This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Top 10:SummaryTableTemplate"

From OWASP
Jump to: navigation, search
 
Line 12: Line 12:
 
   prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon
 
   prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon
 
   detectability: 1=easy, 2=average, 3=difficult
 
   detectability: 1=easy, 2=average, 3=difficult
   impact: 1=severe, 2=common, 3=moderate
+
   impact: 1=severe, 2=common, 3=minor
  
 
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}

Latest revision as of 01:46, 20 April 2017

Usage

Example usage:

 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 

For parameters, you can use the actual value (use "veryWidespread") or numeric values where:

 exploitability: 1=easy, 2=average, 3=difficult
 prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon
 detectability: 1=easy, 2=average, 3=difficult
 impact: 1=severe, 2=common, 3=minor
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
AVERAGE
Prevalence
VERY WIDESPREAD
Detectability
EASY
Impact
MODERATE
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
Ausnutzbarkeit
DURCHSCHNITTLICH
Verbreitung
AUSSERGEWÖHNLICH HÄUFIG
Auffindbarkeit
EINFACH
Auswirkung
MITTEL
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
DURCHSCHNITTLICH AUSSERGEWÖHNLICH HÄUFIG EINFACH MITTEL Application / Business Specific