This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10-2017:SummaryTableTemplate"
From OWASP
(Added Numbers: ': 1-3') |
(type=valueOnly: addes numbers ': <1-3>') |
||
Line 54: | Line 54: | ||
|3 | |3 | ||
|easy= | |easy= | ||
− | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=easy|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=easy|language={{{language}}} }}: 3|year={{{year}}}|style={{{style}}} }} |
|2 | |2 | ||
|average= | |average= | ||
− | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=average|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=average|language={{{language}}} }}: 2|year={{{year}}}|style={{{style}}} }} |
|1 | |1 | ||
|difficult= | |difficult= | ||
− | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=difficult|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=difficult|language={{{language}}} }}: 1|year={{{year}}}|style={{{style}}} }} |
}} | }} | ||
Line 66: | Line 66: | ||
|3 | |3 | ||
|widespread= | |widespread= | ||
− | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=widespread|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=widespread|language={{{language}}} }}: 3|year={{{year}}}|style={{{style}}} }} |
|2 | |2 | ||
|common= | |common= | ||
− | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=common|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=common|language={{{language}}} }}: 2|year={{{year}}}|style={{{style}}} }} |
|1 | |1 | ||
|uncommon= | |uncommon= | ||
− | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=uncommon|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=uncommon|language={{{language}}} }}: 1|year={{{year}}}|style={{{style}}} }} |
}} | }} | ||
Line 78: | Line 78: | ||
|3 | |3 | ||
|easy= | |easy= | ||
− | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=easy|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=easy|language={{{language}}} }}: 3|year={{{year}}}|style={{{style}}} }} |
|2 | |2 | ||
|average= | |average= | ||
− | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=average|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=average|language={{{language}}} }}: 2|year={{{year}}}|style={{{style}}} }} |
|1 | |1 | ||
|difficult= | |difficult= | ||
− | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=difficult|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=difficult|language={{{language}}} }}: 1|year={{{year}}}|style={{{style}}} }} |
}} | }} | ||
Line 90: | Line 90: | ||
|3 | |3 | ||
|severe= | |severe= | ||
− | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=severe|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-1-Template||{{Top_10:LanguageFile|text=severe|language={{{language}}} }}: 3|year={{{year}}}|style={{{style}}} }} |
|2 | |2 | ||
|common= | |common= | ||
− | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=moderate|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-2-Template||{{Top_10:LanguageFile|text=moderate|language={{{language}}} }}: 2|year={{{year}}}|style={{{style}}} }} |
|1 | |1 | ||
|minor= | |minor= | ||
− | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }} | + | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}: 1|year={{{year}}}|style={{{style}}} }} |
}} | }} | ||
| #default = {{#switch: {{{exploitability}}} | | #default = {{#switch: {{{exploitability}}} |
Revision as of 12:44, 22 December 2017
Usage
Example usage:
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017}} {{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} {{Top_10_2010:SummaryTableEndTemplate|year=2017}}
For parameters, you can use the actual value (e.g. use "widespread") or numeric values where:
exploitability: 3=easy, 2=average, 1=difficult prevalence: 3=widespread, 2=common, 1=uncommon detectability: 3=easy, 2=average, 1=difficult impact: 3=severe, 2=common, 1=minor
Threat Agents / Attack Vectors | Security Weakness | Impacts | |||
---|---|---|---|---|---|
App Specific | Exploitability: 2 |
Prevalence: 3 |
Detectability: 3 |
Technical: 2 |
Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} {{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} {{Top_10_2010:SummaryTableEndTemplate|year=2017}}
Bedrohungsquellen / Angriffsvektoren | Schwachstellen | Auswirkungen | |||
---|---|---|---|---|---|
Anw.- spezifisch |
Ausnutzbarkeit: 2 |
Verbreitung: 3 |
Auffindbarkeit: 3 |
technisch: 2 |
Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} {{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} {{Top_10_2010:SummaryTableEndTemplate|year=2017}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
DURCHSCHNITTLICH: 2 | SEHR HÄUFIG: 3 | EINFACH: 3 | MITTEL: 2 | Business ? |