Template:Top 10 2010:TopTableTemplate

From OWASP
Jump to: navigation, search
Threat Agents Attack Vector Security Weakness Weakness Detectability Technical Impact Business Impacts
______ Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SIMPLE
______
{{{1}}} {{{2}}} {{{3}}} {{{4}}} {{{5}}} {{{6}}}