This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Mobile Top 10 2016:ByTheNumbers"
From OWASP
(Created page with "<!---------------------------------------------------------------> <!-- Template:Mobile Top 10 2016:ByTheNumbers --> <!--------------------------------------...") |
m |
||
Line 13: | Line 13: | ||
|- | |- | ||
! style="min-width: 4%" |Number | ! style="min-width: 4%" |Number | ||
− | ! style="min-width: | + | ! style="min-width: 48%" |English 2016 |
− | ! style="min-width: | + | ! style="min-width: 48%" |German 2016 |
− | |||
− | |||
|- | |- | ||
| 1 | | 1 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|1}} | | {{Mobile_Top_10_2016:ByTheNumbers|1}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|1|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|1|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 2 | | 2 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|2}} | | {{Mobile_Top_10_2016:ByTheNumbers|2}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 3 | | 3 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|3}} | | {{Mobile_Top_10_2016:ByTheNumbers|3}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|3|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|3|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 4 | | 4 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|4}} | | {{Mobile_Top_10_2016:ByTheNumbers|4}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|4|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|4|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 5 | | 5 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|5}} | | {{Mobile_Top_10_2016:ByTheNumbers|5}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|5|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|5|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 6 | | 6 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|6}} | | {{Mobile_Top_10_2016:ByTheNumbers|6}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|6|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|6|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 7 | | 7 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|7}} | | {{Mobile_Top_10_2016:ByTheNumbers|7}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|7|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|7|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 8 | | 8 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|8}} | | {{Mobile_Top_10_2016:ByTheNumbers|8}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|8|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|8|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 9 | | 9 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|9}} | | {{Mobile_Top_10_2016:ByTheNumbers|9}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|9|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|9|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 10 | | 10 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|10}} | | {{Mobile_Top_10_2016:ByTheNumbers|10}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|10|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|10|language=de}} | ||
− | |||
− | |||
|- | |- | ||
| 11 | | 11 | ||
| {{Mobile_Top_10_2016:ByTheNumbers|11}} | | {{Mobile_Top_10_2016:ByTheNumbers|11}} | ||
| {{Mobile_Top_10_2016:ByTheNumbers|11|language=de}} | | {{Mobile_Top_10_2016:ByTheNumbers|11|language=de}} | ||
− | |||
− | |||
|} | |} | ||
Revision as of 07:52, 10 March 2016
Usage:
{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}
Example:
{{Mobile_Top_10_2016:ByTheNumbers|1|language=de|year=2016}} {{Mobile_Top_10_2016:ByTheNumbers|2|year=2016}} <!-- Default-Language = English ---> {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}} <!-- Default-Year = 2010 --->
Number | English 2016 | German 2016 |
---|---|---|
1 | Improper Platform Usage | Improper Platform Usage |
2 | Insecure Data Storage | Insecure Data Storage |
3 | Insecure Communication | Insecure Communication |
4 | Insecure Authentication | Insecure Authentication |
5 | Insufficient Cryptography | Insufficient Cryptography |
6 | Insecure Authorization | Insecure Authorization |
7 | Poor Code Quality | Poor Code Quality |
8 | Code Tampering | Code Tampering |
9 | Reverse Engineering | Reverse Engineering |
10 | Extraneous Functionality | Extraneous Functionality |
11 | In Progress | In Arbeit |