Harish Beechani 's activity
From 03/05/2024 to 12/05/2024
10/05/2024
- 07:28 AM E-Arogya Bug #385 (Ready for Prod): Build Issues on the Health ID, Lab, and OP Billing
- 07:28 AM E-Arogya Bug #385 (Resolved): Build Issues on the Health ID, Lab, and OP Billing
- 07:27 AM E-Arogya Bug #385 (In Progress): Build Issues on the Health ID, Lab, and OP Billing
- 07:28 AM E-Arogya Bug #384 (Ready for Prod): Build Issues on the User, Code Domain ,Patient Managementand EMR modules
- 07:27 AM E-Arogya Bug #384 (Resolved): Build Issues on the User, Code Domain ,Patient Managementand EMR modules
- 07:22 AM E-Arogya Bug #384 (In Progress): Build Issues on the User, Code Domain ,Patient Managementand EMR modules
- 07:20 AM E-Arogya Feature #269 (Ready for Prod): [Security Audit Round 2 ] Security headers are not Implemented (Repeted)
- 07:19 AM E-Arogya Feature #272 (Ready for Prod): [Security Audit Round 2 ] Improper Error Handling
- 06:14 AM E-Arogya Feature #272 (Resolved): [Security Audit Round 2 ] Improper Error Handling
- 07:19 AM E-Arogya Feature #278 (Ready for Prod): [Security Audit Round 2 ] Sensitive Data Passed Through URL Parameters (Repeated)
- 07:19 AM E-Arogya Feature #282 (Ready for Prod): [Security Audit Round 2 ] Technology/Version Disclosure
- 06:17 AM E-Arogya Feature #282 (Resolved): [Security Audit Round 2 ] Technology/Version Disclosure
- 07:19 AM E-Arogya Feature #286 (Ready for Prod): [Security Audit Round 2 ] Port misconfiguration (Repeated)
- 07:18 AM E-Arogya Feature #284 (Ready for Prod): [Security Audit Round 2 ] Clickjacking Attack (Repeated)
- 07:18 AM E-Arogya Feature #268 (Ready for Prod): [Security Audit Round 2 ] Cross Origin Resource Sharing (CORS) Misconfiguration
- 07:18 AM E-Arogya Feature #267 (Ready for Prod): [Security Audit Round 2 ] Default pages disclosed
- 07:18 AM E-Arogya Feature #265 (Resolved): [Security Audit Round 2 ] Host Header Injection
- 07:17 AM E-Arogya Feature #263 (Ready for Prod): [Security Audit Round 2 ] Client side bypass / Improper server side validation
- 06:15 AM E-Arogya Feature #263 (Resolved): [Security Audit Round 2 ] Client side bypass / Improper server side validation
- 07:17 AM E-Arogya Feature #261 (Ready for Prod): [Security Audit Round 2 ] Application Logic Bypass (Reapeated)
- 07:17 AM E-Arogya Feature #260 (Ready for Prod): [Security Audit Round 2 ] OTP Bruteforce (Reapeated)
- 07:17 AM E-Arogya Feature #258 (Ready for Prod): [Security Audit Round 2 ] Weak Password Policy (Repeated)
- 07:16 AM E-Arogya Feature #256 (Ready for Prod): [Security Audit Round 2 ] Improper Session Management / Session Expiration too longer (Repeated)
- 06:14 AM E-Arogya Feature #256 (Resolved): [Security Audit Round 2 ] Improper Session Management / Session Expiration too longer (Repeated)
- 07:16 AM E-Arogya Feature #254 (Ready for Prod): [Security Audit Round 2 ] OTP Bypass (Repeated)
- 06:14 AM E-Arogya Feature #254 (Resolved): [Security Audit Round 2 ] OTP Bypass (Repeated)
- 07:16 AM E-Arogya Feature #250 (Resolved): [Security Audit Round 2 ] Sensitive Information Disclosure (Repeated)
- 07:15 AM E-Arogya Feature #241 (Ready for Prod): [Security Audit Round 2 ] Password Returned in Response
- 06:14 AM E-Arogya Feature #248 (In Progress): [Security Audit Round 2 ] Framework Obsolete Version in usage (Repeated)
03/05/2024
- 05:52 AM E-Arogya Feature #241 (Resolved): [Security Audit Round 2 ] Password Returned in Response
- 05:51 AM E-Arogya Feature #258 (Resolved): [Security Audit Round 2 ] Weak Password Policy (Repeated)
- 04:54 AM E-Arogya Feature #272 (In Progress): [Security Audit Round 2 ] Improper Error Handling
- 04:48 AM E-Arogya Feature #275 (In Progress): [Security Audit Round 2 ] Cross-Site Request Forgery (CSRF) (Repeated)
- 04:48 AM E-Arogya Feature #260 (Resolved): [Security Audit Round 2 ] OTP Bruteforce (Reapeated)
- 04:24 AM E-Arogya Feature #250 (In Progress): [Security Audit Round 2 ] Sensitive Information Disclosure (Repeated)
- 04:23 AM E-Arogya Feature #268 (Resolved): [Security Audit Round 2 ] Cross Origin Resource Sharing (CORS) Misconfiguration
- 04:22 AM E-Arogya Feature #282 (In Progress): [Security Audit Round 2 ] Technology/Version Disclosure
- 04:20 AM E-Arogya Feature #261 (Resolved): [Security Audit Round 2 ] Application Logic Bypass (Reapeated)
- 04:18 AM E-Arogya Feature #267 (Resolved): [Security Audit Round 2 ] Default pages disclosed
- 04:18 AM E-Arogya Feature #269 (Resolved): [Security Audit Round 2 ] Security headers are not Implemented (Repeted)
- 04:16 AM E-Arogya Feature #269 (In Progress): [Security Audit Round 2 ] Security headers are not Implemented (Repeted)
- 04:16 AM E-Arogya Feature #286 (Resolved): [Security Audit Round 2 ] Port misconfiguration (Repeated)
- 04:16 AM E-Arogya Feature #284 (Resolved): [Security Audit Round 2 ] Clickjacking Attack (Repeated)
- 04:15 AM E-Arogya Feature #278 (Resolved): [Security Audit Round 2 ] Sensitive Data Passed Through URL Parameters (Repeated)
Also available in: Atom