CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Frontpage Extensions Directory _vti_bin Present

2016年9月26日 997点热度 0人点赞 0条评论

漏洞类别:Web server漏洞等级:

漏洞信息

The remote Web server appears to be running with Frontpage Extensions. On a default installation of Frontpage Extensions, a virtual directory "/_vti_bin/" is created. Most scanner tools scan this directory because vulnerabilities have been found in Frontpage scripts.

Note that the detection of the presence of a directory is for the most part based on the return code in the HTTP responses to the HTTP requests such as "GET /directory/ HTTP/1.0" and may at times be unreliable.

漏洞危害

Unauthorized users can launch attacks on specific Frontage Extensions scripts.

解决方案

Remove all scripts that you do not need from the "/_vti_bin/" directory.

To best secure your server, you should also apply the latest Frontpage Service Pack, which is available for download fromMicrosoft's Web site.

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me