Breadcrumbs

OWASP Top Ten

We regularly scan vulnerabilities defined under OWASP Top Ten Compliance .

OWASP Rule

Agent Desk

Unified Admin

Web Widget

1

Broken Access Control

PARTIAL_compliant

PARTIAL_compliant

PARTIAL_compliant

2

Cryptographic Failures

NON_Compliant

NON_Compliant

NON_Compliant

3

Injection

PARTIAL_compliant

Compliant

Compliant

4

Insecure Design

NOT_Tested

NOT_Tested

NOT_Tested

5

Security Misconfiguration

NOT_Tested

NOT_Tested

NOT_Tested

6

Vulnerable and Outdated Components

PARTIAL_compliant

PARTIAL_compliant

PARTIAL_compliant

7

Identification and Authentication Failures

NON_Compliant

NON_Compliant

NON_Compliant

8

Software and Data Integrity Failures

PARTIAL_compliant

PARTIAL_compliant

PARTIAL_compliant

9

Security Logging and Monitoring Failures

PARTIAL_compliant

PARTIAL_compliant

PARTIAL_compliant

10

Server-Side Request Forgery (SSRF)

NOT_Tested

NOT_Tested

NOT_Tested

These scan results are produced by our Security QA team using OWASP ZAP, Sonar Cloud and Burp Suite penetration/security testing tools. We will keep scanning for vulnerabilities and do the fixation on identified security bugs on Expertflow CX.

Please enter an Aha! link and then click data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAQAAAC1+jfqAAAAoElEQVQoFa3BQXHDMBQFwE/BFErBFETBFHxeGKIgCqFgCqYQCqLwmmnqmRyS6aW7VaVp9WA1RMRdt9TFplfZRZy67i6mr3rSHTYxbfVLNy31ZIgp1nphqYtDxKhPTBFxs9U74nTodq3+iabrDlPqHc0wRaQ+MUQcdfFVL6xiiltdTMNSPzRT7A69Lk4xdd0pYq/S7XWx6O4iYljrQdPqL9/pwHQAAyEFYgAAAABJRU5ErkJggg== above to see a preview