Update README.md
更新了飞书捷径配置
This commit is contained in:
parent
271d31dbfe
commit
22f6edfdc3
20
README.md
20
README.md
@ -8,12 +8,22 @@
|
||||
|
||||
|
||||
![image](https://user-images.githubusercontent.com/29257678/136410980-302be028-3817-447c-9bad-e3d63045060d.png)
|
||||
![image](https://user-images.githubusercontent.com/29257678/136411130-217a2ae4-c422-48a4-8866-944176120087.png)
|
||||
> 配置和测试效果
|
||||
|
||||
|
||||
注意参数这里:
|
||||
![image](https://user-images.githubusercontent.com/29257678/136413189-f393dfa2-4874-4fea-b8be-7b5892d65fcf.png)
|
||||
添加下列json信息
|
||||
```php
|
||||
{"at":{},"msgtype":"text","text":{"content":"有新的CVE送达!\r\nCVE编号:CVE-2021-41773\r\nGithub地址:https://github.com/iilegacyyii/PoC-CVE-2021-41773\r\nCVE描述:\r\n在Apache HTTP Server 2.4.49的路径规范化更改中发现了一个缺陷。攻击者可以使用路径遍历攻击将url映射到预期文档根之外的文件。如果文档根目录之外的文件没有被“require all denied”保护,这些请求就可以成功。此外,这个缺陷可能会泄露解释文件(如CGI脚本)的源代码。众所周知,这个问题是在野外被利用的。此问题仅影响Apache 2.4.49,不影响Apache 2.4.49之前的版本。"}}
|
||||
```
|
||||
![image](https://user-images.githubusercontent.com/29257678/136411286-99c2e4db-0d8a-4b61-8613-96e3ebad8e44.png)
|
||||
![image](https://user-images.githubusercontent.com/29257678/136411333-0f233245-5c4e-40f4-8a59-e0baef6f1d2b.png)
|
||||
|
||||
> 选择json里面的模块
|
||||
|
||||
|
||||
![image](https://user-images.githubusercontent.com/29257678/136413413-48417c13-285d-47ff-9fba-c78bed592430.png)
|
||||
|
||||
> 查看效果
|
||||
|
||||
![image](https://user-images.githubusercontent.com/29257678/136413553-48c2100b-8f2d-4f81-8b8b-74351bde0456.png)
|
||||
|
||||
|
||||
[修复钉钉通知小bug](https://github.com/yhy0/github-cve-monitor/issues/4),修复cve编号推送错误
|
||||
|
Loading…
Reference in New Issue
Block a user