2 lines
1.6 KiB
JavaScript
2 lines
1.6 KiB
JavaScript
|
|
import{k as b,$ as i,Z as n,_ as t,aa as e,ak as d,F as p,P as c,j as g}from"./vue-core-DJjvd5ZC.js?v=1773287522785";import{c as y}from"./index-BTglIPU2.js?v=1773287522785";import"./prismjs-BZPoR7_J.js?v=1773287522785";import"./naive-ui--dJnpVcV.js?v=1773287522785";const f={key:0,class:"web-vuln-summary"},h={class:"web-vuln-list"},k=["item"],w=["item"],N=["href"],V={key:0,class:"pagination-note"},x=b({__name:"WebVulnSection",props:{data:{type:Array,required:!0},pageIndex:{type:Number,required:!0},totalPages:{type:Number,required:!0},reportData:{type:Object,default:()=>({})}},setup(_){const a=_,m={1:"Low",2:"Medium",3:"High",4:"Critical",5:"Secure"},v=s=>m[s];return(s,o)=>{var u;return i(),n("div",null,[(u=a.reportData)!=null&&u.website_vulnerabilities?(i(),n("div",f,[t("div",null,"Website Number:"+e(a.reportData.website_vulnerabilities.site_num||0),1),t("div",null,"Vulnerability Number:"+e(a.reportData.website_vulnerabilities.loophole_num||0),1)])):d("",!0),t("div",h,[(i(!0),n(p,null,c(a.data,l=>(i(),n("div",{key:l.id,class:"web-vuln-site",item:l},[t("div",null,"Website:"+e(l.name)+"("+e(l.path)+")",1),(i(!0),n(p,null,c(l.cms,r=>(i(),n("div",{key:r.name,class:"web-vuln-cms",item:r},[t("div",null,"Vulnerability Name:"+e(r.name),1),t("div",null,"Risk Level:"+e(v(r.dangerous)),1),t("div",null,"Description:"+e(r.ps),1),t("div",null,[o[0]||(o[0]=g("Repair Suggestion:")),t("a",{href:r.repair,target:"_blank"},e(r.repair),9,N)])],8,w))),128))],8,k))),128)),a.totalPages>1?(i(),n("div",V," Total "+e(a.totalPages)+" pages, current page "+e(a.pageIndex+1)+". ",1)):d("",!0)])])}}}),W=y(x,[["__scopeId","data-v-5d926b3f"]]);export{W as default};
|