forked from jacknudt/trustieforge
parent
22d4835d08
commit
4b1212f279
|
@ -2,7 +2,7 @@
|
|||
<!--display the board-->
|
||||
|
||||
<div class="borad-topic-count" style="margin-top:10px">
|
||||
<span>共有 <%= link_to @topic_count %> 个贴子 </span
|
||||
<span>共有 <%= link_to @topic_count %> 个贴子 </span>
|
||||
</div>
|
||||
<div style="padding-top: 10px">
|
||||
<% if memos.any? %>
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
<!--display the board-->
|
||||
|
||||
<div class="borad-topic-count" style="margin-top:10px">
|
||||
<span>共有 <%= link_to @topic_count %> 个贴子 </span
|
||||
<span>共有 <%= link_to @topic_count %> 个贴子 </span>
|
||||
</div>
|
||||
<div style="padding-top: 10px">
|
||||
<% if memos.any? %>
|
||||
|
|
|
@ -5,12 +5,13 @@
|
|||
|
||||
|
||||
|
||||
</style>
|
||||
|
||||
<%= javascript_include_tag "ichart.1.2.min" %>
|
||||
<%= stylesheet_link_tag "sec-analysis.css" %>
|
||||
<%= stylesheet_link_tag "buglist-ichart.css" %>
|
||||
<%= stylesheet_link_tag "buglist.css" %>
|
||||
|
||||
|
||||
<div class="mask">
|
||||
<div class="header2"></div>
|
||||
<div class="colleft">
|
||||
|
@ -27,26 +28,6 @@
|
|||
<% @bugs.each do |bug| %>
|
||||
<li><span class="li_time">>[<%= show_description(bug, open_source_project) %>]</span><%= link_to bug.subject, bug.url %></li>
|
||||
<% end %>
|
||||
|
||||
<!-- <li><span class="li_time">>[DDoS漏洞]</span><a href="/vuldb/ssvid-62261" title="Cobbler 2.4.x - 2.6.x 本地文件包含">Cobbler 2.4.x - 2.6.x 本地文件包含</a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62260" title="Ruby OpenSSL CA私钥伪造漏洞">Ruby OpenSSL CA私钥伪造漏洞</a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">>[远程溢出漏洞]</span><a href="/vuldb/ssvid-62259" title="Adobe Flash Player 整数堆栈下溢远程命令执行">Adobe Flash Player 远程命令执行</a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">14-05-07</span><a href="/vuldb/ssvid-62258" title="PHPDISK phpdisk_del_process.php SQL注入漏洞">PHPDISK phpdisk_del_process.php SQL注入漏洞</a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62257" title="BEESCMS 3.4 order_save.php SQL注入漏洞">BEESCMS 3.4 order_save.php SQL注入漏洞</a></li> -->
|
||||
|
||||
<!-- <li ><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62256" title="Apache/NGINX 下 PHP-FPM 或者 PHP-CGI 拒绝服务漏洞">Apache/NGINX 下 PHP-FPM </a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62250" title="AlienVault OSSIM SQL注入以及远程代码执行">AlienVault OSSIM SQL注入</a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">>[DDoS漏洞]</span><a href="/vuldb/ssvid-62248" title="Eucalyptus Web Services拒绝服务漏洞">Eucalyptus Web Services</a></li> -->
|
||||
|
||||
<!-- <li ><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62245" title="Watchguard Fireware XTM OpenSSL TLS心跳信息泄漏漏洞"> Fireware XTM OpenSSL TLS</a></li> -->
|
||||
|
||||
<!-- <li ><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62244" title="SAP Sybase SQL Anywhere OpenSSL TLS泄漏漏洞">Sybase SQL Anywhere OpenSSL TLS</a></li> -->
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
|
@ -61,8 +42,6 @@
|
|||
// t.push(Math.floor(Math.random()*(30+((i%12)*5)))+10);
|
||||
}
|
||||
|
||||
|
||||
|
||||
var data = [
|
||||
{
|
||||
