Code Monkey home page Code Monkey logo

hansglz / openemr Goto Github PK

View Code? Open in Web Editor NEW

This project forked from openemr/openemr

0.0 0.0 0.0 491.95 MB

The most popular open source electronic health records and medical practice management solution.

Home Page: https://open-emr.org/

License: GNU General Public License v3.0

JavaScript 4.40% PHP 84.77% Perl 0.28% XSLT 4.81% CSS 0.70% HTML 3.57% Makefile 0.01% Shell 0.17% Smarty 0.18% Roff 0.01% Dockerfile 0.08% SCSS 0.56% Twig 0.17% Mustache 0.31%

openemr's Introduction

Syntax Status Styling Status Testing Status

Backers on Open Collective Sponsors on Open Collective

OpenEMR

OpenEMR is a Free and Open Source electronic health records and medical practice management application. It features fully integrated electronic health records, practice management, scheduling, electronic billing, internationalization, free support, a vibrant community, and a whole lot more. It runs on Windows, Linux, Mac OS X, and many other platforms.

Contributing

OpenEMR is a leader in healthcare open source software and comprises a large and diverse community of software developers, medical providers and educators with a very healthy mix of both volunteers and professionals. Join us and learn how to start contributing today!

Already comfortable with git? Check out CONTRIBUTING.md for quick setup instructions and requirements for contributing to OpenEMR by resolving a bug or adding an awesome feature 😊.

Support

Community and Professional support can be found here.

Extensive documentation and forums can be found on the OpenEMR website that can help you to become more familiar about the project 📖.

Reporting Issues and Bugs

Report these on the Issue Tracker. If you are unsure if it is an issue/bug, then always feel free to use the Forum and Chat to discuss about the issue 🪲.

Reporting Security Vulnerabilities

Check out SECURITY.md

API

Check out API_README.md

Docker

Check out DOCKER_README.md

FHIR

Check out FHIR_README.md

For Developers

If using OpenEMR directly from the code repository, then the following commands will build OpenEMR (Node.js version 12.* or 14.* is required) :

composer install --no-dev
npm install
npm run build
composer dump-autoload -o

Contributors

This project exists thanks to all the people who have contributed. [Contribute].

Backers

Thank you to all our backers! 🙏 [Become a backer]

Sponsors

Support this project by becoming a sponsor. Your logo will show up here with a link to your website. [Become a sponsor]

License

GNU GPL

openemr's People

openemr's Issues

[DepShield] (CVSS 7.5) Vulnerability due to usage of decompress:4.2.1

Vulnerabilities

DepShield reports that this application's usage of decompress:4.2.1 results in the following vulnerability(s):


Occurrences

decompress:4.2.1 is a transitive dependency introduced by the following direct dependency(s):

napa:3.0.0
        └─ download:6.2.5
              └─ decompress:4.2.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.3) Vulnerability due to usage of kind-of:3.2.2

Vulnerabilities

DepShield reports that this application's usage of kind-of:3.2.2 results in the following vulnerability(s):


Occurrences

kind-of:3.2.2 is a transitive dependency introduced by the following direct dependency(s):

gulp-watch:5.0.1
        └─ chokidar:2.1.8
              └─ braces:2.3.2
                    └─ fill-range:4.0.0
                          └─ is-number:3.0.0
                                └─ kind-of:3.2.2
                    └─ snapdragon:0.8.2
                          └─ base:0.11.2
                                └─ cache-base:1.0.1
                                      └─ to-object-path:0.3.0
                                            └─ kind-of:3.2.2
                                └─ class-utils:0.3.6
                                      └─ static-extend:0.1.2
                                            └─ object-copy:0.1.0
                                                  └─ kind-of:3.2.2
                          └─ define-property:0.2.5
                                └─ is-descriptor:0.1.6
                                      └─ is-accessor-descriptor:0.1.6
                                            └─ kind-of:3.2.2
                                      └─ is-data-descriptor:0.1.4
                                            └─ kind-of:3.2.2
                    └─ snapdragon-node:2.1.1
                          └─ snapdragon-util:3.0.1
                                └─ kind-of:3.2.2
        └─ anymatch:1.3.2
              └─ micromatch:2.3.11
                    └─ braces:1.8.5
                          └─ expand-range:1.8.2
                                └─ fill-range:2.2.4
                                      └─ is-number:2.1.0
                                            └─ kind-of:3.2.2
                    └─ kind-of:3.2.2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of glob-parent:3.1.0

Vulnerabilities

DepShield reports that this application's usage of glob-parent:3.1.0 results in the following vulnerability(s):


Occurrences

glob-parent:3.1.0 is a transitive dependency introduced by the following direct dependency(s):

gulp:4.0.2
        └─ vinyl-fs:3.0.3
              └─ glob-stream:6.1.0
                    └─ glob-parent:3.1.0

gulp-watch:5.0.1
        └─ chokidar:2.1.8
              └─ glob-parent:3.1.0
        └─ glob-parent:3.1.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 6.5) Vulnerability due to usage of btoa:1.2.1

Vulnerabilities

DepShield reports that this application's usage of btoa:1.2.1 results in the following vulnerability(s):


Occurrences

btoa:1.2.1 is a transitive dependency introduced by the following direct dependency(s):

jspdf:2.5.1
        └─ btoa:1.2.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of glob-parent:2.0.0

Vulnerabilities

DepShield reports that this application's usage of glob-parent:2.0.0 results in the following vulnerability(s):


