<script>
export default {
  components: {},
  data () {
    return {
      radio: 0,
      activeName: '1',
    };
  },
  computed: {
    isButtonDisabled() {
      return this.radio === 0;
    }
  },
  methods: {
    check(radio) {
      console.log(radio)
      if (radio === 3) {
        this.$message.success('恭喜你，答对啦！')
      } else {
        this.$message.error('很遗憾，答错啦！')
      }
    },
  }
}
</script>

<template>
  <div>
    <div>
      <h1 align="center">4.1 CVE</h1>
      <el-divider></el-divider>
      <ul>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.1_tcpdump_2017-11543.md" data-pid="160920" target="_blank">7.1.1 CVE-2017-11543 tcpdump sliplink_print 栈溢出漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.2_glibc_2015-0235.md" data-pid="160921" target="_blank">7.1.2 CVE-2015-0235 glibc __nss_hostname_digits_dots 堆溢出漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.3_wget_2016-4971.md" data-pid="160922" target="_blank">7.1.3 CVE-2016-4971 wget 任意文件上传漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.4_wget_2017-13089.md" data-pid="160923" target="_blank">7.1.4 CVE-2017-13089 wget skip_short_body 栈溢出漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.5_glibc_2018-1000001.md" data-pid="160924" target="_blank">7.1.5 CVE–2018-1000001 glibc realpath 缓冲区下溢漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.6_dnstracer_2017-9430.md" data-pid="160925" target="_blank">7.1.6 CVE-2017-9430 DNSTracer 栈溢出漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.7_binutils_2018-6323.md" data-pid="160926" target="_blank">7.1.7 CVE-2018-6323 GNU binutils elf_object_p 整型溢出漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.8_adobe_reader_2010-2883.md" data-pid="160927" target="_blank">7.1.8 CVE-2010-2883 Adobe CoolType SING 表栈溢出漏洞</a></li>
        <li style="margin-left: 2em;"><a href="https://www.bookstack.cn/read/CTF-All-In-One/doc-7.1.9_ms_word_2010-3333.md" data-pid="160928" target="_blank">7.1.9 CVE-2010-3333 Microsoft Word RTF pFragments 栈溢出漏洞</a></li>
      </ul>
      <el-divider></el-divider>

      <h3>CVE（Common Vulnerabilities and Exposures）用于什么目的？</h3>
      <el-radio-group v-model="radio">
        <el-radio :label="1">评估网络安全风险</el-radio>
        <el-radio :label="2">为网络安全人员提供培训和认证</el-radio>
        <el-radio :label="3">对软件漏洞进行归类和分析</el-radio>
        <el-radio :label="4">创建安全加密协议</el-radio>
        <el-button type="primary" plain :disabled="isButtonDisabled" @click="check(radio)">检查</el-button>
      </el-radio-group>
    </div>
    <el-divider></el-divider>

  </div>
</template>

<style scoped>
</style>