This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Top 10:SummaryTableTemplate"

From OWASP
Jump to: navigation, search
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
==Usage==
 
==Usage==
 +
Example usage:
 
   <nowiki>
 
   <nowiki>
 
  {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 
  {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
Line 6: Line 7:
 
  {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
  {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
  </nowiki>
 
  </nowiki>
 +
 +
For parameters, you can use the actual value (use "veryWidespread") or numeric values where:
 +
  exploitability: 1=easy, 2=average, 3=difficult
 +
  prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon
 +
  detectability: 1=easy, 2=average, 3=difficult
 +
  impact: 1=severe, 2=common, 3=minor
  
 
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
Line 42: Line 49:
 
<br/>
 
<br/>
 
<br/>
 
<br/>
<onlyinclude>
+
<onlyinclude> {{#switch: {{{type}}}
{{#switch: {{{type}}}
 
 
   | valueOnly =  
 
   | valueOnly =  
 
     {{#switch: {{{exploitability}}}
 
     {{#switch: {{{exploitability}}}
Line 95: Line 101:
 
         {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
         {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
     }}
 
     }}
   | #default =
+
   | #default = {{#switch: {{{exploitability}}}
    {{#switch: {{{exploitability}}}
 
 
       |1
 
       |1
 
       |easy=
 
       |easy=
Line 146: Line 151:
 
         {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
         {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
     }}
 
     }}
}}
+
}}</onlyinclude>
</onlyinclude>
 

Latest revision as of 01:46, 20 April 2017

Usage

Example usage:

 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 

For parameters, you can use the actual value (use "veryWidespread") or numeric values where:

 exploitability: 1=easy, 2=average, 3=difficult
 prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon
 detectability: 1=easy, 2=average, 3=difficult
 impact: 1=severe, 2=common, 3=minor
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
AVERAGE
Prevalence
VERY WIDESPREAD
Detectability
EASY
Impact
MODERATE
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
Ausnutzbarkeit
DURCHSCHNITTLICH
Verbreitung
AUSSERGEWÖHNLICH HÄUFIG
Auffindbarkeit
EINFACH
Auswirkung
MITTEL
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
DURCHSCHNITTLICH AUSSERGEWÖHNLICH HÄUFIG EINFACH MITTEL Application / Business Specific