This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Mobile Top 10 2016:SummaryTableHeaderBeginTemplate"
From OWASP
m |
m |
||
Line 16: | Line 16: | ||
... | ... | ||
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | {{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | ||
− | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year= | + | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}} |
{{Mobile_Top_10_2016:SummaryTableEndTemplate}} | {{Mobile_Top_10_2016:SummaryTableEndTemplate}} | ||
Line 25: | Line 25: | ||
... | ... | ||
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | {{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | ||
− | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year= | + | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year=2016}} |
{{Mobile_Top_10_2016:SummaryTableEndTemplate}} | {{Mobile_Top_10_2016:SummaryTableEndTemplate}} | ||
Line 34: | Line 34: | ||
... | ... | ||
{{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | {{Mobile_Top_10_2016:SummaryTableEndTemplate}}</nowiki> | ||
− | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year= | + | {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2016}} |
{{Mobile_Top_10_2016:SummaryTableEndTemplate}} | {{Mobile_Top_10_2016:SummaryTableEndTemplate}} |
Latest revision as of 06:50, 10 March 2016
Usage:
- English, style of 2016
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016}} <!-- default: language = English, no image ---> ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |
- German, style of 2016
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}} <!-- language = de (German), default: no image ---> ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Bedrohungsquelle | Angriffsvektor | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
- English, style of 2016, with images
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year=2016}} ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Application Specific |
- German, style of 2016, with images
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2016}} ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Anwendungs- spezifisch |
- German, style of 2016, with images
{{Mobile_Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2016 ---> ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Anwendungs- spezifisch |
- English, style of 2016, with images
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images}} ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Application Specific |
- English, style of 2016 (default)
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2016, no image ---> ... {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |