o’);window.opener=null; window.close();” Case 3 str = str &; “location.href=’”&;Neeao_Alert_Url&;”‘;” Case 4 str = str &; “alert(‘”&;Neeao_Alert_Info&;”‘);location.href=’”&;Neeao_Alert_Url&;”‘;” end Select str = str &; “<”&;”/Script”&;”>” response.write str End Function ‘判断注入类型函数 Function intype(values) Select Case values Case Request.Form intype = “Post” Case Request.QueryString intype = “Get” Case Request.Cookies intype = “Cookies” end Select End Function ‘干掉 xss 脚本 Function N_Replace(N_urlString) N_urlString = Replace(N_urlString,”‘”,”””) N_urlString = Replace(N_urlString, “>”, “&;gt;”) N_urlString = Replace(N_urlString, “<”, “&;lt;”) N_Replace = N_urlString End Function
Sub PutApplicationValue() dim infosql,rsinfo set rsinfo=Neeao_Inject_conn.execute(“select N_In,Kill_IP,WriteSql,alert_url,alert_info,kill_info,N_type,Sec_Forms,Sec_Form_open from config”) Redim ApplicationValue(9) dim i for i=0 to 8 ApplicationValue(i)=rsinfo(i) next set rsinfo=nothing Application.Lock set Application(“Neeao_config_info”)=nothing Application(“Neeao_config_info”)=ApplicationValue Application.unlock end Sub %>