返回列表 发帖

扫描发现CGI/ASP漏洞该如何进行下一步的攻击

CGI/ASP漏洞
222.67.120.146/?PageServices
222.67.120.146/index.asp%81
222.67.120.146/?wp-html-rend
222.67.120.146/?wp-cs-dump
222.67.120.146/?wp-uncheckout
222.67.120.146/?wp-ver-diff
222.67.120.146/?wp-usr-prop
222.67.120.146/?wp-verify-link
222.67.120.146/?wp-ver-info
222.67.120.146/?wp-start-ver
222.67.120.146/?wp-stop-ver

返回列表 回复 发帖