This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10:SummaryTableValues"
From OWASP
| Line 1: | Line 1: | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate}} | ||
| − | {{ | + | {{Top_10:SummaryTableValue|ease=DIFFICULT|title=Exploitability}} |
{{Top_10_2010:SummaryTableValue-{{{3}}}-Template|Prevalence |{{{4}}}}} | {{Top_10_2010:SummaryTableValue-{{{3}}}-Template|Prevalence |{{{4}}}}} | ||
{{Top_10_2010:SummaryTableValue-{{{5}}}-Template|Detectability |{{{6}}}}} | {{Top_10_2010:SummaryTableValue-{{{5}}}-Template|Detectability |{{{6}}}}} | ||
{{Top_10_2010:SummaryTableValue-{{{7}}}-Template|Impact |{{{8}}}}} | {{Top_10_2010:SummaryTableValue-{{{7}}}-Template|Impact |{{{8}}}}} | ||
{{Top_10_2010:SummaryTableHeaderEndTemplate}} | {{Top_10_2010:SummaryTableHeaderEndTemplate}} | ||
Revision as of 15:27, 17 February 2013
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| Application Specific | PLEASE DELETE ME {{Top_10_2010:SummaryTableValue-{{{3}}}-Template|Prevalence |{{{4}}}}} {{Top_10_2010:SummaryTableValue-{{{5}}}-Template|Detectability |{{{6}}}}} {{Top_10_2010:SummaryTableValue-{{{7}}}-Template|Impact |{{{8}}}}}Application / Business Specific | ||||