|
|
|
@ -24,25 +24,29 @@
|
|
|
|
|
<div class="fixed"></div>
|
|
|
|
|
<div class="li_list" style="margin-top:10px;margin-left:10px">
|
|
|
|
|
<ul style="list-style-type: square;">
|
|
|
|
|
<% @bugs.each do |bug| %>
|
|
|
|
|
<li><span class="li_time">>[<%= show_description(bug, open_source_project) %>]</span><%= link_to bug.subject, bug.url %></li>
|
|
|
|
|
<% end %>
|
|
|
|
|
|
|
|
|
|
<!-- <li><span class="li_time">>[DDoS漏洞]</span><a href="/vuldb/ssvid-62261" title="Cobbler 2.4.x - 2.6.x 本地文件包含">Cobbler 2.4.x - 2.6.x 本地文件包含</a></li> -->
|
|
|
|
|
|
|
|
|
|
<li><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62260" title="Ruby OpenSSL CA私钥伪造漏洞">Ruby OpenSSL CA私钥伪造漏洞</a></li>
|
|
|
|
|
<!-- <li><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62260" title="Ruby OpenSSL CA私钥伪造漏洞">Ruby OpenSSL CA私钥伪造漏洞</a></li> -->
|
|
|
|
|
|
|
|
|
|
<li><span class="li_time">>[远程溢出漏洞]</span><a href="/vuldb/ssvid-62259" title="Adobe Flash Player 整数堆栈下溢远程命令执行">Adobe Flash Player 远程命令执行</a></li>
|
|
|
|
|
<!-- <li><span class="li_time">>[远程溢出漏洞]</span><a href="/vuldb/ssvid-62259" title="Adobe Flash Player 整数堆栈下溢远程命令执行">Adobe Flash Player 远程命令执行</a></li> -->
|
|
|
|
|
|
|
|
|
|
<!-- <li><span class="li_time">14-05-07</span><a href="/vuldb/ssvid-62258" title="PHPDISK phpdisk_del_process.php SQL注入漏洞">PHPDISK phpdisk_del_process.php SQL注入漏洞</a></li> -->
|
|
|
|
|
|
|
|
|
|
<!-- <li><span class="li_time">[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62257" title="BEESCMS 3.4 order_save.php SQL注入漏洞">BEESCMS 3.4 order_save.php SQL注入漏洞</a></li> -->
|
|
|
|
|
|
|
|
|
|
<!-- <li ><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62256" title="Apache/NGINX 下 PHP-FPM 或者 PHP-CGI 拒绝服务漏洞">Apache/NGINX 下 PHP-FPM </a></li> -->
|
|
|
|
|
<!-- <li ><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62256" title="Apache/NGINX 下 PHP-FPM 或者 PHP-CGI 拒绝服务漏洞">Apache/NGINX 下 PHP-FPM </a></li> -->
|
|
|
|
|
|
|
|
|
|
<li><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62250" title="AlienVault OSSIM SQL注入以及远程代码执行">AlienVault OSSIM SQL注入</a></li>
|
|
|
|
|
<!-- <li><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62250" title="AlienVault OSSIM SQL注入以及远程代码执行">AlienVault OSSIM SQL注入</a></li> -->
|
|
|
|
|
|
|
|
|
|
<li><span class="li_time">>[DDoS漏洞]</span><a href="/vuldb/ssvid-62248" title="Eucalyptus Web Services拒绝服务漏洞">Eucalyptus Web Services</a></li>
|
|
|
|
|
<!-- <li><span class="li_time">>[DDoS漏洞]</span><a href="/vuldb/ssvid-62248" title="Eucalyptus Web Services拒绝服务漏洞">Eucalyptus Web Services</a></li> -->
|
|
|
|
|
|
|
|
|
|
<li ><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62245" title="Watchguard Fireware XTM OpenSSL TLS心跳信息泄漏漏洞"> Fireware XTM OpenSSL TLS</a></li>
|
|
|
|
|
<!-- <li ><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62245" title="Watchguard Fireware XTM OpenSSL TLS心跳信息泄漏漏洞"> Fireware XTM OpenSSL TLS</a></li> -->
|
|
|
|
|
|
|
|
|
|
<li ><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62244" title="SAP Sybase SQL Anywhere OpenSSL TLS泄漏漏洞">Sybase SQL Anywhere OpenSSL TLS</a></li>
|
|
|
|
|
