This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Mobile Top 10 2016:SummaryTableHeaderBeginTemplate"
From OWASP
m |
m |
||
| Line 16: | Line 16: | ||
... | ... | ||
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | {{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | ||
| − | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year= | + | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}} |
{{Mobile_Top_10_2016:SummaryTableEndTemplate}} | {{Mobile_Top_10_2016:SummaryTableEndTemplate}} | ||
| Line 25: | Line 25: | ||
... | ... | ||
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | {{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | ||
| − | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year= | + | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year=2016}} |
{{Mobile_Top_10_2016:SummaryTableEndTemplate}} | {{Mobile_Top_10_2016:SummaryTableEndTemplate}} | ||
| Line 34: | Line 34: | ||
... | ... | ||
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | {{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | ||
| − | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year= | + | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2016}} |
{{Mobile_Top_10_2016:SummaryTableEndTemplate}} | {{Mobile_Top_10_2016:SummaryTableEndTemplate}} | ||
Latest revision as of 06:50, 10 March 2016
Usage:
- English, style of 2016
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016}} <!-- default: language = English, no image --->
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| Application Specific | |||||
- German, style of 2016
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}} <!-- language = de (German), default: no image --->
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
| Bedrohungsquelle | Angriffsvektor | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
|---|---|---|---|---|---|
|
Anwendungs- spezifisch |
|||||
- English, style of 2016, with images
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year=2016}}
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
| Application Specific | |||||
- German, style of 2016, with images
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2016}}
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
|
Anwendungs- spezifisch |
|||||
- German, style of 2016, with images
{{Mobile_Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2016 --->
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
|
Anwendungs- spezifisch |
|||||
- English, style of 2016, with images
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images}}
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
| Application Specific | |||||
- English, style of 2016 (default)
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2016, no image --->
...
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| Application Specific | |||||









