Difference between revisions of "Template:Top 10:SummaryTableTemplate"

From OWASP
Jump to: navigation, search
m (Undo revision 149998 by T.Gigler (talk))
m (deleted some <cr>s)
 
Line 42: Line 42:
 
<br/>
 
<br/>
 
<br/>
 
<br/>
<onlyinclude>
+
<onlyinclude> {{#switch: {{{type}}}
{{#switch: {{{type}}}
+
 
   | valueOnly =  
 
   | valueOnly =  
 
     {{#switch: {{{exploitability}}}
 
     {{#switch: {{{exploitability}}}
Line 95: Line 94:
 
         {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
         {{Top_10_2010:SummaryTableValue-3-Template||{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
     }}
 
     }}
   | #default =
+
   | #default = {{#switch: {{{exploitability}}}
    {{#switch: {{{exploitability}}}
+
 
       |1
 
       |1
 
       |easy=
 
       |easy=
Line 146: Line 144:
 
         {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
         {{Top_10_2010:SummaryTableValue-3-Template|{{Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}
 
     }}
 
     }}
}}
+
}}</onlyinclude>
</onlyinclude>
+

Latest revision as of 09:11, 9 June 2013

Usage

 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
AVERAGE
Prevalence
VERY WIDESPREAD
Detectability
EASY
Impact
MODERATE
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquelle Angriffsvektor Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Application Specific Ausnutzbarkeit
DURCHSCHNITTLICH
Verbreitung
AUSSERGEWÖHNLICH HÄUFIG
Auffindbarkeit
EINFACH
Auswirkung
MITTEL
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquelle Angriffsvektor Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Application Specific DURCHSCHNITTLICH AUSSERGEWÖHNLICH HÄUFIG EINFACH MITTEL Application / Business Specific