Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
PostgreSQL Other Vulnerability (CVE-2002-0802)
|
CVE-2002-0802
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-0972)
|
CVE-2002-0972
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-1397)
|
CVE-2002-1397
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-1398)
|
CVE-2002-1398
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-1399)
|
CVE-2002-1399
|
|
Critical
|
PostgreSQL Other Vulnerability (CVE-2002-1400)
|
CVE-2002-1400
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-1402)
|
CVE-2002-1402
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-1642)
|
CVE-2002-1642
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-1657)
|
CVE-2002-1657
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2003-0901)
|
CVE-2003-0901
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2004-0547)
|
CVE-2004-0547
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2004-0977)
|
CVE-2004-0977
|
|
Low
|
PostgreSQL Other Vulnerability (CVE-2005-0245)
|
CVE-2005-0245
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2005-0246)
|
CVE-2005-0246
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2005-1409)
|
CVE-2005-1409
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2005-1410)
|
CVE-2005-1410
|
|
Low
|
PostgreSQL Other Vulnerability (CVE-2006-0105)
|
CVE-2006-0105
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-0678)
|
CVE-2006-0678
|
|
Low
|
PostgreSQL Other Vulnerability (CVE-2006-2313)
|
CVE-2006-2313
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2006-2314)
|
CVE-2006-2314
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2006-5540)
|
CVE-2006-5540
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-5541)
|
CVE-2006-5541
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-5542)
|
CVE-2006-5542
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2007-0555)
|
CVE-2007-0555
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2007-0556)
|
CVE-2007-0556
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2007-3279)
|
CVE-2007-3279
|
|
Critical
|
PostgreSQL Other Vulnerability (CVE-2007-3280)
|
CVE-2007-3280
|
|
Critical
|
PostgreSQL Other Vulnerability (CVE-2009-4136)
|
CVE-2009-4136
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2012-1618)
|
CVE-2012-1618
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2013-1902)
|
CVE-2013-1902
|
|
Critical
|
PostgreSQL Other Vulnerability (CVE-2015-3165)
|
CVE-2015-3165
|
|
Medium
|
PostgreSQL Out-of-bounds Read Vulnerability (CVE-2019-10129)
|
CVE-2019-10129
CWE-125
|
CWE-125
|
Medium
|
PostgreSQL Out-of-bounds Read Vulnerability (CVE-2019-10209)
|
CVE-2019-10209
CWE-125
|
CWE-125
|
Low
|
PostgreSQL Out-of-bounds Write Vulnerability (CVE-2015-0242)
|
CVE-2015-0242
CWE-787
|
CWE-787
|
High
|
PostgreSQL Out-of-bounds Write Vulnerability (CVE-2019-10164)
|
CVE-2019-10164
CWE-787
|
CWE-787
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2005-0244)
|
CVE-2005-0244
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2006-0553)
|
CVE-2006-0553
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-2138)
|
CVE-2007-2138
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-3278)
|
CVE-2007-3278
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-6600)
|
CVE-2007-6600
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-3230)
|
CVE-2009-3230
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1170)
|
CVE-2010-1170
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1447)
|
CVE-2010-1447
CWE-264
|
CWE-264
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1975)
|
CVE-2010-1975
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3433)
|
CVE-2010-3433
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-0866)
|
CVE-2012-0866
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3488)
|
CVE-2012-3488
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1901)
|
CVE-2013-1901
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1903)
|
CVE-2013-1903
CWE-264
|
CWE-264
|
Critical
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0060)
|
CVE-2014-0060
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0061)
|
CVE-2014-0061
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0067)
|
CVE-2014-0067
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0766)
|
CVE-2016-0766
CWE-264
|
CWE-264
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3065)
|
CVE-2016-3065
CWE-264
|
CWE-264
|
Critical
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2007-4772)
|
CVE-2007-4772
|
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2009-0922)
|
CVE-2009-0922
|
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2012-2655)
|
CVE-2012-2655
|
|
Medium
|
PostgreSQL Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2024-7348)
|
CVE-2024-7348
CWE-367
|
CWE-367
|
High
|
PostgreSQL Uncontrolled Search Path Element Vulnerability (CVE-2020-14349)
|
CVE-2020-14349
CWE-427
|
CWE-427
|
High
|
PostgreSQL Untrusted Search Path Vulnerability (CVE-2020-10733)
|
CVE-2020-10733
CWE-426
|
CWE-426
|
High
|
PostgreSQL Untrusted Search Path Vulnerability (CVE-2020-14350)
|
CVE-2020-14350
CWE-426
|
CWE-426
|
High
|
PostgreSQL Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2020-25694)
|
CVE-2020-25694
CWE-327
|
CWE-327
|
High
|
PrestaShop Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-13461)
|
CVE-2019-13461
CWE-639
|
CWE-639
|
High
|
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-4792)
|
CVE-2013-4792
CWE-352
|
CWE-352
|
Medium
|
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-25170)
|
CVE-2023-25170
CWE-352
|
CWE-352
|
High
|
PrestaShop CVE-2008-5791 Vulnerability (CVE-2008-5791)
|
CVE-2008-5791
|
|
Critical
|
PrestaShop CVE-2018-13784 Vulnerability (CVE-2018-13784)
|
CVE-2018-13784
|
|
Critical
|
PrestaShop CVE-2018-19125 Vulnerability (CVE-2018-19125)
|
CVE-2018-19125
|
|
High
|
PrestaShop CVE-2020-26224 Vulnerability (CVE-2020-26224)
|
CVE-2020-26224
|
|
High
|
PrestaShop CVE-2023-39529 Vulnerability (CVE-2023-39529)
|
CVE-2023-39529
|
|
Critical
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3796)
|
CVE-2011-3796
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-5682)
|
CVE-2018-5682
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-15080)
|
CVE-2020-15080
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-15081)
|
CVE-2020-15081
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-46158)
|
CVE-2022-46158
CWE-200
|
CWE-200
|
Medium
|