This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010:SummaryTableHeaderBeginTemplate"
From OWASP
m |
m (prepared different thumbnails by the year) |
||
Line 37: | Line 37: | ||
<tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; color: #FFFFFF;"> | <tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; color: #FFFFFF;"> | ||
− | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th> | + | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th> |
− | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> | + | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> |
− | <th width="33%" colspan="2" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th> | + | <th width="33%" colspan="2" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th> |
− | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=technicalImpacts|language={{{language}}} }}]]</th> | + | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=technicalImpacts|language={{{language}}} }}]]</th> |
− | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th> | + | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th> |
| #default = <!-- text ---> | | #default = <!-- text ---> | ||
<table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444; background-color: {{Top 10:BackgroundColor|year={{{year}}} }}; padding=2;"> | <table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444; background-color: {{Top 10:BackgroundColor|year={{{year}}} }}; padding=2;"> |
Revision as of 15:37, 14 April 2013
Usage:
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no thumbnail ---> ... {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2010, no thumbnail ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de}} <!-- default: style->year=2010, no thumbnail ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=thumbnail|language=de}} <!-- default: style->year=2010 ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
? |