Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-42122

Publication date:
30/11/2021
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42544

Publication date:
30/11/2021
Missing Rate Limiting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42123

Publication date:
30/11/2021
Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42117

Publication date:
30/11/2021
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2021-42115

Publication date:
30/11/2021
Missing HTTPOnly flag in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42118

Publication date:
30/11/2021
Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42119

Publication date:
30/11/2021
Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42120

Publication date:
30/11/2021
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42121

Publication date:
30/11/2021
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42116

Publication date:
30/11/2021
Incorrect Access Control in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-3769

Publication date:
30/11/2021
# Vulnerability in `pygmalion`, `pygmalion-virtualenv` and `refined` themes **Description**: these themes use `print -P` on user-supplied strings to print them to the terminal. All of them do that on git information, particularly the branch name, so if the branch has a specially-crafted name the vulnerability can be exploited. **Fixed in**: [b3ba9978](https://github.com/ohmyzsh/ohmyzsh/commit/b3ba9978). **Impacted areas**: - `pygmalion` theme. - `pygmalion-virtualenv` theme. - `refined` theme.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2021

CVE-2021-3726

Publication date:
30/11/2021
# Vulnerability in `title` function **Description**: the `title` function defined in `lib/termsupport.zsh` uses `print` to set the terminal title to a user-supplied string. In Oh My Zsh, this function is always used securely, but custom user code could use the `title` function in a way that is unsafe. **Fixed in**: [a263cdac](https://github.com/ohmyzsh/ohmyzsh/commit/a263cdac). **Impacted areas**: - `title` function in `lib/termsupport.zsh`. - Custom user code using the `title` function.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2021