This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010 Developer Edition De:SummaryTableHeaderBeginTemplate"
From OWASP
m |
m |
||
Line 3: | Line 3: | ||
<tr style="background-color: #4F81Bd; color: #FFFFFF;"> | <tr style="background-color: #4F81Bd; color: #FFFFFF;"> | ||
− | <th width="16.5%"> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }]]</th> | + | <th width="16.5%"> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th> |
<th width="16.5%"> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> | <th width="16.5%"> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> | ||
<th width="33%" colspan="2"> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th> | <th width="33%" colspan="2"> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th> |
Revision as of 13:49, 18 March 2013
[[ERROR in the 'Language File' (Use of unknown Object 'threatAgents.jpg')|center|Threat Agents]] | [[ERROR in the 'Language File' (Use of unknown Object 'attackVectors.jpg')|center|Attack Vectors]] | [[ERROR in the 'Language File' (Use of unknown Object 'securityWeakness.jpg')|center|Security Weakness]] | [[ERROR in the 'Language File' (Use of unknown Object 'technicalImpacts.jpg')|center|Technical Impacts]] | [[ERROR in the 'Language File' (Use of unknown Object 'businessImpacts.jpg')|center|Business Impacts]] | |
---|---|---|---|---|---|
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
______ |