Occurrences

glob-parent:2.0.0 is a transitive dependency introduced by the following direct dependency(s):

gulp-watch:5.0.1
        └─ anymatch:1.3.2
              └─ micromatch:2.3.11
                    └─ parse-glob:3.0.4
                          └─ glob-base:0.3.0
                                └─ glob-parent:2.0.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of jszip:3.2.2

Vulnerabilities

DepShield reports that this application's usage of jszip:3.2.2 results in the following vulnerability(s):


Occurrences

jszip:3.2.2 is a transitive dependency introduced by the following direct dependency(s):

dwv:0.27.1
        └─ jszip:3.2.2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.3) Vulnerability due to usage of kind-of:4.0.0

Vulnerabilities

DepShield reports that this application's usage of kind-of:4.0.0 results in the following vulnerability(s):


Occurrences

kind-of:4.0.0 is a transitive dependency introduced by the following direct dependency(s):

gulp-watch:5.0.1
        └─ chokidar:2.1.8
              └─ braces:2.3.2
                    └─ snapdragon:0.8.2
                          └─ base:0.11.2
                                └─ cache-base:1.0.1
                                      └─ has-value:1.0.0
                                            └─ has-values:1.0.0
                                                  └─ kind-of:4.0.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of yargs-parser:5.0.1

Vulnerabilities

DepShield reports that this application's usage of yargs-parser:5.0.1 results in the following vulnerability(s):


Occurrences

yargs-parser:5.0.1 is a transitive dependency introduced by the following direct dependency(s):

gulp:4.0.2
        └─ gulp-cli:2.3.0
              └─ yargs:7.1.2
                    └─ yargs-parser:5.0.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.clonedeep:4.5.0

Vulnerabilities

DepShield reports that this application's usage of lodash.clonedeep:4.5.0 results in the following vulnerability(s):


Occurrences

lodash.clonedeep:4.5.0 is a transitive dependency introduced by the following direct dependency(s):

gulp-dart-sass:1.0.2
        └─ lodash.clonedeep:4.5.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of ini:1.3.8

Vulnerabilities

DepShield reports that this application's usage of ini:1.3.8 results in the following vulnerability(s):


Occurrences

ini:1.3.8 is a transitive dependency introduced by the following direct dependency(s):

gulp:4.0.2
        └─ gulp-cli:2.3.0
              └─ liftoff:3.1.0
                    └─ findup-sync:3.0.0
                          └─ resolve-dir:1.0.1
                                └─ global-modules:1.0.0
                                      └─ global-prefix:1.0.2
                                            └─ ini:1.3.8

napa:3.0.0
        └─ download:6.2.5
              └─ caw:2.0.1
                    └─ get-proxy:2.1.0
                          └─ npm-conf:1.1.3
                                └─ config-chain:1.1.13
                                      └─ ini:1.3.8

stylelint:14.3.0
        └─ global-modules:2.0.0
              └─ global-prefix:3.0.0
                    └─ ini:1.3.8

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.3) Vulnerability due to usage of kind-of:5.1.0

Vulnerabilities

DepShield reports that this application's usage of kind-of:5.1.0 results in the following vulnerability(s):


Occurrences

kind-of:5.1.0 is a transitive dependency introduced by the following direct dependency(s):

gulp:4.0.2
        └─ gulp-cli:2.3.0
              └─ array-sort:1.0.0
                    └─ default-compare:1.0.0
                          └─ kind-of:5.1.0
                    └─ kind-of:5.1.0

gulp-watch:5.0.1
        └─ chokidar:2.1.8
              └─ braces:2.3.2
                    └─ snapdragon:0.8.2
                          └─ define-property:0.2.5
                                └─ is-descriptor:0.1.6
                                      └─ kind-of:5.1.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of debug:2.6.9

Vulnerabilities

DepShield reports that this application's usage of debug:2.6.9 results in the following vulnerability(s):


Occurrences

debug:2.6.9 is a transitive dependency introduced by the following direct dependency(s):

gulp:4.0.2
        └─ glob-watcher:5.0.5
              └─ anymatch:2.0.0
                    └─ micromatch:3.1.10
                          └─ extglob:2.0.4
                                └─ expand-brackets:2.1.4
                                      └─ debug:2.6.9

gulp-watch:5.0.1
        └─ chokidar:2.1.8
              └─ braces:2.3.2
                    └─ snapdragon:0.8.2
                          └─ debug:2.6.9

napa:3.0.0
        └─ tar-pack:3.4.1
              └─ debug:2.6.9

oe-cqm-service:1.0.1
        └─ compression:1.7.3
              └─ debug:2.6.9
        └─ express:4.16.3
              └─ body-parser:1.18.2
                    └─ debug:2.6.9
              └─ debug:2.6.9
              └─ finalhandler:1.1.1
                    └─ debug:2.6.9
              └─ send:0.16.2
                    └─ debug:2.6.9

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of braces:1.8.5

Vulnerabilities

DepShield reports that this application's usage of braces:1.8.5 results in the following vulnerability(s):


Occurrences

braces:1.8.5 is a transitive dependency introduced by the following direct dependency(s):

gulp-watch:5.0.1
        └─ anymatch:1.3.2
              └─ micromatch:2.3.11
                    └─ braces:1.8.5

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 8.1) Vulnerability due to usage of tar:2.2.2

Vulnerabilities

DepShield reports that this application's usage of tar:2.2.2 results in the following vulnerability(s):


Occurrences

tar:2.2.2 is a transitive dependency introduced by the following direct dependency(s):

napa:3.0.0
        └─ tar-pack:3.4.1
              └─ tar:2.2.2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.