|
作者: sunking [sunking] 论坛用户 | 登录 |
/iissamples/exair/search/qfullhit.htw [漏洞描述] /iissamples/exair/search/qsumrhit.htw [漏洞描述] /iishelp/iis/misc/iirturnh.htw [漏洞描述] /iissamples/issamples/oop/qfullhit.htw [漏洞描述] /null.ida [漏洞描述] /scripts/samples/search/qsumrhit.htw [漏洞描述] /scripts/samples/search/qfullhit.htw [漏洞描述] /iissamples/issamples/oop/qsumrhit.htw [漏洞描述] /null.idq [漏洞描述] /abczxv.htw [漏洞描述] /."./."./winnt/win.ini%20.php3 [漏洞描述] /phorum/plugin/replace/admin.php [漏洞描述] /b2/b2-include/b2edit.showposts.php [漏洞描述] /phorum/admin/actions/del.php [漏洞描述] /filemanager/filemanager_forms.php [漏洞描述] /phorum/plugin/replace/plugin.php [漏洞描述] 插件类型: HTTP 插件成员名称: CGI漏洞 插件作者: glacier 插件版本: 1.4 风险等级: 高 开放端口] 端口25开放: SMTP, Simple Mail Transfer Protocol [Banner] 220 X1 NT-ESMTP Server sms.cnlife.net (IMail 7.04 20-1) [End of banner] 端口80开放: HTTP, World Wide Web [Banner] HTTP/1.1 200 OK Server: Microsoft-IIS/5.0 Date: Fri, 07 Mar 2003 20:59:34 GMT Content-type: text/html X-Powered-By: PHP/4.1.0 Set-Cookie: PHPSESSID=67724c97228257b787896176ebac085b; path=/ Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache [End of banner] 端口135开放: Location Service [Banner] [None] [End of banner] 端口443开放: HttpS, Secure HTTP [Banner] [None] [End of banner] |
地主 发表时间: 03/08 05:22 |
回复: zass [zass] 论坛用户 | 登录 |
htw映射。idq overflow 已经够了 |
B1层 发表时间: 03/11 09:47 |
回复: laievf [laievf] 论坛用户 | 登录 |
如何利用啊?好像溢出不了啊~!!! |
B2层 发表时间: 03/11 12:17 |
回复: gougouhui [gougouhui] 论坛用户 | 登录 |
我也用过IDQ溢出的工具,能溢出但是TELNET就是连不上去 |
B3层 发表时间: 03/12 15:33 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号