|
![]() | 作者: ampersand [ampersand]
![]() |
登录 |
本帖由 [羽爵] 从 << 网络集成
>> 转移而来这个CGI漏洞怎么修补啊? [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /_vti_bin/fpcount.exe?Page=default.htm|Image=2|Digits=1 [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /abczxv.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iishelp/iis/misc/iirturnh.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/exair/search/qsumrhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/issamples/oop/qsumrhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /scripts/samples/search/qfullhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /scripts/samples/search/qsumrhit.htw [xxx.xxx.xxx.xxx]: "CGI漏洞"扫描完成, 发现 12. |
地主 发表时间: 04-02-01 17:53 |
![]() | 回复: Idof [idof] ![]() |
登录 |
不会 正想学呢 ![]() |
B1层 发表时间: 04-02-02 10:36 |
![]() | 回复: szww [szww] ![]() |
登录 |
到微软下载补丁,最新的sp4和有关RPC的漏洞补丁。![]() |
B2层 发表时间: 04-02-02 11:40 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号