Project

General

Profile

Harish Beechani 's activity

From 03/05/2024 to 12/05/2024

10/05/2024

07:28 AM E-Arogya Bug #385 (Ready for Prod): Build Issues on the Health ID, Lab, and OP Billing
Harish Beechani
07:28 AM E-Arogya Bug #385 (Resolved): Build Issues on the Health ID, Lab, and OP Billing
Harish Beechani
07:27 AM E-Arogya Bug #385 (In Progress): Build Issues on the Health ID, Lab, and OP Billing
Harish Beechani
07:28 AM E-Arogya Bug #384 (Ready for Prod): Build Issues on the User, Code Domain ,Patient Managementand EMR modules
Harish Beechani
07:27 AM E-Arogya Bug #384 (Resolved): Build Issues on the User, Code Domain ,Patient Managementand EMR modules
Harish Beechani
07:22 AM E-Arogya Bug #384 (In Progress): Build Issues on the User, Code Domain ,Patient Managementand EMR modules
Harish Beechani
07:20 AM E-Arogya Feature #269 (Ready for Prod): [Security Audit Round 2 ] Security headers are not Implemented (Repeted)
Harish Beechani
07:19 AM E-Arogya Feature #272 (Ready for Prod): [Security Audit Round 2 ] Improper Error Handling
Harish Beechani
06:14 AM E-Arogya Feature #272 (Resolved): [Security Audit Round 2 ] Improper Error Handling
Harish Beechani
07:19 AM E-Arogya Feature #278 (Ready for Prod): [Security Audit Round 2 ] Sensitive Data Passed Through URL Parameters (Repeated)
Harish Beechani
07:19 AM E-Arogya Feature #282 (Ready for Prod): [Security Audit Round 2 ] Technology/Version Disclosure
Harish Beechani
06:17 AM E-Arogya Feature #282 (Resolved): [Security Audit Round 2 ] Technology/Version Disclosure
Harish Beechani
07:19 AM E-Arogya Feature #286 (Ready for Prod): [Security Audit Round 2 ] Port misconfiguration (Repeated)
Harish Beechani
07:18 AM E-Arogya Feature #284 (Ready for Prod): [Security Audit Round 2 ] Clickjacking Attack (Repeated)
Harish Beechani
07:18 AM E-Arogya Feature #268 (Ready for Prod): [Security Audit Round 2 ] Cross Origin Resource Sharing (CORS) Misconfiguration
Harish Beechani
07:18 AM E-Arogya Feature #267 (Ready for Prod): [Security Audit Round 2 ] Default pages disclosed
Harish Beechani
07:18 AM E-Arogya Feature #265 (Resolved): [Security Audit Round 2 ] Host Header Injection
Harish Beechani
07:17 AM E-Arogya Feature #263 (Ready for Prod): [Security Audit Round 2 ] Client side bypass / Improper server side validation
Harish Beechani
06:15 AM E-Arogya Feature #263 (Resolved): [Security Audit Round 2 ] Client side bypass / Improper server side validation
Harish Beechani
07:17 AM E-Arogya Feature #261 (Ready for Prod): [Security Audit Round 2 ] Application Logic Bypass (Reapeated)
Harish Beechani
07:17 AM E-Arogya Feature #260 (Ready for Prod): [Security Audit Round 2 ] OTP Bruteforce (Reapeated)
Harish Beechani
07:17 AM E-Arogya Feature #258 (Ready for Prod): [Security Audit Round 2 ] Weak Password Policy (Repeated)
Harish Beechani
07:16 AM E-Arogya Feature #256 (Ready for Prod): [Security Audit Round 2 ] Improper Session Management / Session Expiration too longer (Repeated)
Harish Beechani
06:14 AM E-Arogya Feature #256 (Resolved): [Security Audit Round 2 ] Improper Session Management / Session Expiration too longer (Repeated)
Harish Beechani
07:16 AM E-Arogya Feature #254 (Ready for Prod): [Security Audit Round 2 ] OTP Bypass (Repeated)
Harish Beechani
06:14 AM E-Arogya Feature #254 (Resolved): [Security Audit Round 2 ] OTP Bypass (Repeated)
Harish Beechani
07:16 AM E-Arogya Feature #250 (Resolved): [Security Audit Round 2 ] Sensitive Information Disclosure (Repeated)
Harish Beechani
07:15 AM E-Arogya Feature #241 (Ready for Prod): [Security Audit Round 2 ] Password Returned in Response
Harish Beechani
06:14 AM E-Arogya Feature #248 (In Progress): [Security Audit Round 2 ] Framework Obsolete Version in usage (Repeated)
Harish Beechani

03/05/2024

05:52 AM E-Arogya Feature #241 (Resolved): [Security Audit Round 2 ] Password Returned in Response
Harish Beechani
05:51 AM E-Arogya Feature #258 (Resolved): [Security Audit Round 2 ] Weak Password Policy (Repeated)
Harish Beechani
04:54 AM E-Arogya Feature #272 (In Progress): [Security Audit Round 2 ] Improper Error Handling
Harish Beechani
04:48 AM E-Arogya Feature #275 (In Progress): [Security Audit Round 2 ] Cross-Site Request Forgery (CSRF) (Repeated)
Harish Beechani
04:48 AM E-Arogya Feature #260 (Resolved): [Security Audit Round 2 ] OTP Bruteforce (Reapeated)
Harish Beechani
04:24 AM E-Arogya Feature #250 (In Progress): [Security Audit Round 2 ] Sensitive Information Disclosure (Repeated)
Harish Beechani
04:23 AM E-Arogya Feature #268 (Resolved): [Security Audit Round 2 ] Cross Origin Resource Sharing (CORS) Misconfiguration
Harish Beechani
04:22 AM E-Arogya Feature #282 (In Progress): [Security Audit Round 2 ] Technology/Version Disclosure
Harish Beechani
04:20 AM E-Arogya Feature #261 (Resolved): [Security Audit Round 2 ] Application Logic Bypass (Reapeated)
Harish Beechani
04:18 AM E-Arogya Feature #267 (Resolved): [Security Audit Round 2 ] Default pages disclosed
Harish Beechani
04:18 AM E-Arogya Feature #269 (Resolved): [Security Audit Round 2 ] Security headers are not Implemented (Repeted)
Harish Beechani
04:16 AM E-Arogya Feature #269 (In Progress): [Security Audit Round 2 ] Security headers are not Implemented (Repeted)
Harish Beechani
04:16 AM E-Arogya Feature #286 (Resolved): [Security Audit Round 2 ] Port misconfiguration (Repeated)
Harish Beechani
04:16 AM E-Arogya Feature #284 (Resolved): [Security Audit Round 2 ] Clickjacking Attack (Repeated)
Harish Beechani
04:15 AM E-Arogya Feature #278 (Resolved): [Security Audit Round 2 ] Sensitive Data Passed Through URL Parameters (Repeated)
Harish Beechani
 

Also available in: Atom