This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010 Developer Edition De:SummaryTableHeaderBeginTemplate"
From OWASP
m |
|||
Line 9: | Line 9: | ||
<th width="16.5%"> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th> | <th width="16.5%"> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th> | ||
</tr> | </tr> | ||
− | < | + | <noinclude> |
<tr style="background-color: #4F81Bd; color: #FFFFFF;"> | <tr style="background-color: #4F81Bd; color: #FFFFFF;"> | ||
<th width="16.5%"> {{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}</th> | <th width="16.5%"> {{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}</th> | ||
Line 17: | Line 17: | ||
<th width="16.5%"> {{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}</th> | <th width="16.5%"> {{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}</th> | ||
</tr> | </tr> | ||
− | </ | + | </noinclude> |
<tr> | <tr> | ||
<td style="background-color: #D9D9D9; color: #000000;"> ______</td> | <td style="background-color: #D9D9D9; color: #000000;"> ______</td> |
Revision as of 13:52, 18 March 2013
[[ERROR in the 'Language File' (Use of unknown Object 'threatAgents.jpg')|center|Threat Agents]] | [[ERROR in the 'Language File' (Use of unknown Object 'attackVectors.jpg')|center|Attack Vectors]] | [[ERROR in the 'Language File' (Use of unknown Object 'securityWeakness.jpg')|center|Security Weakness]] | [[ERROR in the 'Language File' (Use of unknown Object 'technicalImpacts.jpg')|center|Technical Impacts]] | [[ERROR in the 'Language File' (Use of unknown Object 'businessImpacts.jpg')|center|Business Impacts]] | |
---|---|---|---|---|---|
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
______ |