Owasp Standards PDF
Owasp Standards PDF
2019-2020
I. Buffer overflow
Buffer overflows have been the most common form of security vulnerability for
the last ten years. Moreover, buffer overflow vulnerabilities dominate the area of
remote network penetration vulnerabilities, where an anonymous Internet user
seeks to gain partial or total control of a host.
Example :
Language don’t have built-in safeguards against overwriting or accessing data in
their memory.
❖ C
❖ C++
Mac OSX, Windows, and Linux all use code written in C and C++.
II. 5G
The new 5G architectures will be fully virtualized thanks to two innovations:
Mirai scans the Internet for IoT devices that run on the ARC processor. This
processor runs a stripped-down version of the Linux operating system. If the
default username-and-password combo is not changed, Mirai is able to log into the
device and infect it.
IV. OWASP Application Security Verification Standard
The standard provides a basis for testing application technical security controls, as
well as any technical security controls in the environment, that are relied on to
protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL
injection.