This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010:SummaryTableHeaderBeginTemplate"
From OWASP
(added '#switch: {{{type}}} | thumbnail = <!-- thumbnails -->') |
(added Description with examples, independant style for thumbnails) |
||
Line 1: | Line 1: | ||
− | < | + | <!---------------------------------------------------------------> |
− | < | + | <!-- Template:Top_10_2010:SummaryTableHeaderBeginTemplate ---> |
− | + | <!---------------------------------------------------------------> | |
− | + | ==='''Usage:''' === | |
+ | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no thumbnail ---> | ||
+ | ... | ||
+ | {{Top_10_2010:SummaryTableEndTemplate|year=2013}}</nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | ||
− | < | + | {{Top_10_2010:SummaryTableEndTemplate}} |
+ | <br/> | ||
+ | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2010, no thumbnail ---> | ||
+ | ... | ||
+ | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate}} | ||
+ | |||
+ | {{Top_10_2010:SummaryTableEndTemplate}} | ||
+ | <br/> | ||
+ | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de}} <!-- default: style->year=2010, no thumbnail ---> | ||
+ | ... | ||
+ | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de}} | ||
+ | |||
+ | {{Top_10_2010:SummaryTableEndTemplate}} | ||
+ | <br/> | ||
+ | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=thumbnail|language=de}} <!-- default: style->year=2010 ---> | ||
+ | ... | ||
+ | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=thumbnail|language=de}} | ||
+ | |||
+ | {{Top_10_2010:SummaryTableEndTemplate}} | ||
+ | <br/> | ||
+ | <onlyinclude><center> | ||
{{#switch: {{{type}}} | {{#switch: {{{type}}} | ||
− | | thumbnail = <!-- thumbnails --> | + | | thumbnail = <!-- thumbnails ---> |
− | + | <table style="align:center; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid {{Top_10:BorderColor|year={{{year}}} }}; background-color:{{Top_10:BackgroundColor|year={{{year}}} }}; padding=2;"> | |
− | + | ||
− | + | <tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; color: #FFFFFF;"> | |
− | + | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th> | |
− | + | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> | |
− | | #default = <!-- text --> | + | <th width="33%" colspan="2" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th> |
+ | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=technicalImpacts|language={{{language}}} }}]]</th> | ||
+ | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th> | ||
+ | | #default = <!-- text ---> | ||
+ | <table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444;}}; background-color: {{Top 10:BackgroundColor|year={{{year}}} }}; padding=2;"> | ||
+ | <tr style="background-color: {{Top 10:BorderColor|year={{{year}}} }}; border: 3px solid #444444; height: 2em; font-size: 130%; color: #FFFFFF; text-shadow: 2px 2px 8px #000000; "> | ||
<th width="16.5%" style="border: 3px solid #444444;"> {{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}</th> | <th width="16.5%" style="border: 3px solid #444444;"> {{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}</th> | ||
<th width="16.5%" style="border: 3px solid #444444;"> {{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}</th> | <th width="16.5%" style="border: 3px solid #444444;"> {{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}</th> | ||
Line 22: | Line 54: | ||
<tr> | <tr> | ||
<td style="font-size: 130%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444"> ? </td> | <td style="font-size: 130%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444"> ? </td> | ||
+ | </onlyinclude> |
Revision as of 12:18, 14 April 2013
Usage:
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no thumbnail ---> ... {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2010, no thumbnail ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de}} <!-- default: style->year=2010, no thumbnail ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=thumbnail|language=de}} <!-- default: style->year=2010 ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
? |