OWASP Top Ten
OWASP Rule | Agent Desk | Unified Admin | Web Widget | |
|---|---|---|---|---|
| 1 | Broken Access Control | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT |
| 2 | Cryptographic Failures | NON_COMPLIANT | NON_COMPLIANT | NON_COMPLIANT |
| 3 | Injection | PARTIAL_COMPLIANT | COMPLIANT | COMPLIANT |
| 4 | Insecure Design | NOT_TESTED | NOT_TESTED | NOT_TESTED |
| 5 | Security Misconfiguration | NOT_TESTED | NOT_TESTED | NOT_TESTED |
| 6 | Vulnerable and Outdated Components | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT |
| 7 | Identification and Authentication Failures | NON_COMPLIANT | NON_COMPLIANT | NON_COMPLIANT |
| 8 | Software and Data Integrity Failures | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT |
| 9 | Security Logging and Monitoring Failures | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT | PARTIAL_COMPLIANT |
| 10 | Server-Side Request Forgery (SSRF) | NOT_TESTED | NOT_TESTED | NOT_TESTED |
These scan results are produced by our Security QA team using OWASP ZAP and Burp Suite penetration/security testing tools. We will keep scanning for vulnerabilities and do the fixation on identified security bugs on Expertflow CX.