This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10:SummaryTableTemplate"
From OWASP
(6 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
==Usage== | ==Usage== | ||
+ | Example usage: | ||
<nowiki> | <nowiki> | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | ||
Line 6: | Line 7: | ||
{{Top_10_2010:SummaryTableEndTemplate|year=2013}} | {{Top_10_2010:SummaryTableEndTemplate|year=2013}} | ||
</nowiki> | </nowiki> | ||
+ | |||
+ | For parameters, you can use the actual value (use "veryWidespread") or numeric values where: | ||
+ | exploitability: 1=easy, 2=average, 3=difficult | ||
+ | prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon | ||
+ | detectability: 1=easy, 2=average, 3=difficult | ||
+ | impact: 1=severe, 2=common, 3=minor | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | ||
Line 42: | Line 49: | ||
<br/> | <br/> | ||
<br/> | <br/> | ||
− | <onlyinclude> | + | <onlyinclude> {{#switch: {{{type}}} |
− | {{#switch: {{{type}}} | ||
| valueOnly = | | valueOnly = | ||
{{#switch: {{{exploitability}}} | {{#switch: {{{exploitability}}} | ||
Line 95: | Line 101: | ||
{{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | ||
}} | }} | ||
− | | #default = | + | | #default = {{#switch: {{{exploitability}}} |
− | |||
|1 | |1 | ||
|easy= | |easy= | ||
Line 146: | Line 151: | ||
{{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | ||
}} | }} | ||
− | }} | + | }}</onlyinclude> |
− | </onlyinclude> |
Latest revision as of 01:46, 20 April 2017
Usage
Example usage:
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
For parameters, you can use the actual value (use "veryWidespread") or numeric values where:
exploitability: 1=easy, 2=average, 3=difficult prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon detectability: 1=easy, 2=average, 3=difficult impact: 1=severe, 2=common, 3=minor
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability AVERAGE |
Prevalence VERY WIDESPREAD |
Detectability EASY |
Impact MODERATE |
Application / Business Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
Ausnutzbarkeit DURCHSCHNITTLICH |
Verbreitung AUSSERGEWÖHNLICH HÄUFIG |
Auffindbarkeit EINFACH |
Auswirkung MITTEL |
Application / Business Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
DURCHSCHNITTLICH | AUSSERGEWÖHNLICH HÄUFIG | EINFACH | MITTEL | Application / Business Specific |