This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10:SummaryTableTemplate"
From OWASP
Line 25: | Line 25: | ||
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | ||
{{Top_10_2010:SummaryTableEndTemplate|year=2013}} | {{Top_10_2010:SummaryTableEndTemplate|year=2013}} | ||
+ | <br/> | ||
+ | <br/> | ||
+ | <br/> | ||
+ | <nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} | ||
+ | {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}} | ||
+ | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | ||
+ | {{Top_10_2010:SummaryTableEndTemplate|year=2013}} | ||
+ | </nowiki> | ||
+ | |||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} | ||
+ | {{Top_10:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}} | ||
+ | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | ||
+ | {{Top_10_2010:SummaryTableEndTemplate|year=2013}} | ||
+ | <br/> | ||
<br/> | <br/> | ||
<br/> | <br/> |
Revision as of 15:58, 17 April 2013
Usage
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability AVERAGE |
Prevalence VERY WIDESPREAD |
Detectability EASY |
Impact MODERATE |
Application / Business Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
Ausnutzbarkeit DURCHSCHNITTLICH |
Verbreitung AUSSERGEWÖHNLICH HÄUFIG |
Auffindbarkeit EINFACH |
Auswirkung MITTEL |
Application / Business Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
DURCHSCHNITTLICH | AUSSERGEWÖHNLICH HÄUFIG | EINFACH | MITTEL | Application / Business Specific |