<?xml version="1.0" encoding="UTF-8" ?>
<rss
    version="2.0"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:webfeeds="http://webfeeds.org/rss/1.0"
    xmlns:media="http://search.yahoo.com/mrss/"
    >
    <channel>
        <title>File-inclusion Tag - Viblo</title>
        <link>https://viblo.asia/rss</link>
        <description><![CDATA[Free service for technical knowledge sharing]]></description>
        <atom:link href="https://viblo.asia/rss/tags/file-inclusion.rss" rel="self"></atom:link>
                <copyright>Sun* Inc.</copyright>
                                                <webfeeds:logo>https://viblo.asia/logo_full.svg</webfeeds:logo>
        <image>
            <url>https://viblo.asia/logo_full.svg</url>
            <title>File-inclusion Tag - Viblo</title>
            <link>https://viblo.asia/rss</link>
        </image>
                                <language>vi-vn</language>
        <lastBuildDate>2026-05-07T20:10:25+07:00</lastBuildDate>
                <item>
            <title><![CDATA[File Inclusion Vulnerability Exploit]]></title>
                        <link>https://viblo.asia/p/file-inclusion-vulnerability-exploit-4P856NMa5Y3</link>
            <guid isPermaLink="true">https://viblo.asia/p/file-inclusion-vulnerability-exploit-4P856NMa5Y3</guid>
            <description><![CDATA[I. Mở đầu
 Tiếp theo trong series về khai thác lỗ hổng trong tấn công ứng dụng web , bài viết này mình sẽ hướng dẫn các bạn về 1 cách tấn công phổ biế...]]></description>
                        <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Trinh Quoc khanh</dc:creator>
            <pubDate>2020-02-13 13:15:26</pubDate>
                                                                                                        </item>
            </channel>
</rss>
