This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010:SummaryTableHeaderBeginTemplate"
From OWASP
m (enhanced Documentation) |
m |
||
| Line 6: | Line 6: | ||
<nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no thumbnail ---> | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no thumbnail ---> | ||
... | ... | ||
| − | {{Top_10_2010:SummaryTableEndTemplate | + | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | ||
Revision as of 16:30, 14 April 2013
Usage:
- English, style of 2013
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no thumbnail --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| Application Specific | |||||
- German, style of 2013
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} <!-- language = de (German), default: no thumbnail --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
|---|---|---|---|---|---|
|
Anwendungs- spezifisch |
|||||
- German, style of 2010, with thumbnails
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=thumbnail|language=de}} <!-- default: style->year=2010 --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
|---|---|---|---|---|---|
|
Anwendungs- spezifisch |
|||||
- English, style of 2010 (default)
{{Top_10_2010:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2010, no thumbnail --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| ? | |||||