This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Template:Mobile Top 10 2016:SubsectionAdvancedTemplate

From OWASP
Jump to: navigation, search

Usage:

  1. Start Table
    • {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} <!--- in the main page --->
    • {{Mobile_Top_10:SubsectionTableBeginTemplate|type=headertab}} <!--- in the languages part, like JAVA --->
  2. hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element
{{Mobile_Top_10_2016_Developer_Edition_De:SubsectionAdvancedTemplate  
  |type={{Mobile_Top_10_2016:StyleTemplate}} <!--- => box --->
  |subsection=<defOp|example|freetext|howPrevent|references|userImpact|vulnerableTo>  
  |title=your title <!--- additional parameter for subsection=freetext or defOp (for the number) --->
  |position=<firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight>  
  |risk=<1-10|11> <!--- additional parameter for subsection=<defOp|example|howPrevent|vulnerableTo>:
  according to Template:Mobile_Top_10_2016:ByTheNumbers --->
  |year=<2016|2016> <!--- changes year of the Top-10-Version for subsection=<defOp|example|howPrevent|vulnerableTo> --->
  |language=de <!--- additional parameter for all subsection-tags without fulltext --->
  according to Template:Mobile Top 10:LanguageFile --->
}}  
 outdatet:  
  |number=<1|2|3|4|left|right|whole> <!--- backward compatible for Template:Top 10 2016:SubsectionAdvancedTemplate; please do NOT use any longer --->
3. End Table
  • {{Mobile_Top_10:SubsectionTableEndTemplate}} <!--- in the main page --->
  • {{Mobile_Top_10_2016:BottomAdvancedTemplate <!--- end of the page --->
|type={{Mobile_Top_10_2016:StyleTemplate}}
|useprev=PrevLink_Germany_Projekte
|prev=Top_10_fuer_Entwickler
|usenext=NextLink_Germany_Projekte
|next=Top_10_fuer_Entwickler/Die Top-10-Risiken
}}


Example:

{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate
|type={{Mobile_Top_10_2016:StyleTemplate}}
|subsection=vulnerableTo
|position=firstLeft
|risk=1
|year=2016
|language=de
}}
1st box
{{Mobile_Top_10:SubsectionTableEndTemplate}}

English New Syntax

Am I Vulnerable To 'Improper Platform Usage'?

1st box

How Do I Prevent 'Improper Platform Usage'?

2nd box

Example Attack Scenarios

3rd box

References

4th box

Defending Option 1 against 'Improper Platform Usage':

5th box (big box)


English old Syntax 2016

Am I Vulnerable To 'Improper Platform Usage'?

1st box

How Do I Prevent 'Improper Platform Usage'?

2nd box

Example Attack Scenarios

3rd box

References

4th box


English Old Syntax 2016

Am I Vulnerable To 'Improper Platform Usage'?

1st box

How Do I Prevent 'Improper Platform Usage'?

2nd box

Example Attack Scenarios

3rd box

References

4th box


German 2016

Bin ich durch 'Improper Platform Usage' verwundbar?

1st box

Wie kann ich 'Improper Platform Usage' verhindern?

2nd box

Mögliche Angriffsszenarien

3rd box

Referenzen

4th box

Verteidigungs-Option 1 gegen 'Improper Platform Usage':

5th box (big box)


German 2016

Bin ich durch 'Improper Platform Usage' verwundbar?

1st box

Wie kann ich 'Improper Platform Usage' verhindern?

2nd box

Mögliche Angriffsszenarien

3rd box

Referenzen

4th box

Verteidigungs-Option 1 gegen 'Improper Platform Usage':

5th box (big box)


Special 2016

Am I Vulnerable To 'Insecure Data Storage'?

1st box

How Do I Prevent 'Insecure Data Storage'?

2nd box

Example Attack Scenarios

3rd box

Impact to the User

4th box

Defending Option 1 against 'Insecure Data Storage':

5th box (long box)

Defending Option 2 against 'Insecure Data Storage':

6th box

References

7th box