog/在outlook上寻找远程代码执行漏洞【部分】</link>
    undefined
    <pubDate>Fri, 22 Mar 2024 16:00:48 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>outlook</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/在一个web网站中获得7000赏金奖励</guid>
    <title>在一个Web网站中获得$7000赏金奖励</title>
    <link>https://gugesay.com/blog/在一个web网站中获得7000赏金奖励</link>
    undefined
    <pubDate>Wed, 27 Mar 2024 01:32:37 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>hackerone</category><category>rce</category><category>XSS</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/在侦察阶段如何快速找到-rce</guid>
    <title>在侦察阶段如何快速找到 RCE</title>
    <link>https://gugesay.com/blog/在侦察阶段如何快速找到-rce</link>
    undefined
    <pubDate>Wed, 22 May 2024 01:27:38 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Apache</category><category>bugbounty</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/如何在epic-games上赚到7000赏金</guid>
    <title>如何在Epic Games上赚到$7,000赏金</title>
    <link>https://gugesay.com/blog/如何在epic-games上赚到7000赏金</link>
    undefined
    <pubDate>Thu, 04 Jan 2024 12:07:12 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/如何将提问变为攻击？claude-desktop-的严重-rce-漏洞</guid>
    <title>如何将提问变为攻击？Claude Desktop 的严重 RCE 漏洞</title>
    <link>https://gugesay.com/blog/如何将提问变为攻击？claude-desktop-的严重-rce-漏洞</link>
    undefined
    <pubDate>Thu, 06 Nov 2025 06:11:47 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>AI</category><category>Claude Desktop</category><category>MCP</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/意外发现dos攻击并获得25000美元奖励的故事</guid>
    <title>意外发现DoS攻击斩获$25,000赏金的故事</title>
    <link>https://gugesay.com/blog/意外发现dos攻击并获得25000美元奖励的故事</link>
    undefined
    <pubDate>Tue, 16 Apr 2024 01:44:39 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>dos</category><category>rce</category><category>区块链</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/揭秘-smartermail-沉寂三个月后才公开的满分rce-漏洞</guid>
    <title>揭秘 SmarterMail 沉寂三个月后才公开的“满分”RCE 漏洞</title>
    <link>https://gugesay.com/blog/揭秘-smartermail-沉寂三个月后才公开的满分rce-漏洞</link>
    undefined
    <pubDate>Sun, 11 Jan 2026 03:27:57 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>rce</category><category>SmarterMail</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/继续citrix传奇：cve-2023-5914和cve-2023-6184</guid>
    <title>继续Citrix传奇：CVE-2023-5914和CVE-2023-6184</title>
    <link>https://gugesay.com/blog/继续citrix传奇：cve-2023-5914和cve-2023-6184</link>
    undefined
    <pubDate>Wed, 20 Mar 2024 01:41:09 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>bugbounty</category><category>Citrix</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/警惕利用git的钓鱼及社工攻击【cve-2024-32002】</guid>
    <title>警惕利用Git的钓鱼及社工攻击【CVE-2024-32002】</title>
    <link>https://gugesay.com/blog/警惕利用git的钓鱼及社工攻击【cve-2024-32002】</link>
    undefined
    <pubDate>Wed, 03 Jul 2024 05:59:27 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>CVE-2024-32002</category><category>github</category><category>rce</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/黑掉-apple-系列-从-sql-注入到远程代码执行</guid>
    <title>黑掉 Apple 系列 - 从 SQL 注入到远程代码执行</title>
    <link>https://gugesay.com/blog/黑掉-apple-系列-从-sql-注入到远程代码执行</link>
    undefined
    <pubDate>Thu, 09 May 2024 03:13:56 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>Apple</category><category>bugbounty</category><category>rce</category><category>sqli</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/💣-google-赏金猎手的胜利：如何发现并利用一个价值10000</guid>
    <title>💣 Google 赏金猎手的胜利：如何发现并利用一个价值$10,000的反序列化RCE漏洞？</title>
    <link>https://gugesay.com/blog/💣-google-赏金猎手的胜利：如何发现并利用一个价值10000</link>
    undefined
    <pubDate>Mon, 11 Aug 2025 02:25:48 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>AppSheet</category><category>Google</category><category>rce</category><category>反序列化</category><category>白帽故事</category>
  </item>

    </channel>
  </rss>