<!-- <li ><span class="li_time">>[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62244" title="SAP Sybase SQL Anywhere OpenSSL TLS泄漏漏洞">Sybase SQL Anywhere OpenSSL TLS</a></li> -->
|
|
|
|
|
</ul>
|
|
|
|
|
</div>
|
|
|
|
|
</div>
|
|
|
|
@ -52,23 +56,32 @@
|
|
|
|
|
<script type="text/javascript">
|
|
|
|
|
$(function(){
|
|
|
|
|
var flow=[];
|
|
|
|
|
for(var i=0;i<35;i++){
|
|
|
|
|
for(var i=0;i<24+5;i++){
|
|
|
|
|
flow.push(Math.floor(Math.random()*(30+((i%12)*5)))+10);
|
|
|
|
|
// t.push(Math.floor(Math.random()*(30+((i%12)*5)))+10);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
var data = [
|
|
|
|
|
{
|
|
|
|
|
name : 'commit',
|
|
|
|
|
name :'',
|
|
|
|
|
value:flow,
|
|
|
|
|
color:'#0d8ecf',
|
|
|
|
|
line_width:2
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
var labels = ["","2010","2011","2012","2013","2014"];
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//创建x轴标签文本
|
|
|
|
|
var date = new Date()
|
|
|
|
|
|
|
|
|
|
var labels = [];
|
|
|
|
|
/* labels.push(date.getFullYear()-2);
|
|
|
|
|
labels.push(date.getFullYear()-1);
|
|
|
|
|
labels.push(date.getFullYear());*/
|
|
|
|
|
labels=["2012","","","","","","","","","","","","2013","","","","","","","","","","","","2014","","","",""];
|
|
|
|
|
|
|
|
|
|
var line = new iChart.LineBasic2D({
|
|
|
|
|
render : 'canvasDiv',
|
|
|
|
|
data: data,
|
|
|
|
@ -109,9 +122,30 @@
|
|
|
|
|
width:2,
|
|
|
|
|
color:'#3f8695'
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
// legend : {
|
|
|
|
|
listeners:{
|
|
|
|
|
//tip:提示框对象、name:数据名称、value:数据值、text:当前文本、i:数据点的索引
|
|
|
|
|
parseText:function(tip,name,value,text,i){
|
|
|
|
|
return name+"漏洞数:"+value;
|
|
|
|
|
}
|
|
|
|
|
} ,
|
|
|
|
|
|
|
|
|
|
},
|
|
|
|
|
tipMocker:function(tips,i){
|
|
|
|
|
var index;
|
|
|
|
|
if (Math.floor(i/12)==0) {
|
|
|
|
|
index=0;
|
|
|
|
|
}else if (Math.floor(i/12)==1) {
|
|
|
|
|
index=12;
|
|
|
|
|
}else{
|
|
|
|
|
index=24;
|
|
|
|
|
};
|
|
|
|
|
return "<div style='font-weight:400'>"+
|
|
|
|
|
labels[index]+" "+//日期
|
|
|
|
|
((i%12)==0?"1 月":((i%12+1))+"月")+ //时间
|
|
|
|
|
"</div>"+tips.join("<br/>");
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
// legend : {
|
|
|
|
|
// enable : true,
|
|
|
|
|
// row:1,//设置在一行上显示,与column配合使用
|
|
|
|
|
// column : 'max',
|
|
|
|
@ -226,7 +260,7 @@
|
|
|
|
|
|
|
|
|
|
<!-- <li><span class="li_time">[OpenSSL漏洞]</span><a href="/vuldb/ssvid-62257" title="BEESCMS 3.4 order_save.php SQL注入漏洞">BEESCMS 3.4 order_save.php SQL注入漏洞</a></li> -->
|
|
|
|
|
|
|
|
|
|
<!-- <li ><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62256" title="Apache/NGINX 下 PHP-FPM 或者 PHP-CGI 拒绝服务漏洞">Apache/NGINX 下 PHP-FPM </a></li> -->
|
|
|
|
|
<li ><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62256" title="Apache/NGINX 下 PHP-FPM 或者 PHP-CGI 拒绝服务漏洞">Apache/NGINX 下 PHP-FPM </a></li>
|
|
|
|
|
|
|
|
|
|
<li><span class="li_time">>[SQL注入漏洞]</span><a href="/vuldb/ssvid-62250" title="AlienVault OSSIM SQL注入以及远程代码执行">AlienVault OSSIM SQL注入</a></li>
|
|
|
|
|
|
|
|
|
@ -243,22 +277,35 @@
|
|
|
|
|
<script type="text/javascript">
|
|
|
|
|
$(function(){
|
|
|
|
|
var flow=[];
|
|
|
|
|
for(var i=0;i<35;i++){
