<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>漏洞分析 on GNEWS</title>
    <link>https://news.945688.xyz/tags/%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/</link>
    <description>Recent content in 漏洞分析 on GNEWS</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 20 Apr 2026 12:00:00 +0000</lastBuildDate>
    <atom:link href="https://news.945688.xyz/tags/%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>ChatGPT Android 端低价订阅漏洞：Frida Hook 绕过机制解析</title>
      <link>https://news.945688.xyz/posts/chatgpt-plus-pro-low-price-subscription-analysis/</link>
      <pubDate>Mon, 20 Apr 2026 12:00:00 +0000</pubDate>
      <guid>https://news.945688.xyz/posts/chatgpt-plus-pro-low-price-subscription-analysis/</guid>
      <description>深度解析近期出现的 ChatGPT Android 端订阅漏洞：攻击者如何利用 Frida Hook 篡改 Google Play 的 offerToken，绕过 Appdome 保护机制，实现“零成本”获取 Plus 与 Pro 会员权限。</description>
    </item>
  </channel>
</rss>
