Template:Top 10 2010:SummaryTableHeaderBeginTemplate

From OWASP
Revision as of 16:28, 23 April 2013 by T.Gigler (Talk | contribs)

Jump to: navigation, search

Usage:

English, style of 2013
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}  <!-- default: language = English, no image --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific


German, style of 2013
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}} <!-- language = de (German), default: no image --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquelle Angriffsvektor Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Application Specific


English, style of 2013, with images
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013}} 
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Threat Agents
Attack Vectors
Security Weakness
Technical Impacts
Business Impacts
Application Specific


German, style of 2013, with images
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2013}} 
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquelle
Angriffsvektor
Schwachstellen
Technische Auswirkung
Auswirkung auf das Unternehmen
Application Specific


German, style of 2010, with images
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2010 --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}

English, style of 2010, with images
{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images}} ... {{Top_10_2010:SummaryTableEndTemplate}}
Bedrohungsquelle
Angriffsvektor
Schwachstellen
Technische Auswirkung
Auswirkung auf das Unternehmen
Application Specific
Threat Agents
Attack Vectors
Security Weakness
Technical Impacts
Business Impacts
Application Specific



English, style of 2010 (default)
 {{Top_10_2010:SummaryTableHeaderBeginTemplate}}  <!-- default: language = English, style->year=2010, no image --->
 ...
 {{Top_10_2010:SummaryTableEndTemplate}}


Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
 ?