|
作者: rui [rui] 论坛用户 | 登录 |
这是我扫描的一个网站CGI漏洞可使我不会怎么利用!哪一位会的教教我! [CGI漏洞] /?PageServices [漏洞描述] /_vti_bin/_vti_aut/author.dll [漏洞描述] /_vti_bin/shtml.dll [漏洞描述] /_vti_bin/shtml.dll/_vti_rpc [漏洞描述] /_vti_bin/fpcount.exe?Page=default.htm|Image=2|Digits=1 [漏洞描述] /_vti_bin/shtml.exe [漏洞描述] /_vti_bin/shtml.dll/nosuch.htm [漏洞描述] /_vti_pvt/doctodep.btr [漏洞描述] /abczxv.htw [漏洞描述] /blabla.idq [漏洞描述] /default.asp%81 [漏洞描述] /default.asp [漏洞描述] /iisadmin/ [漏洞描述] /iishelp/iis/misc/iirturnh.htw [漏洞描述] /iissamples/exair/search/qfullhit.htw [漏洞描述] /iissamples/exair/search/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full [漏洞描述] /iissamples/exair/search/qsumrhit.htw [漏洞描述] /iissamples/exair/search/search.idq [漏洞描述] /iissamples/exair/search/query.idq [漏洞描述] /iissamples/issamples/fastq.idq [漏洞描述] /iissamples/sdk/asp/docs/codebrws.asp [漏洞描述] /iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full [漏洞描述] /iissamples/issamples/oop/qfullhit.htw [漏洞描述] /iissamples/issamples/query.idq [漏洞描述] /iissamples/issamples/oop/qsumrhit.htw [漏洞描述] /msadc/msadcs.dll [漏洞描述] /null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full [漏洞描述] /null.ida [漏洞描述] /null.idq [漏洞描述] /scripts/samples/search/author.idq [漏洞描述] /scripts/samples/search/filesize.idq [漏洞描述] /scripts/samples/search/filetime.idq [漏洞描述] /scripts/samples/search/qfullhit.htw [漏洞描述] /scripts/samples/search/qsumrhit.htw [漏洞描述] /scripts/samples/search/query.idq [漏洞描述] /scripts/samples/search/queryhit.idq [漏洞描述] /scripts/samples/search/simple.idq [漏洞描述] /bbs/ [漏洞描述] /download/ [漏洞描述] |
地主 发表时间: 03/20 19:41 |
回复: studio [studio] 论坛用户 | 登录 |
我只会用iis 给我ip啊! |
B1层 发表时间: 03/20 19:50 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号