This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Top 10 2010 Developer Edition De:SummaryTableHeaderBeginTemplate"

From OWASP
Jump to: navigation, search
m
Line 9: Line 9:
 
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th>
 
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th>
 
</tr>
 
</tr>
<nonclude>
+
<noinclude>
 
<tr style="background-color: #4F81Bd; color: #FFFFFF;">
 
<tr style="background-color: #4F81Bd; color: #FFFFFF;">
 
     <th width="16.5%"> {{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}</th>
 
     <th width="16.5%"> {{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}</th>
Line 17: Line 17:
 
     <th width="16.5%"> {{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}</th>
 
     <th width="16.5%"> {{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}</th>
 
</tr>
 
</tr>
</nonclude>
+
</noinclude>
 
<tr>
 
<tr>
 
     <td style="background-color: #D9D9D9; color: #000000;"> ______</td>
 
     <td style="background-color: #D9D9D9; color: #000000;"> ______</td>

Revision as of 13:52, 18 March 2013

[[ERROR in the 'Language File' (Use of unknown Object 'threatAgents.jpg')|center|Threat Agents]] [[ERROR in the 'Language File' (Use of unknown Object 'attackVectors.jpg')|center|Attack Vectors]] [[ERROR in the 'Language File' (Use of unknown Object 'securityWeakness.jpg')|center|Security Weakness]] [[ERROR in the 'Language File' (Use of unknown Object 'technicalImpacts.jpg')|center|Technical Impacts]] [[ERROR in the 'Language File' (Use of unknown Object 'businessImpacts.jpg')|center|Business Impacts]]
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
______