A vulnerability has been found in OpenEMR up to 7.x and classified as problematic. This affects the function getPnotesByUser of the component Message Center. This manipulation causes authorization bypass.
This vulnerability appears as CVE-2026-25220. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in OpenEMR up to 7.x. It has been declared as problematic. Impacted is the function FhirCareTeamService of the component FHIR CareTeam Resource Endpoint. Executing a manipulation can lead to information disclosure.
This vulnerability is handled as CVE-2026-24487. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in OpenEMR up to 7.x. This affects an unknown function of the component Immunization Module. This manipulation of the argument patient_id causes sql injection.
The identification of this vulnerability is CVE-2026-23627. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in OpenEMR up to 7.x. It has been declared as critical. This affects an unknown function of the component REST API Endpoint. The manipulation of the argument _sort results in sql injection.
This vulnerability is known as CVE-2026-24908. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Devolutions Server up to 2025.3.14. It has been declared as problematic. This vulnerability affects unknown code. Executing a manipulation can lead to cleartext storage of sensitive information.
This vulnerability appears as CVE-2026-3221. The attacker needs to be present on the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in OpenEMR up to 7.x. It has been classified as critical. Impacted is an unknown function of the component Patient Portal Signature Endpoint. The manipulation leads to improper authorization.
This vulnerability is documented as CVE-2026-24890. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in OpenEMR up to 7.x. This affects an unknown part. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2026-25743. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in OpenSIPS up to 3.6.3. The affected element is the function jwt_db_authorize of the file modules/auth_jwt/authorize.c of the component JWT Handler. The manipulation results in sql injection.
This vulnerability is identified as CVE-2026-25554. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability classified as critical has been found in Linksys MR9600 and MX4200. This impacts an unknown function of the component Firewall Rule Handler. Performing a manipulation results in improper access controls.
This vulnerability is cataloged as CVE-2026-27850. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.1.1. It has been classified as critical. The affected element is the function fake_init of the component vme. Performing a manipulation results in null pointer dereference.
This vulnerability is known as CVE-2022-50538. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.2.2. Affected by this vulnerability is the function dm_resume. The manipulation results in infinite loop.
This vulnerability is identified as CVE-2022-50535. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.