Vasudev Mamidi 's activity
From 23/04/2024 to 02/05/2024
02/05/2024
29/04/2024
- 09:32 PM E-Arogya Feature #157 (In Progress): [User Mgmt] Create services for User master feature.
- 09:29 PM E-Arogya Feature #149 (In Progress): [User Mgmt] Develop services for Employee master feature.
- 09:26 PM E-Arogya Feature #148 (In Progress): R&D On Kafka integration for E-Arogya
- 09:25 PM E-Arogya Feature #145 (Closed): User and Patient Management and OP Billing code merge
- 09:25 PM E-Arogya Feature #146 (Closed): EMR, Lab Serivices and Health ID code merge to Master Branch
25/04/2024
- 11:52 PM E-Arogya Bug #72 (Resolved): [Security Audit ] 7- Framework Obsolete Version in usage
- 11:51 PM E-Arogya Bug #79 (Resolved): [Security Audit ] 14 -Improper Session Management / Session Expiration too longer
- 11:49 PM E-Arogya Bug #89 (Resolved): [Security Audit ] 24- Improper Error Handling
- 11:48 PM E-Arogya Bug #93 (Resolved): [Security Audit ] 28- Technology/Version Disclosure
- 11:48 PM E-Arogya Bug #94 (Resolved): [Security Audit ] 29 -Clickjacking Attack
- 11:47 PM E-Arogya Bug #95 (Resolved): [Security Audit ] 30- Port misconfiguration
24/04/2024
- 01:26 PM E-Arogya Bug #107 (Closed): To stop the bot attack added captch in ui
- 12:57 AM E-Arogya Bug #107 (In Progress): To stop the bot attack added captch in ui
- 01:14 PM E-Arogya Bug #106 (Closed): Nationalid details encription from backend
- 12:54 AM E-Arogya Bug #106 (Resolved): Nationalid details encription from backend
- 01:01 AM E-Arogya Bug #84 (Resolved): [Security Audit ]19- Client side bypass / Improper server side validation
- 01:01 AM E-Arogya Bug #87 (Resolved): [Security Audit ] 22 -Security headers are not Implemented
- 01:01 AM E-Arogya Bug #92 (Resolved): [Security Audit ] 27 -Sensitive Data Passed Through URL Parameters
- 12:59 AM E-Arogya Bug #91 (Resolved): [Security Audit ] 26 -Cross-Site Request Forgery (CSRF)
- 12:53 AM E-Arogya Bug #79 (In Progress): [Security Audit ] 14 -Improper Session Management / Session Expiration too longer
- 12:53 AM E-Arogya Bug #73 (In Progress): [Security Audit ] 8- Insecure Direct Object Reference (IDOR)
- 12:52 AM E-Arogya Bug #72 (Feedback): [Security Audit ] 7- Framework Obsolete Version in usage
- 12:49 AM E-Arogya Bug #69 (Resolved): [Security Audit ] 4- User Account Takeover
- 12:49 AM E-Arogya Bug #70 (Resolved): [Security Audit ] 5 -Failed Defences Against Application Misuse
- 12:48 AM E-Arogya Bug #67 (In Progress): [Security Audit ] 2-Insecure Data Storage
- 12:46 AM E-Arogya Bug #85 (Resolved): [Security Audit ] 20- Cross Origin Resource Sharing (CORS) Misconfiguration
- 12:46 AM E-Arogya Bug #76 (Resolved): [Security Audit ] 11- OTP Flooding
- 12:46 AM E-Arogya Bug #77 (Closed): [Security Audit ] 12- OTP Bypass
- 12:45 AM E-Arogya Bug #82 (Closed): [Security Audit ]17 - OTP Bruteforce
Also available in: Atom