Difference between revisions of "Template:MalwareInfobox"
From SI410
Line 1: | Line 1: | ||
− | {| class="wikitable" style="float: right; | + | {| class="wikitable" style="float: right; width:300px" border="1" |
|+ {{{NAME|MALWARE}}} | |+ {{{NAME|MALWARE}}} | ||
| | | | ||
− | {| | + | {| border="0" style="float:center" |
|+ | |+ | ||
− | |[[Image:{{{IMAGE|}}}|frameless|300px|]] | + | |align="center" width="300px"|[[Image:{{{IMAGE|NoImage.png}}}|frameless|center|300px|]] |
+ | |- | ||
+ | |align="center" style="font-size:80%"|{{{CAPTION|caption}}} | ||
|} | |} | ||
− | {| | + | {|style="font-size:80%" |
|- valign="top" | |- valign="top" | ||
− | |width="30%"| | + | |width="30%"|'''Type''' |
− | |width="70%"| | + | |width="70%"|{{{TYPE|type}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | | | + | |'''Traits''' |
− | | | + | |{{{TRAITS|traits}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | | | + | |'''Source''' |
− | | | + | |{{{SOURCE|source}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | | | + | |'''Zero Day''' |
− | | | + | |{{{ZERODAY|date}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | | | + | |'''Target''' |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | |style="padding-left: 1em"| | + | |style="padding-left: 1em"|'''Threat''' |
− | | | + | |{{{THREAT|threat}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | |style="padding-left: 1em"| | + | |style="padding-left: 1em"|'''Vulnerability''' |
− | | | + | |{{{VULNERABILITY|vulnerability}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
− | |style="padding-left: 1em"| | + | |style="padding-left: 1em"|'''Exploit''' |
− | | | + | |{{{EXPLOIT|exploit}}} |
|- style="vertical-align:top;" | |- style="vertical-align:top;" | ||
|} | |} | ||
|} | |} |
Revision as of 23:53, 22 October 2012
|