Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
PostgreSQL Out-of-bounds Read Vulnerability (CVE-2019-10209)
|
CVE-2019-10209
CWE-125
|
CWE-125
|
Low
|
PostgreSQL Out-of-bounds Write Vulnerability (CVE-2015-0242)
|
CVE-2015-0242
CWE-787
|
CWE-787
|
High
|
PostgreSQL Out-of-bounds Write Vulnerability (CVE-2019-10164)
|
CVE-2019-10164
CWE-787
|
CWE-787
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2005-0244)
|
CVE-2005-0244
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2006-0553)
|
CVE-2006-0553
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-2138)
|
CVE-2007-2138
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-3278)
|
CVE-2007-3278
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-6600)
|
CVE-2007-6600
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-3230)
|
CVE-2009-3230
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1170)
|
CVE-2010-1170
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1447)
|
CVE-2010-1447
CWE-264
|
CWE-264
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1975)
|
CVE-2010-1975
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3433)
|
CVE-2010-3433
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-0866)
|
CVE-2012-0866
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3488)
|
CVE-2012-3488
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1901)
|
CVE-2013-1901
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1903)
|
CVE-2013-1903
CWE-264
|
CWE-264
|
Critical
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0060)
|
CVE-2014-0060
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0061)
|
CVE-2014-0061
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0067)
|
CVE-2014-0067
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0766)
|
CVE-2016-0766
CWE-264
|
CWE-264
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3065)
|
CVE-2016-3065
CWE-264
|
CWE-264
|
Critical
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2007-4772)
|
CVE-2007-4772
|
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2009-0922)
|
CVE-2009-0922
|
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2012-2655)
|
CVE-2012-2655
|
|
Medium
|
PostgreSQL Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2024-7348)
|
CVE-2024-7348
CWE-367
|
CWE-367
|
High
|
PostgreSQL Uncontrolled Search Path Element Vulnerability (CVE-2020-14349)
|
CVE-2020-14349
CWE-427
|
CWE-427
|
High
|
PostgreSQL Untrusted Search Path Vulnerability (CVE-2020-10733)
|
CVE-2020-10733
CWE-426
|
CWE-426
|
High
|
PostgreSQL Untrusted Search Path Vulnerability (CVE-2020-14350)
|
CVE-2020-14350
CWE-426
|
CWE-426
|
High
|
PostgreSQL Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2020-25694)
|
CVE-2020-25694
CWE-327
|
CWE-327
|
High
|
PrestaShop Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-13461)
|
CVE-2019-13461
CWE-639
|
CWE-639
|
High
|
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-4792)
|
CVE-2013-4792
CWE-352
|
CWE-352
|
Medium
|
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-25170)
|
CVE-2023-25170
CWE-352
|
CWE-352
|
High
|
PrestaShop CVE-2008-5791 Vulnerability (CVE-2008-5791)
|
CVE-2008-5791
|
|
Critical
|
PrestaShop CVE-2018-13784 Vulnerability (CVE-2018-13784)
|
CVE-2018-13784
|
|
Critical
|
PrestaShop CVE-2018-19125 Vulnerability (CVE-2018-19125)
|
CVE-2018-19125
|
|
High
|
PrestaShop CVE-2020-26224 Vulnerability (CVE-2020-26224)
|
CVE-2020-26224
|
|
High
|
PrestaShop CVE-2023-39529 Vulnerability (CVE-2023-39529)
|
CVE-2023-39529
|
|
Critical
|
PrestaShop CVE-2024-34717 Vulnerability (CVE-2024-34717)
|
CVE-2024-34717
|
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3796)
|
CVE-2011-3796
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-5682)
|
CVE-2018-5682
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-15080)
|
CVE-2020-15080
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-15081)
|
CVE-2020-15081
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-46158)
|
CVE-2022-46158
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Files or Directories Accessible to External Parties Vulnerability (CVE-2020-5250)
|
CVE-2020-5250
CWE-552
|
CWE-552
|
Medium
|
PrestaShop Improper Authentication Vulnerability (CVE-2020-4074)
|
CVE-2020-4074
CWE-287
|
CWE-287
|
Critical
|
PrestaShop Improper Authentication Vulnerability (CVE-2020-15079)
|
CVE-2020-15079
CWE-287
|
CWE-287
|
Medium
|
PrestaShop Improper Authentication Vulnerability (CVE-2021-21308)
|
CVE-2021-21308
CWE-287
|
CWE-287
|
Critical
|
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-4545)
|
CVE-2011-4545
CWE-94
|
CWE-94
|
Medium
|
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-8823)
|
CVE-2018-8823
CWE-94
|
CWE-94
|
Critical
|
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-20717)
|
CVE-2018-20717
CWE-94
|
CWE-94
|
High
|
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-21686)
|
CVE-2022-21686
CWE-94
|
CWE-94
|
Critical
|
PrestaShop Improper Input Validation Vulnerability (CVE-2023-39530)
|
CVE-2023-39530
CWE-20
|
CWE-20
|
Critical
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-19124)
|
CVE-2018-19124
CWE-22
|
CWE-22
|
High
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2023-39525)
|
CVE-2023-39525
CWE-22
|
CWE-22
|
Critical
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2023-39528)
|
CVE-2023-39528
CWE-22
|
CWE-22
|
High
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2024-26129)
|
CVE-2024-26129
CWE-22
|
CWE-22
|
Medium
|
PrestaShop Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2021-21302)
|
CVE-2021-21302
CWE-1236
|
CWE-1236
|
High
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-6503)
|
CVE-2008-6503
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4544)
|
CVE-2011-4544
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-2517)
|
CVE-2012-2517
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-6641)
|
CVE-2012-6641
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-20001)
|
CVE-2012-20001
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-4791)
|
CVE-2013-4791
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-1175)
|
CVE-2015-1175
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-5681)
|
CVE-2018-5681
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-11876)
|
CVE-2019-11876
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5264)
|
CVE-2020-5264
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5265)
|
CVE-2020-5265
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5269)
|
CVE-2020-5269
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5271)
|
CVE-2020-5271
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5272)
|
CVE-2020-5272
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5276)
|
CVE-2020-5276
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5278)
|
CVE-2020-5278
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5285)
|
CVE-2020-5285
CWE-707
|
CWE-707
|
Medium
|