This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10-2017:SummaryTableTemplate"
From OWASP
m (Fixed last example to 2017 style) |
(shortened default output to style of Top10-2017 , added 'type=full' => full style) |
||
| Line 44: | Line 44: | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} | ||
{{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | ||
| + | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | ||
| + | {{Top_10_2010:SummaryTableEndTemplate|year=2017}} | ||
| + | <br/> | ||
| + | <br/> | ||
| + | <br/> | ||
| + | <nowiki> | ||
| + | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} | ||
| + | {{Top_10-2017:SummaryTableTemplate|type=full|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | ||
| + | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | ||
| + | {{Top_10_2010:SummaryTableEndTemplate|year=2017}} | ||
| + | </nowiki> | ||
| + | |||
| + | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} | ||
| + | {{Top_10-2017:SummaryTableTemplate|type=full|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | ||
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | ||
{{Top_10_2010:SummaryTableEndTemplate|year=2017}} | {{Top_10_2010:SummaryTableEndTemplate|year=2017}} | ||
| Line 98: | Line 112: | ||
{{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}: 1|year={{{year}}}|style={{{style}}} }} | {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}: 1|year={{{year}}}|style={{{style}}} }} | ||
}} | }} | ||
| − | | | + | | full = |
| + | {{#switch: {{{exploitability}}} | ||
|3 | |3 | ||
|easy= | |easy= | ||
| Line 144: | Line 159: | ||
|minor= | |minor= | ||
{{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}:1|year={{{year}}}|style={{{style}}} }} | {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}:1|year={{{year}}}|style={{{style}}} }} | ||
| + | }} | ||
| + | | #default = | ||
| + | {{#switch: {{{exploitability}}} | ||
| + | |3 | ||
| + | |easy= | ||
| + | {{Top_10_2010:SummaryTableValue-1-Template|{{Top_10:LanguageFile|text=exploitability|language={{{language}}} }}: 3| |year={{{year}}}|style={{{style}}} }} | ||
| + | |2 | ||
| + | |average= | ||
| + | {{Top_10_2010:SummaryTableValue-2-Template|{{Top_10:LanguageFile|text=exploitability|language={{{language}}} }}: 2| |year={{{year}}}|style={{{style}}} }} | ||
| + | |1 | ||
| + | |difficult= | ||
| + | {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=exploitability|language={{{language}}} }}: 1| |year={{{year}}}|style={{{style}}} }} | ||
| + | }} | ||
| + | |||
| + | {{#switch: {{{prevalence}}} | ||
| + | |3 | ||
| + | |widespread= | ||
| + | {{Top_10_2010:SummaryTableValue-1-Template|{{Top_10:LanguageFile|text=prevalence|language={{{language}}} }}: 3| |year={{{year}}}|style={{{style}}} }} | ||
| + | |2 | ||
| + | |common= | ||
| + | {{Top_10_2010:SummaryTableValue-2-Template|{{Top_10:LanguageFile|text=prevalence|language={{{language}}} }}: 2| |year={{{year}}}|style={{{style}}} }} | ||
| + | |1 | ||
| + | |uncommon= | ||
| + | {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=prevalence|language={{{language}}} }}: 1| |year={{{year}}}|style={{{style}}} }} | ||
| + | }} | ||
| + | |||
| + | {{#switch: {{{detectability}}} | ||
| + | |3 | ||
| + | |easy= | ||
| + | {{Top_10_2010:SummaryTableValue-1-Template|{{Top_10:LanguageFile|text=detectability|language={{{language}}} }}: 3| |year={{{year}}}|style={{{style}}} }} | ||
| + | |2 | ||
| + | |average= | ||
| + | {{Top_10_2010:SummaryTableValue-2-Template|{{Top_10:LanguageFile|text=detectability|language={{{language}}} }}: 2| |year={{{year}}}|style={{{style}}} }} | ||
| + | |1 | ||
| + | |difficult= | ||
| + | {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=detectability|language={{{language}}} }}: 1| |year={{{year}}}|style={{{style}}} }} | ||
| + | }} | ||
| + | |||
| + | {{#switch: {{{impact}}} | ||
| + | |3 | ||
| + | |severe= | ||
| + | {{Top_10_2010:SummaryTableValue-1-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}: 3| |year={{{year}}}|style={{{style}}} }} | ||
| + | |2 | ||
| + | |common= | ||
| + | {{Top_10_2010:SummaryTableValue-2-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}: 2| |year={{{year}}}|style={{{style}}} }} | ||
| + | |1 | ||
| + | |minor= | ||
| + | {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}:1| |year={{{year}}}|style={{{style}}} }} | ||
}} | }} | ||
}}</onlyinclude> | }}</onlyinclude> | ||
Revision as of 00:14, 30 December 2017
Usage
Example usage:
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017}}
{{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017}}
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}
For parameters, you can use the actual value (e.g. use "widespread") or numeric values where:
exploitability: 3=easy, 2=average, 1=difficult prevalence: 3=widespread, 2=common, 1=uncommon detectability: 3=easy, 2=average, 1=difficult impact: 3=severe, 2=common, 1=minor
| Threat Agents / Attack Vectors | Security Weakness | Impacts | |||
|---|---|---|---|---|---|
| App Specific | Exploitability: 2 |
Prevalence: 3 |
Detectability: 3 |
Technical: 2 |
Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}}
{{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}}
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}
| Bedrohungsquellen / Angriffsvektoren | Schwachstellen | Auswirkungen | |||
|---|---|---|---|---|---|
|
Anw.- spezifisch |
Ausnutzbarkeit: 2 |
Verbreitung: 3 |
Auffindbarkeit: 3 |
technisch: 2 |
Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}}
{{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}}
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}
| Bedrohungsquellen / Angriffsvektoren | Schwachstellen | Auswirkungen | |||
|---|---|---|---|---|---|
|
Anw.- spezifisch |
DURCHSCHNITTLICH: 2 | SEHR HÄUFIG: 3 | EINFACH: 3 | MITTEL: 2 | Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}}
{{Top_10-2017:SummaryTableTemplate|type=full|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}}
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}
| Bedrohungsquellen / Angriffsvektoren | Schwachstellen | Auswirkungen | |||
|---|---|---|---|---|---|
|
Anw.- spezifisch |
Ausnutzbarkeit DURCHSCHNITTLICH: 2 |
Verbreitung SEHR HÄUFIG: 3 |
Auffindbarkeit EINFACH: 3 |
technisch MITTEL: 2 |
Business ? |