name :'',
|
||||
|
@ -127,7 +106,7 @@
|
|||
parseText:function(tip,name,value,text,i){
|
||||
return name+"漏洞数:"+value;
|
||||
}
|
||||
} ,
|
||||
}
|
||||
|
||||
},
|
||||
tipMocker:function(tips,i){
|
||||
|
@ -143,18 +122,7 @@
|
|||
labels[index]+" "+//日期
|
||||
((i%12)==0?"1 月":((i%12+1))+"月")+ //时间
|
||||
"</div>"+tips.join("<br/>");
|
||||
},
|
||||
|
||||
// legend : {
|
||||
// enable : true,
|
||||
// row:1,//设置在一行上显示,与column配合使用
|
||||
// column : 'max',
|
||||
// valign:'top',
|
||||
// sign:'bar',
|
||||
// background_color:null,//设置透明背景
|
||||
// offsetx:-80,//设置x轴偏移,满足位置需要
|
||||
// border : true
|
||||
// },
|
||||
},
|
||||
crosshair:{
|
||||
enable:true, //十字交叉线
|
||||
line_color:'#62bce9'
|
||||
|
@ -194,8 +162,7 @@
|
|||
start_scale:0,
|
||||
scale_space:50,
|
||||
end_scale:70,
|
||||
scale_color:'#9f9f9f',
|
||||
// label : {color:'#ffffff',fontsize:11},
|
||||
scale_color:'#9f9f9f'
|
||||
|
||||
},{
|
||||
position:'bottom',
|
||||
|
@ -203,31 +170,7 @@
|
|||
}]
|
||||
}
|
||||
});
|
||||
//开始画图
|
||||
|
||||
/**
|
||||
*自定义组件,画平均线。
|
||||
*/
|
||||
// line.plugin(new iChart.Custom({
|
||||
// drawFn:function(){
|
||||
// /**
|
||||
// *计算平均值的高度(坐标Y值)
|
||||
// *计算高度还不会! 会划线了!
|
||||
// */
|
||||
// // var avg = line.total/5,
|
||||
// // coo = line.getCoordinate(),
|
||||
// // x = coo.get('originx'),
|
||||
// // W = coo.width,
|
||||
// // S = coo.getScale('left'),
|
||||
// // H = coo.height,
|
||||
// // h = (avg - S.start) * H / S.distance,
|
||||
// // y = line.y + H - h;
|
||||
// line.target.line(28,97,400,97,2,'#b32c0d')
|
||||
// .textAlign('start')
|
||||
// .textBaseline('middle')
|
||||
// .textFont('600 12px Verdana');
|
||||
// }
|
||||
// }));
|
||||
line.draw();
|
||||
});
|
||||
|
||||
|
@ -282,10 +225,7 @@
|
|||
// t.push(Math.floor(Math.random()*(30+((i%12)*5)))+10);
|
||||
|
||||
}
|
||||
|
||||
|
||||
|
||||
var data = [
|
||||
var data = [
|
||||
{
|
||||
name : '',
|
||||
value:flow,
|
||||
|
@ -297,16 +237,9 @@
|
|||
|
||||
//创建x轴标签文本
|
||||
var date = new Date()
|
||||
|
||||
var labels = [];
|
||||
/* labels.push(date.getFullYear()-2);
|
||||
labels.push(date.getFullYear()-1);
|
||||
labels.push(date.getFullYear());
|
||||
labels.push(date.getFullYear()+1);*/
|
||||
|
||||
labels=["2012","","","","","","","","","","","","2013","","","","","","","","","","","","2014","","","",""];
|
||||
|
||||
|
||||
var line = new iChart.LineBasic2D({
|
||||
render : 'canvasDiv2',
|
||||
data: data,
|
||||
|
@ -352,7 +285,7 @@
|
|||
parseText:function(tip,name,value,text,i){
|
||||
return name+"帖子数:"+value+"万";
|
||||
}
|
||||
} ,
|
||||
}
|
||||
},
|
||||
|
||||
tipMocker:function(tips,i){
|
||||
|
@ -378,10 +311,9 @@
|
|||
label:false, //是否显示数值
|
||||
// hollow_inside:false,
|
||||
smooth : true,//平滑曲线
|
||||
point_size:2, // 焦点大小
|
||||
point_size:2 // 焦点大小
|
||||
// point_hollow : true,
|
||||
|
||||
|
||||
|
||||
},
|
||||
coordinate:{
|
||||
width:225, // 图表大小
|
||||
|
@ -404,7 +336,7 @@
|
|||
start_scale:0,
|
||||
scale_space:50,
|
||||
end_scale:70,
|
||||
scale_color:'#9f9f9f',
|
||||
scale_color:'#9f9f9f'
|
||||
