This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Template:Top 10:SummaryTableTemplate

From OWASP
Revision as of 01:46, 20 April 2017 by Neil Smithline (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Usage

Example usage:

 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 

For parameters, you can use the actual value (use "veryWidespread") or numeric values where:

 exploitability: 1=easy, 2=average, 3=difficult
 prevalence: 0=very widespread, 1=widespread, 2=common, 3=uncommon
 detectability: 1=easy, 2=average, 3=difficult
 impact: 1=severe, 2=common, 3=minor
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
AVERAGE
Prevalence
VERY WIDESPREAD
Detectability
EASY
Impact
MODERATE
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
Ausnutzbarkeit
DURCHSCHNITTLICH
Verbreitung
AUSSERGEWÖHNLICH HÄUFIG
Auffindbarkeit
EINFACH
Auswirkung
MITTEL
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
DURCHSCHNITTLICH AUSSERGEWÖHNLICH HÄUFIG EINFACH MITTEL Application / Business Specific