|
![]() | 作者: ampersand [ampersand]
![]() |
登录 |
这个CGI漏洞怎么修补啊? [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /_vti_bin/fpcount.exe?Page=default.htm|Image=2|Digits=1 [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /abczxv.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iishelp/iis/misc/iirturnh.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/exair/search/qsumrhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /iissamples/issamples/oop/qsumrhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /scripts/samples/search/qfullhit.htw [xxx.xxx.xxx.xxx]: 发现 CGI漏洞: /scripts/samples/search/qsumrhit.htw [xxx.xxx.xxx.xxx]: "CGI漏洞"扫描完成, 发现 12. |
地主 发表时间: 04-02-01 17:44 |
![]() | 回复: gerry [gerry] ![]() |
登录 |
请问,你是单机用户还是WEB服务器用户?如果是单机用户,大可以把相关服务关掉呀。 |
B1层 发表时间: 04-02-01 17:57 |
![]() | 回复: tommy_he [tommy_he] ![]() |
登录 |
删除IIS里的WWWROOT文件所有东东,重建 |
B2层 发表时间: 04-02-01 19:00 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号