<%@ page language="java" import="java.util.*" pageEncoding="utf-8"%>
<%@   include   file= "/tag.jsp"   %>

<%
String path = request.getContextPath();
String basePath = request.getScheme()+"://"+request.getServerName()+":"+request.getServerPort()+path+"/";
%>

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <base href="<%=basePath%>">
    
    <title>My JSP 'test.jsp' starting page</title>
    
	<meta http-equiv="pragma" content="no-cache">
	<meta http-equiv="cache-control" content="no-cache">
	<meta http-equiv="expires" content="0">    
	<meta http-equiv="keywords" content="keyword1,keyword2,keyword3">
	<meta http-equiv="description" content="This is my page">
	<!--
	<link rel="stylesheet" type="text/css" href="styles.css">
	-->
<script src="jquery-1.6.2.min.js" type="text/javascript"></script>
  </head>
  
  <body>
  ${name}
     <logic:notEmpty name="newlist">
	<logic:iterate id="li" name="newlist">
	  <table border="1" cellspacing="0" cellpadding="0" width="581">
        <tr>
          <td width="104"><p><strong>漏洞名称 </strong></p></td>
          <td width="477"><p>${li.NAME}</p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>漏洞ID</strong></p></td>
          <td width="477"><p>${li.SYS_ID} </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>漏洞类型</strong><strong> </strong></p></td>
          <td width="477"><p>${li.TAG_ID} </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>风险等级</strong><strong> </strong></p></td>
          <td width="477"><p>${li.PRIORITY} </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>CVE</strong><strong>编号</strong><strong> </strong></p></td>
          <td width="477"><p>CVE-2006-0260 </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>CNNVD</strong><strong>编号</strong><strong> </strong></p></td>
          <td width="477"><p>无 </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>厂商漏洞编号</strong><strong> </strong></p></td>
          <td width="477"><p>CPU JAN2006 DB05 </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>受影响版本</strong><strong> </strong></p></td>
          <td width="477"><p>${li.DBVERSION} </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>漏洞来源</strong><strong> </strong></p></td>
          <td width="477"><p>${li.ORIGIN}</p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>漏洞成因</strong><strong> </strong></p></td>
          <td width="477"><p>Oracle Data Pump Metadata API 组件中的DBMS_METADATA包中存在脆弱点 </p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>漏洞描述</strong><strong> </strong></p></td>
          <td width="477"><p>${li.DESCRIPTION }</p></td>
        </tr>
        <tr>
          <td width="104"><p><strong>修复建议</strong><strong> </strong></p></td>
          <td width="477"><p>${li.FIXSQL}</p></td>
        </tr>
      </table>
      <p>&nbsp;</p>
	</logic:iterate></logic:notEmpty>
	<bean:write name="page" filter="false"/>
  </body>
</html>
