OWASP Top Ten
We regularly scan vulnerabilities defined under OWASP Top Ten Compliance.
OWASP Rule  | Agent Desk  | Unified Admin  | Web Widget  | |
|---|---|---|---|---|
| 1 | Broken Access Control  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | 
| 2 | Cryptographic Failures  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | 
| 3 | Injection  | PARTIAL_COMPLIANT  | COMPLIANT  | COMPLIANT  | 
| 4 | Insecure Design  | QA NOT_APPLICABLE  | QA NOT_APPLICABLE  | QA NOT_APPLICABLE  | 
| 5 | Security Misconfiguration  | NOT_TESTED  | NOT_TESTED  | NOT_TESTED  | 
| 6 | Vulnerable and Outdated Components  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | 
| 7 | Identification and Authentication Failures  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | 
| 8 | Software and Data Integrity Failures  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | 
| 9 | Security Logging and Monitoring Failures  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | PARTIAL_COMPLIANT  | 
| 10 | Server-Side Request Forgery (SSRF)  | COMPLIANT  | COMPLIANT  | COMPLIANT  | 
These scan results are produced by our Security QA team using OWASP ZAP, Sonar Cloud and Burp Suite penetration/security testing tools. We will keep scanning for vulnerabilities and do the fixes on identified security bugs on Expertflow CX.
Security-related Bugs and Vulnerabilities
https://expertflow-docs.atlassian.net/issues/?jql=parent%3DCXIM-31%20ORDER%20BY%20rank