This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010 Developer Edition De:SubsectionAdvancedTemplate"
From OWASP
m |
|||
Line 17: | Line 17: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
+ | | 6 = <!-- number 6 --> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <th colspan="2"> | ||
| 8 = <!-- number 8: References right --> | | 8 = <!-- number 8: References right --> | ||
</td> | </td> | ||
Line 26: | Line 31: | ||
<td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #4F81BD; background-color: #F2F2F2"> | <td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #4F81BD; background-color: #F2F2F2"> | ||
− | <div style="font-style: bold; color: #4F81BD; font-size: 150%;">{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen |9=Referenzen}}</div> | + | <div style="font-style: bold; color: #4F81BD; font-size: 150%;">{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 6=Verteidigungs-Option: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen |9=Referenzen}}</div> |
− | |<br/>{{Top_10_2010:SubsectionColoredTemplate|{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}}| 8=Referenzen| 9=Referenzen}}|}} | + | |<br/>{{Top_10_2010:SubsectionColoredTemplate|{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}}| 6=Verteidigungs-Option: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen| 9=Referenzen}}|}} |
}} | }} |