Difference between revisions of "Template:Top 10 2010 Developer Edition De:SummaryTableHeaderBeginTemplate"

From OWASP
Jump to: navigation, search
m
m
Line 3: Line 3:
  
 
<tr style="background-color: #4F81Bd; color: #FFFFFF;">
 
<tr style="background-color: #4F81Bd; color: #FFFFFF;">
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center]]</th>
+
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=threatAgents.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} }]]</th>
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center]]</th>
+
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=attackVectors.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=attackVectors|language={{{language}}} }}]]</th>
     <th width="33%" colspan="2"> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center]]</th>
+
     <th width="33%" colspan="2"> [[{{Top_10:LanguageFile|text=securityWeakness.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=securityWeakness|language={{{language}}} }}]]</th>
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}} }}|center]]</th>
+
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=technicalImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=technicalImpacts|language={{{language}}} }}]]</th>
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center]]</th>
+
     <th width="16.5%"> [[{{Top_10:LanguageFile|text=businessImpacts.jpg|language={{{language}}} }}|center|{{Top_10:LanguageFile|text=businessImpacts|language={{{language}}} }}]]</th>
 
</tr>
 
</tr>
 
<tr style="background-color: #4F81Bd; color: #FFFFFF;">
 
<tr style="background-color: #4F81Bd; color: #FFFFFF;">

Revision as of 08:47, 18 March 2013

center|{{Top_10:LanguageFile|text=threatAgents|language={{{language}}} } center|Attack Vectors center|Security Weakness center|Technical Impacts center|Business Impacts
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
______