This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Template:Top 10 2010:SubsectionAdvancedTemplate

From OWASP
Revision as of 22:50, 14 December 2017 by T.Gigler (talk | contribs) (updated exampleScenarios)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Usage:

  1. Start Table
    • {{Top_10:SubsectionTableBeginTemplate|type=main}} <!--- in the main page --->
    • {{Top_10:SubsectionTableBeginTemplate|type=headertab}} <!--- in the languages part, like JAVA --->
  2. hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element
{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate  
  |type={{Top_10_2010:StyleTemplate}} <!--- => box --->
  |subsection=<defOp|exampleAttackScenarios|exampleScenarios|example|freetext|howPrevent|howToPrevent|references|userImpact|isTheApplicationVulnerable|vulnerableTo>  
  |title=your title <!--- additional parameter for subsection=freetext or defOp (for the number) --->
  |position=<firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight>  
  |risk=<1-10|11> <!--- additional parameter for subsection=<defOp|example|howPrevent|vulnerableTo>:
  according to Template:Top_10_2010:ByTheNumbers --->
  |year=<2010|2013> <!--- changes year of the Top-10-Version for subsection=<defOp|example|howPrevent|vulnerableTo> --->
  |language=de <!--- additional parameter for all subsection-tags without fulltext --->
  according to Template:Top 10:LanguageFile --->
}}  
 outdatet:  
  |number=<1|2|3|4|left|right|whole> <!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer --->
3. End Table
  • {{Top_10:SubsectionTableEndTemplate}} <!--- in the main page --->
  • {{Top_10_2010:BottomAdvancedTemplate <!--- end of the page --->
|type={{Top_10_2010:StyleTemplate}}
|useprev=PrevLink_Germany_Projekte
|prev=Top_10_fuer_Entwickler
|usenext=NextLink_Germany_Projekte
|next=Top_10_fuer_Entwickler/Die Top-10-Risiken
}}


Example:

{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate
|type={{Top_10_2010:StyleTemplate}}
|subsection=vulnerableTo
|position=firstLeft
|risk=1
|year=2013
|language=de
}}
1st box
{{Top_10:SubsectionTableEndTemplate}}

English New Syntax 2017

Is the Application Vulnerable?

1st box

How to Prevent

2nd box

Example Attack Scenarios

3rd box

References

4th box

Defending Option 1 against 'Injection':

5th box (big box)


English New Syntax 2013

Am I Vulnerable To 'Injection'?

1st box

How Do I Prevent 'Injection'?

2nd box

Example Attack Scenarios

3rd box

References

4th box

Defending Option 1 against 'Injection':

5th box (big box)


English old Syntax 2013

Am I Vulnerable To 'Injection'?

1st box

How Do I Prevent 'Injection'?

2nd box

Example Attack Scenarios

3rd box

References

4th box


English Old Syntax 2010

Am I Vulnerable To 'Injection'?

1st box

How Do I Prevent 'Injection'?

2nd box

Example Attack Scenarios

3rd box

References

4th box


German 2013

Bin ich durch 'Injection' verwundbar?

1st box

Wie kann ich 'Injection' verhindern?

2nd box

Mögliche Angriffsszenarien

3rd box

Referenzen

4th box

Verteidigungs-Option 1 gegen 'Injection':

5th box (big box)


German 2010

Bin ich durch 'Injection' verwundbar?

1st box

Wie kann ich 'Injection' verhindern?

2nd box

Mögliche Angriffsszenarien

3rd box

Referenzen

4th box

Verteidigungs-Option 1 gegen 'Injection':

5th box (big box)


Special 2013

Am I Vulnerable To 'Broken Authentication and Session Management'?

1st box

How Do I Prevent 'Broken Authentication and Session Management'?

2nd box

Example Attack Scenarios

3rd box

Impact to the User

4th box

Defending Option 1 against 'Broken Authentication and Session Management':

5th box (long box)

Defending Option 2 against 'Broken Authentication and Session Management':

6th box

References

7th box