Skip to main content
Skip table of contents

OWASP Top Ten

We regularly scan vulnerabilities defined under OWASP Top Ten Compliance.

OWASP Rule

Agent Desk

Unified Admin

Web Widget

1

Broken Access Control

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

2

Cryptographic Failures

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

3

Injection

PARTIAL_COMPLIANT

COMPLIANT

COMPLIANT

4

Insecure Design

QA NOT_APPLICABLE

QA NOT_APPLICABLE

QA NOT_APPLICABLE

5

Security Misconfiguration

NOT_TESTED

NOT_TESTED

NOT_TESTED

6

Vulnerable and Outdated Components

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

7

Identification and Authentication Failures

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

8

Software and Data Integrity Failures

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

9

Security Logging and Monitoring Failures

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

PARTIAL_COMPLIANT

10

Server-Side Request Forgery (SSRF)

COMPLIANT

COMPLIANT

COMPLIANT

These scan results are produced by our Security QA team using OWASP ZAP, Sonar Cloud and Burp Suite penetration/security testing tools. We will keep scanning for vulnerabilities and do the fixes on identified security bugs on Expertflow CX.

Security-related Bugs and Vulnerabilities

https://expertflow-docs.atlassian.net/issues/?jql=parent%3DCXIM-31%20ORDER%20BY%20rank

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.