This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010:SummaryTableHeaderBeginTemplate"
From OWASP
m (try to get realtive size for images: width="14.75%" respectively width="29,5%") |
(English images and 2013 style for Images) |
||
Line 19: | Line 19: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
<br/> | <br/> | ||
+ | |||
+ | ;English, style of 2013, with images | ||
+ | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}} | ||
+ | ... | ||
+ | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}} | ||
+ | |||
+ | {{Top_10_2010:SummaryTableEndTemplate}} | ||
+ | <br/> | ||
+ | |||
;German, style of 2013, with images | ;German, style of 2013, with images | ||
<nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}} | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}} | ||
Line 33: | Line 43: | ||
{{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} | ||
+ | |||
+ | <br/> | ||
+ | ;English, style of 2010, with images | ||
+ | <nowiki>{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images}} | ||
+ | ... | ||
+ | {{Top_10_2010:SummaryTableEndTemplate}}</nowiki> | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images}} | ||
+ | |||
+ | {{Top_10_2010:SummaryTableEndTemplate}} | ||
+ | <br/> | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
Line 43: | Line 63: | ||
<onlyinclude><center> | <onlyinclude><center> | ||
{{#switch: {{{type}}} | {{#switch: {{{type}}} | ||
− | | | + | | graphic |
| images = <!-- images ---> | | images = <!-- images ---> | ||
− | <table style="align:center; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid | + | <table style="align:center; {{#switch: {{{year}}} |2013=border-collapse: collapse;}} text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444; background-color:{{Top_10:BackgroundColor|year={{{year}}} }}; padding=2;"> |
− | <tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; color: #FFFFFF;"> | + | <tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; {{#switch: {{{year}}}|2013=border: 3px solid #444444; height: 2em;}} color: #FFFFFF;"> |
<th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgentsImage|language={{{language}}}|year={{{year}}} }}|width="14.75%"|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th> | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgentsImage|language={{{language}}}|year={{{year}}} }}|width="14.75%"|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th> | ||
<th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectorsImage|language={{{language}}}|year={{{year}}} }}|width="14.75%"|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> | <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectorsImage|language={{{language}}}|year={{{year}}} }}|width="14.75%"|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th> |
Revision as of 21:02, 23 April 2013
Usage:
- English, style of 2013
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} <!-- default: language = English, no image ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific |
- German, style of 2013
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} <!-- language = de (German), default: no image ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquellen | Angriffsvektoren | Schwachstellen | Technische Auswirkung | Auswirkung auf das Unternehmen | |
---|---|---|---|---|---|
Anwendungs- spezifisch |
- English, style of 2013, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}} ... {{Top_10_2010:SummaryTableEndTemplate}}
Application Specific |
- German, style of 2013, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}} ... {{Top_10_2010:SummaryTableEndTemplate}}
Anwendungs- spezifisch |
- German, style of 2010, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2010 ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Anwendungs- spezifisch |
Application Specific |
- English, style of 2010 (default)
{{Top_10_2010:SummaryTableHeaderBeginTemplate}} <!-- default: language = English, style->year=2010, no image ---> ... {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
? |