This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010:SummaryTableHeaderBeginTemplate"
From OWASP
m (only in 2013: style="border: 3px solid #444444;") |
m (updated 'Usage') |
||
| Line 10: | Line 10: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
| + | <br/> | ||
<br/> | <br/> | ||
;German, style of 2013 | ;German, style of 2013 | ||
| Line 19: | Line 20: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
<br/> | <br/> | ||
| − | + | <br/> | |
;English, style of 2013, with images | ;English, style of 2013, with images | ||
<nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}} | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}} | ||
| Line 28: | Line 29: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
<br/> | <br/> | ||
| − | + | <br/> | |
;German, style of 2013, with images | ;German, style of 2013, with images | ||
<nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}} | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}} | ||
| Line 37: | Line 38: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
<br/> | <br/> | ||
| − | + | <br/> | |
;German, style of 2010, with images | ;German, style of 2010, with images | ||
<nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2010 ---> | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2010 ---> | ||
| Line 44: | Line 45: | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} | ||
| + | {{Top_10_2010:SummaryTableEndTemplate}} | ||
| + | <br/> | ||
<br/> | <br/> | ||
;English, style of 2010, with images | ;English, style of 2010, with images | ||
| Line 53: | Line 56: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
<br/> | <br/> | ||
| − | |||
| − | |||
<br/> | <br/> | ||
;English, style of 2010 (default) | ;English, style of 2010 (default) | ||
| Line 60: | Line 61: | ||
... | ... | ||
{{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
| − | |||
<onlyinclude><center> | <onlyinclude><center> | ||
{{#switch: {{{type}}} | {{#switch: {{{type}}} | ||
Revision as of 21:47, 23 April 2013
Usage:
- English, style of 2013
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no image --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| Application Specific | |||||
- German, style of 2013
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} <!-- language = de (German), default: no image --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
|---|---|---|---|---|---|
|
Anwendungs- spezifisch |
|||||
- English, style of 2013, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}}
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Application Specific | |||||
- German, style of 2013, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}}
...
{{Top_10_2010:SummaryTableEndTemplate}}
|
Anwendungs- spezifisch |
|||||
- German, style of 2010, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2010 --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
|
Anwendungs- spezifisch |
|||||
- English, style of 2010, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images}}
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Application Specific | |||||
- English, style of 2010 (default)
{{Top_10_2010:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2010, no image --->
...
{{Top_10_2010:SummaryTableEndTemplate}}
| Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
|---|---|---|---|---|---|
| ? | |||||