|
|
|
|
|
for(var i=0;i<24+5;i++){
|
|
|
|
|
flow.push(Math.floor(Math.random()*(30+((i%12)*5)))+10);
|
|
|
|
|
// t.push(Math.floor(Math.random()*(30+((i%12)*5)))+10);
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
var data = [
|
|
|
|
|
{
|
|
|
|
|
name : 'commit',
|
|
|
|
|
name : '',
|
|
|
|
|
value:flow,
|
|
|
|
|
color:'#0d8ecf',
|
|
|
|
|
line_width:2
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
var labels = ["","2010","2011","2012","2013","2014"];
|
|
|
|
|
|
|
|
|
|
//创建x轴标签文本
|
|
|
|
|
var date = new Date()
|
|
|
|
|
|
|
|
|
|
var labels = [];
|
|
|
|
|
/* labels.push(date.getFullYear()-2);
|
|
|
|
|
labels.push(date.getFullYear()-1);
|
|
|
|
|
labels.push(date.getFullYear());
|
|
|
|
|
labels.push(date.getFullYear()+1);*/
|
|
|
|
|
|
|
|
|
|
labels=["2012","","","","","","","","","","","","2013","","","","","","","","","","","","2014","","","",""];
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
var line = new iChart.LineBasic2D({
|
|
|
|
|
render : 'canvasDiv2',
|
|
|
|
@ -300,7 +347,29 @@
|
|
|
|
|
width:2,
|
|
|
|
|
color:'#3f8695'
|
|
|
|
|
},
|
|
|
|
|
listeners:{
|
|
|
|
|
//tip:提示框对象、name:数据名称、value:数据值、text:当前文本、i:数据点的索引
|
|
|
|
|
parseText:function(tip,name,value,text,i){
|
|
|
|
|
return name+"帖子数:"+value+"万";
|
|
|
|
|
}
|
|
|
|
|
} ,
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
tipMocker:function(tips,i){
|
|
|
|
|
var index;
|
|
|
|
|
if (Math.floor(i/12)==0) {
|
|
|
|
|
index=0;
|
|
|
|
|
}else if (Math.floor(i/12)==1) {
|
|
|
|
|
index=12;
|
|
|
|
|
}else{
|
|
|
|
|
index=24;
|
|
|
|
|
};
|
|
|
|
|
return "<div style='font-weight:400'>"+
|
|
|
|
|
labels[index]+" "+//日期
|
|
|
|
|
((i%12)==0?"1 月":((i%12+1))+"月")+ //时间
|
|
|
|
|
"</div>"+tips.join("<br/>");
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
crosshair:{
|
|
|
|
|
enable:true, //十字交叉线
|
|
|
|
|
line_color:'#62bce9'
|
|
|
|
@ -352,7 +421,7 @@
|
|
|
|
|
</script>
|
|
|
|
|
<!--我是分割线2===================================================================================================!-->
|
|
|
|
|
<div class="borad-topic-count" style="margin-top:10px">
|
|
|
|
|
<!-- 共有 <%= link_to memos.count %> 个贴子 -->
|
|
|
|
|
<!-- 共有 <%#= link_to memos.count %> 个贴子 -->
|
|
|
|
|
<span><h1 style="color:#7591cc;font-weight:900">全球热帖</h1></span>
|
|
|
|
|
<span style="margin-top: -30px; margin-right:70px;float: right; display: block;"><%= link_to "更多>>", :controller => "open_source_projects",:action => "showmemo", :id => @open_source_project.id %></span>
|
|
|
|
|
</div>
|
|
|
|
@ -366,7 +435,7 @@
|
|
|
|
|
<td>
|
|
|
|
|
<table width="630px" border="0">
|
|
|
|
|
<tr>
|
|
|
|
|
<td valign="top" width="500px" class="<%= topic.sticky ? 'sticky' : '' %> <%= topic.locked? ? 'locked' : '' %>"><%= link_to h(topic.subject), open_source_project_relative_memo_path(open_source_project, topic) %></td>
|
|
|
|
|
<td valign="top" width="500px" class="<%= topic.sticky ? 'sticky' : '' %> <%= topic.locked? ? 'locked' : '' %>"><%= link_to h(topic.subject), topic.url %></td>
|
|
|
|
|
<td align="right" rowspan="3">
|
|
|
|
|
<table class="borad-count">
|
|
|
|
|
<tr>
|
|
|
|
|