// label : {color:'#ffffff',fontsize:11},
|
||||
|
||||
},{
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
background-position: -266px 3px;
|
||||
}
|
||||
.navigation .icon-search, .navigation .nav-pill-cancle, .navigation .nav-switch-icon, .navigation .nav-topbar .topbar-search .topbar-submit, .navigation .nav-topbar-arror {
|
||||
background: url();
|
||||
/*background: url()*/
|
||||
}
|
||||
.nav-switch-icon {
|
||||
width: 15px;
|
||||
|
@ -129,8 +129,6 @@ li {
|
|||
.nav-search-con{
|
||||
padding-top: 7px;
|
||||
}
|
||||
|
||||
|
||||
</style>
|
||||
<%= javascript_include_tag "ichart.1.2.min" %>
|
||||
<%= stylesheet_link_tag "buglist-div-use.css" %>
|
||||
|
@ -146,7 +144,7 @@ li {
|
|||
</div>
|
||||
|
||||
<div class="col2">
|
||||
<div> <span> <h1 style="fontsize:19px">软件安全漏洞 </h1></span><span style="margin-top: -30px; margin-right:70px;float: right; display: block;"><a href="#" hover="text-decoration: underline;" >More >></span></a></div>
|
||||
<div> <span> <h1 style="fontsize:19px">软件安全漏洞 </h1></span><span style="margin-top: -30px; margin-right:70px;float: right; display: block;"><a href="#" hover="text-decoration: underline;" >More >></a></span></div>
|
||||
<div class="fixed"></div>
|
||||
<div id ="buglist" class="li_list" style="margin-top:10px;margin-left:10px">
|
||||
<ul style="list-style-type: square;">
|
||||
|
@ -158,7 +156,7 @@ li {
|
|||
|
||||
<!-- <li><span class="li_time">14-05-07</span><a href="/vuldb/ssvid-62258" title="PHPDISK phpdisk_del_process.php SQL注入漏洞">PHPDISK phpdisk_del_process.php SQL注入漏洞</a></li> -->
|
||||
|
||||
<!-- <li><span class="li_time">[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62257" title="BEESCMS 3.4 order_save.php SQL注入漏洞">BEESCMS 3.4 order_save.php SQL注入漏洞</a></li> -->
|
||||
<!-- <li><span class="li_time">[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62257" title="BEESCMS 3.4 order_save.php SQL注入漏洞">BEESCMS 3.4 order_save.php SQL注入漏洞</a></li> -->
|
||||
|
||||
<li ><span class="li_time">[SQL注入漏洞]</span><a href="/vuldb/ssvid-62256" title="Apache/NGINX 下 PHP-FPM 或者 PHP-CGI 拒绝服务漏洞">Apache/NGINX 下 PHP-FPM 拒绝服务漏洞</a></li>
|
||||
|
||||
|
@ -236,7 +234,7 @@ li {
|
|||
parseText:function(tip,name,value,text,i){
|
||||
return name+"漏洞数:"+value;
|
||||
}
|
||||
} ,
|
||||
}
|
||||
},
|
||||
tipMocker:function(tips,i){
|
||||
var index;
|
||||
|
@ -272,7 +270,7 @@ li {
|
|||
label:false, //是否显示数值
|
||||
// hollow_inside:false,
|
||||
smooth : true,//平滑曲线
|
||||
point_size:2, // 焦点大小
|
||||
point_size:2 // 焦点大小
|
||||
// point_hollow : true,
|
||||
|
||||
|
||||
|
@ -298,7 +296,7 @@ li {
|
|||
start_scale:0,
|
||||
scale_space:50,
|
||||
end_scale:70,
|
||||
scale_color:'#9f9f9f',
|
||||
scale_color:'#9f9f9f'
|
||||
// label : {color:'#ffffff',fontsize:11},
|
||||
|
||||
},{
|
||||
|
@ -417,7 +415,7 @@ line.target.line(28,97,400,97,2,'#b32c0d')
|
|||
</div>
|
||||
<div class="nav-flexbox last">
|
||||
<div class="nav-category">
|
||||
<h4 title="上市时间">
|
||||
<h4 title="上市时间"> </h4>
|
||||
<div class="nav-category-wrap ">
|
||||
</div>
|
||||
</div>
|
||||
|
|
Loading…
Reference in New Issue