|
OWASP Rule |
Agent Desk |
Unified Admin |
Web Widget |
|
|---|---|---|---|---|
|
1 |
Broken Access Control |
PARTIAL_compliant |
PARTIAL_compliant |
PARTIAL_compliant |
|
2 |
Cryptographic Failures |
NON_Compliant |
NON_Compliant |
NON_Compliant |
|
3 |
Injection |
PARTIAL_compliant |
Compliant |
Compliant |
|
4 |
Insecure Design |
NOT_Tested |
NOT_Tested |
NOT_Tested |
|
5 |
Security Misconfiguration |
NOT_Tested |
NOT_Tested |
NOT_Tested |
|
6 |
Vulnerable and Outdated Components |
PARTIAL_compliant |
PARTIAL_compliant |
PARTIAL_compliant |
|
7 |
Identification and Authentication Failures |
NON_Compliant |
NON_Compliant |
NON_Compliant |
|
8 |
Software and Data Integrity Failures |
PARTIAL_compliant |
PARTIAL_compliant |
PARTIAL_compliant |
|
9 |
Security Logging and Monitoring Failures |
PARTIAL_compliant |
PARTIAL_compliant |
PARTIAL_compliant |
|
10 |
Server-Side Request Forgery (SSRF) |
NOT_Tested |
NOT_Tested |
NOT_Tested |
These scan results are produced by our Security QA team using OWASP ZAP and Burp Suite penetration/security testing tools. We will keep scanning for vulnerabilities and do the fixation on identified security bugs on Expertflow CX.
|
Summary |
P |
Description |
Labels |
|---|---|---|---|
|
Authenticate to retrieve your issues |
|||