This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Template:Top 10 2010:SubsectionAdvancedTemplate
From OWASP
Usage:
- Start Table
- {{Top_10:SubsectionTableBeginTemplate|type=main}} <!--- in the main page --->
- {{Top_10:SubsectionTableBeginTemplate|type=headertab}} <!--- in the languages part, like JAVA --->
- hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element
{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate |type={{Top_10_2010:StyleTemplate}} <!--- => box ---> |subsection=<defOp|exampleAttackScenarios|exampleScenarios|example|freetext|howPrevent|howToPrevent|references|userImpact|isTheApplicationVulnerable|vulnerableTo> |title=your title <!--- additional parameter for subsection=freetext or defOp (for the number) ---> |position=<firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight> |risk=<1-10|11> <!--- additional parameter for subsection=<defOp|example|howPrevent|vulnerableTo>: according to Template:Top_10_2010:ByTheNumbers ---> |year=<2010|2013> <!--- changes year of the Top-10-Version for subsection=<defOp|example|howPrevent|vulnerableTo> ---> |language=de <!--- additional parameter for all subsection-tags without fulltext ---> according to Template:Top 10:LanguageFile ---> }} outdatet: |number=<1|2|3|4|left|right|whole> <!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer --->
- 3. End Table
- {{Top_10:SubsectionTableEndTemplate}} <!--- in the main page --->
- {{Top_10_2010:BottomAdvancedTemplate <!--- end of the page --->
- |type={{Top_10_2010:StyleTemplate}}
- |useprev=PrevLink_Germany_Projekte
- |prev=Top_10_fuer_Entwickler
- |usenext=NextLink_Germany_Projekte
- |next=Top_10_fuer_Entwickler/Die Top-10-Risiken
- }}
Example:
- {{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate
- |type={{Top_10_2010:StyleTemplate}}
- |subsection=vulnerableTo
- |position=firstLeft
- |risk=1
- |year=2013
- |language=de
- }}
- 1st box
- {{Top_10:SubsectionTableEndTemplate}}
English New Syntax 2017
Is the Application Vulnerable?
1st box |
How to Prevent
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
Defending Option 1 against 'Injection':
5th box (big box) |
English New Syntax 2013
Am I Vulnerable To 'Injection'?
1st box |
How Do I Prevent 'Injection'?
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
Defending Option 1 against 'Injection':
5th box (big box) |
English old Syntax 2013
Am I Vulnerable To 'Injection'?
1st box |
How Do I Prevent 'Injection'?
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
English Old Syntax 2010
Am I Vulnerable To 'Injection'?
1st box |
How Do I Prevent 'Injection'?
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
German 2013
Bin ich durch 'Injection' verwundbar?
1st box |
Wie kann ich 'Injection' verhindern?
2nd box |
Mögliche Angriffsszenarien
3rd box |
Referenzen
4th box |
Verteidigungs-Option 1 gegen 'Injection':
5th box (big box) |
German 2010
Bin ich durch 'Injection' verwundbar?
1st box |
Wie kann ich 'Injection' verhindern?
2nd box |
Mögliche Angriffsszenarien
3rd box |
Referenzen
4th box |
Verteidigungs-Option 1 gegen 'Injection':
5th box (big box) |
Special 2013
Am I Vulnerable To 'Broken Authentication and Session Management'?
1st box |
How Do I Prevent 'Broken Authentication and Session Management'?
2nd box |
Example Attack Scenarios
3rd box |
Impact to the User
4th box |
Defending Option 1 against 'Broken Authentication and Session Management':
5th box (long box) |
Defending Option 2 against 'Broken Authentication and Session Management':
6th box |
References
7th box |