This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10-2017:SummaryTableTemplate"
From OWASP
(type=valueOnly: addes numbers ': <1-3>') |
m (Fixed last example to 2017 style) |
||
Line 37: | Line 37: | ||
<nowiki> | <nowiki> | ||
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} | ||
− | {{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | + | {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} |
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | ||
{{Top_10_2010:SummaryTableEndTemplate|year=2017}} | {{Top_10_2010:SummaryTableEndTemplate|year=2017}} | ||
</nowiki> | </nowiki> | ||
− | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year= | + | {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} |
{{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} | ||
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} |
Revision as of 00:00, 30 December 2017
Usage
Example usage:
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017}} {{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} {{Top_10_2010:SummaryTableEndTemplate|year=2017}}
For parameters, you can use the actual value (e.g. use "widespread") or numeric values where:
exploitability: 3=easy, 2=average, 1=difficult prevalence: 3=widespread, 2=common, 1=uncommon detectability: 3=easy, 2=average, 1=difficult impact: 3=severe, 2=common, 1=minor
Threat Agents / Attack Vectors | Security Weakness | Impacts | |||
---|---|---|---|---|---|
App Specific | Exploitability: 2 |
Prevalence: 3 |
Detectability: 3 |
Technical: 2 |
Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} {{Top_10-2017:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} {{Top_10_2010:SummaryTableEndTemplate|year=2017}}
Bedrohungsquellen / Angriffsvektoren | Schwachstellen | Auswirkungen | |||
---|---|---|---|---|---|
Anw.- spezifisch |
Ausnutzbarkeit: 2 |
Verbreitung: 3 |
Auffindbarkeit: 3 |
technisch: 2 |
Business ? |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2017}} {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=3|impact=2|year=2017|language=de}} {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} {{Top_10_2010:SummaryTableEndTemplate|year=2017}}
Bedrohungsquellen / Angriffsvektoren | Schwachstellen | Auswirkungen | |||
---|---|---|---|---|---|
Anw.- spezifisch |
DURCHSCHNITTLICH: 2 | SEHR HÄUFIG: 3 | EINFACH: 3 | MITTEL: 2 | Business ? |