This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010:SubsectionAdvancedTemplate"
From OWASP
(added subsections: isTheApplicationVulnerable, howToPrevent, exampleAttackScenarios) |
(updated exampleScenarios) |
||
Line 13: | Line 13: | ||
| <nowiki>|type={{Top_10_2010:StyleTemplate}}</nowiki> || <nowiki> <!--- => box ---> </nowiki> | | <nowiki>|type={{Top_10_2010:StyleTemplate}}</nowiki> || <nowiki> <!--- => box ---> </nowiki> | ||
|- | |- | ||
− | | <nowiki>|subsection=<defOp|exampleAttackScenarios|example|freetext|howPrevent|howToPrevent|references|userImpact|isTheApplicationVulnerable|vulnerableTo></nowiki> || | + | | <nowiki>|subsection=<defOp|exampleAttackScenarios|exampleScenarios|example|freetext|howPrevent|howToPrevent|references|userImpact|isTheApplicationVulnerable|vulnerableTo></nowiki> || |
|- | |- | ||
| <nowiki>|title=your title</nowiki> || <nowiki> <!--- additional parameter for subsection=freetext or defOp (for the number) ---> </nowiki> | | <nowiki>|title=your title</nowiki> || <nowiki> <!--- additional parameter for subsection=freetext or defOp (for the number) ---> </nowiki> | ||
Line 65: | Line 65: | ||
2nd box | 2nd box | ||
− | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection= | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=exampleScenarios|position=left|risk=1|year=2017}} |
3rd box | 3rd box | ||
Line 257: | Line 257: | ||
{{#switch: {{{subsection}}} | {{#switch: {{{subsection}}} | ||
| freetext= {{{title}}} | | freetext= {{{title}}} | ||
− | | | + | | exampleScenarios |
+ | | exampleAttackScenarios | ||
| example= {{Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }} | | example= {{Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }} | ||
| isTheApplicationVulnerable= {{Top_10:LanguageFile|text=isTheApplicationVulnerable|language={{{language}}} }} | | isTheApplicationVulnerable= {{Top_10:LanguageFile|text=isTheApplicationVulnerable|language={{{language}}} }} |
Latest revision as of 22:50, 14 December 2017
Usage:
- Start Table
- {{Top_10:SubsectionTableBeginTemplate|type=main}} <!--- in the main page --->
- {{Top_10:SubsectionTableBeginTemplate|type=headertab}} <!--- in the languages part, like JAVA --->
- hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element
{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate |type={{Top_10_2010:StyleTemplate}} <!--- => box ---> |subsection=<defOp|exampleAttackScenarios|exampleScenarios|example|freetext|howPrevent|howToPrevent|references|userImpact|isTheApplicationVulnerable|vulnerableTo> |title=your title <!--- additional parameter for subsection=freetext or defOp (for the number) ---> |position=<firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight> |risk=<1-10|11> <!--- additional parameter for subsection=<defOp|example|howPrevent|vulnerableTo>: according to Template:Top_10_2010:ByTheNumbers ---> |year=<2010|2013> <!--- changes year of the Top-10-Version for subsection=<defOp|example|howPrevent|vulnerableTo> ---> |language=de <!--- additional parameter for all subsection-tags without fulltext ---> according to Template:Top 10:LanguageFile ---> }} outdatet: |number=<1|2|3|4|left|right|whole> <!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer --->
- 3. End Table
- {{Top_10:SubsectionTableEndTemplate}} <!--- in the main page --->
- {{Top_10_2010:BottomAdvancedTemplate <!--- end of the page --->
- |type={{Top_10_2010:StyleTemplate}}
- |useprev=PrevLink_Germany_Projekte
- |prev=Top_10_fuer_Entwickler
- |usenext=NextLink_Germany_Projekte
- |next=Top_10_fuer_Entwickler/Die Top-10-Risiken
- }}
Example:
- {{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate
- |type={{Top_10_2010:StyleTemplate}}
- |subsection=vulnerableTo
- |position=firstLeft
- |risk=1
- |year=2013
- |language=de
- }}
- 1st box
- {{Top_10:SubsectionTableEndTemplate}}
English New Syntax 2017
Is the Application Vulnerable?
1st box |
How to Prevent
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
Defending Option 1 against 'Injection':
5th box (big box) |
English New Syntax 2013
Am I Vulnerable To 'Injection'?
1st box |
How Do I Prevent 'Injection'?
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
Defending Option 1 against 'Injection':
5th box (big box) |
English old Syntax 2013
Am I Vulnerable To 'Injection'?
1st box |
How Do I Prevent 'Injection'?
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
English Old Syntax 2010
Am I Vulnerable To 'Injection'?
1st box |
How Do I Prevent 'Injection'?
2nd box |
Example Attack Scenarios
3rd box |
References
4th box |
German 2013
Bin ich durch 'Injection' verwundbar?
1st box |
Wie kann ich 'Injection' verhindern?
2nd box |
Mögliche Angriffsszenarien
3rd box |
Referenzen
4th box |
Verteidigungs-Option 1 gegen 'Injection':
5th box (big box) |
German 2010
Bin ich durch 'Injection' verwundbar?
1st box |
Wie kann ich 'Injection' verhindern?
2nd box |
Mögliche Angriffsszenarien
3rd box |
Referenzen
4th box |
Verteidigungs-Option 1 gegen 'Injection':
5th box (big box) |
Special 2013
Am I Vulnerable To 'Broken Authentication and Session Management'?
1st box |
How Do I Prevent 'Broken Authentication and Session Management'?
2nd box |
Example Attack Scenarios
3rd box |
Impact to the User
4th box |
Defending Option 1 against 'Broken Authentication and Session Management':
5th box (long box) |
Defending Option 2 against 'Broken Authentication and Session Management':
6th box |
References
7th box |