Difference between revisions of "Template:Top 10 2010:SummaryTableHeaderBeginTemplate"

From OWASP
Jump to: navigation, search
m
m (prepared different thumbnails by the year)
Line 37: Line 37:
  
 
       <tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; color: #FFFFFF;">
 
       <tr style="background-color: {{Top_10:BorderColor|year={{{year}}} }}; color: #FFFFFF;">
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th>
+
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }}]]</th>
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th>
+
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th>
         <th width="33%" colspan="2" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th>
+
         <th width="33%" colspan="2" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th>
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=technicalImpacts|language={{{language}}} }}]]</th>
+
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=technicalImpacts|language={{{language}}} }}]]</th>
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th>
+
         <th width="16.5%" style="border: 3px solid #444444;> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}}|year={{{year}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th>
 
   | #default = <!-- text --->
 
   | #default = <!-- text --->
 
     <table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444; background-color: {{Top 10:BackgroundColor|year={{{year}}} }}; padding=2;">
 
     <table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444; background-color: {{Top 10:BackgroundColor|year={{{year}}} }}; padding=2;">

Revision as of 09:37, 14 April 2013

Usage:

 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}  <!-- default: language = English, no thumbnail --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific


 {{Top_10_2010:SummaryTableHeaderBeginTemplate}}  <!-- default: language = English, style->year=2010, no thumbnail --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific


 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de}} <!-- default: style->year=2010, no thumbnail --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquelle Angriffsvektor Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch


 {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=thumbnail|language=de}} <!-- default: style->year=2010 --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquelle Angriffsvektor Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch


Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
 ?