<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>安全研究 on T4rn's blog</title><link>https://hackerpoet.com/tags/%E5%AE%89%E5%85%A8%E7%A0%94%E7%A9%B6/</link><description>Recent content in 安全研究 on T4rn's blog</description><generator>Hugo</generator><language>zh-cn</language><lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hackerpoet.com/tags/%E5%AE%89%E5%85%A8%E7%A0%94%E7%A9%B6/index.xml" rel="self" type="application/rss+xml"/><item><title>Dataease 最新版本 2.1.12 绕过思路</title><link>https://hackerpoet.com/posts/dataease-2.1.12-bypass/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hackerpoet.com/posts/dataease-2.1.12-bypass/</guid><description>分析 Dataease 2.1.12 版本中 H2 类型未过滤导致的 JDBC RCE 绕过</description></item><item><title>一道有趣的pyjail题目分析</title><link>https://hackerpoet.com/posts/pyjail-challenge/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hackerpoet.com/posts/pyjail-challenge/</guid><description>Python2/3 沙盒逃逸分析，利用 Unicode NFKC 标准化绕过字母黑名单</description></item><item><title>谈Express engine处理引擎的一个trick</title><link>https://hackerpoet.com/posts/express-engine-trick/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hackerpoet.com/posts/express-engine-trick/</guid><description>分析 Express render 流程中引擎加载的一个有趣点，记录一种可用于 CTF 的利用思路</description></item></channel></rss>