Project

General

Profile

Vasudev Mamidi 's activity

From 23/04/2024 to 02/05/2024

02/05/2024

09:41 PM E-Arogya Bug #73 (Resolved): [Security Audit ] 8- Insecure Direct Object Reference (IDOR)
Vasudev Mamidi

29/04/2024

09:32 PM E-Arogya Feature #157 (In Progress): [User Mgmt] Create services for User master feature.
Vasudev Mamidi
09:29 PM E-Arogya Feature #149 (In Progress): [User Mgmt] Develop services for Employee master feature.
Vasudev Mamidi
09:26 PM E-Arogya Feature #148 (In Progress): R&D On Kafka integration for E-Arogya
Vasudev Mamidi
09:25 PM E-Arogya Feature #145 (Closed): User and Patient Management and OP Billing code merge
Vasudev Mamidi
09:25 PM E-Arogya Feature #146 (Closed): EMR, Lab Serivices and Health ID code merge to Master Branch
Vasudev Mamidi

25/04/2024

11:52 PM E-Arogya Bug #72 (Resolved): [Security Audit ] 7- Framework Obsolete Version in usage
Vasudev Mamidi
11:51 PM E-Arogya Bug #79 (Resolved): [Security Audit ] 14 -Improper Session Management / Session Expiration too longer
Vasudev Mamidi
11:49 PM E-Arogya Bug #89 (Resolved): [Security Audit ] 24- Improper Error Handling
Vasudev Mamidi
11:48 PM E-Arogya Bug #93 (Resolved): [Security Audit ] 28- Technology/Version Disclosure
Vasudev Mamidi
11:48 PM E-Arogya Bug #94 (Resolved): [Security Audit ] 29 -Clickjacking Attack
Vasudev Mamidi
11:47 PM E-Arogya Bug #95 (Resolved): [Security Audit ] 30- Port misconfiguration
Vasudev Mamidi

24/04/2024

01:26 PM E-Arogya Bug #107 (Closed): To stop the bot attack added captch in ui
Vasudev Mamidi
12:57 AM E-Arogya Bug #107 (In Progress): To stop the bot attack added captch in ui
Vasudev Mamidi
01:14 PM E-Arogya Bug #106 (Closed): Nationalid details encription from backend
Vasudev Mamidi
12:54 AM E-Arogya Bug #106 (Resolved): Nationalid details encription from backend
Vasudev Mamidi
01:01 AM E-Arogya Bug #84 (Resolved): [Security Audit ]19- Client side bypass / Improper server side validation
Vasudev Mamidi
01:01 AM E-Arogya Bug #87 (Resolved): [Security Audit ] 22 -Security headers are not Implemented
Vasudev Mamidi
01:01 AM E-Arogya Bug #92 (Resolved): [Security Audit ] 27 -Sensitive Data Passed Through URL Parameters
Vasudev Mamidi
12:59 AM E-Arogya Bug #91 (Resolved): [Security Audit ] 26 -Cross-Site Request Forgery (CSRF)
Vasudev Mamidi
12:53 AM E-Arogya Bug #79 (In Progress): [Security Audit ] 14 -Improper Session Management / Session Expiration too longer
Vasudev Mamidi
12:53 AM E-Arogya Bug #73 (In Progress): [Security Audit ] 8- Insecure Direct Object Reference (IDOR)
Vasudev Mamidi
12:52 AM E-Arogya Bug #72 (Feedback): [Security Audit ] 7- Framework Obsolete Version in usage
Vasudev Mamidi
12:49 AM E-Arogya Bug #69 (Resolved): [Security Audit ] 4- User Account Takeover
Vasudev Mamidi
12:49 AM E-Arogya Bug #70 (Resolved): [Security Audit ] 5 -Failed Defences Against Application Misuse
Vasudev Mamidi
12:48 AM E-Arogya Bug #67 (In Progress): [Security Audit ] 2-Insecure Data Storage
Vasudev Mamidi
12:46 AM E-Arogya Bug #85 (Resolved): [Security Audit ] 20- Cross Origin Resource Sharing (CORS) Misconfiguration
Vasudev Mamidi
12:46 AM E-Arogya Bug #76 (Resolved): [Security Audit ] 11- OTP Flooding
Vasudev Mamidi
12:46 AM E-Arogya Bug #77 (Closed): [Security Audit ] 12- OTP Bypass
Vasudev Mamidi
12:45 AM E-Arogya Bug #82 (Closed): [Security Audit ]17 - OTP Bruteforce
Vasudev Mamidi
 

Also available in: Atom