Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
PostgreSQL Insufficiently Protected Credentials Vulnerability (CVE-2021-23222)
|
CVE-2021-23222
CWE-522
|
CWE-522
|
Medium
|
PostgreSQL Missing Authorization Vulnerability (CVE-2020-1720)
|
CVE-2020-1720
CWE-862
|
CWE-862
|
Medium
|
PostgreSQL Missing Authorization Vulnerability (CVE-2024-4317)
|
CVE-2024-4317
CWE-862
|
CWE-862
|
Medium
|
PostgreSQL Missing Encryption of Sensitive Data Vulnerability (CVE-2017-7485)
|
CVE-2017-7485
CWE-311
|
CWE-311
|
Medium
|
PostgreSQL Numeric Errors Vulnerability (CVE-2007-4769)
|
CVE-2007-4769
|
|
Medium
|
PostgreSQL Numeric Errors Vulnerability (CVE-2007-6067)
|
CVE-2007-6067
|
|
Medium
|
PostgreSQL Numeric Errors Vulnerability (CVE-2010-0442)
|
CVE-2010-0442
|
|
Medium
|
PostgreSQL Numeric Errors Vulnerability (CVE-2010-4015)
|
CVE-2010-4015
|
|
Medium
|
PostgreSQL Numeric Errors Vulnerability (CVE-2014-0064)
|
CVE-2014-0064
|
|
Medium
|
PostgreSQL Numeric Errors Vulnerability (CVE-2014-2669)
|
CVE-2014-2669
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2000-1199)
|
CVE-2000-1199
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-0972)
|
CVE-2002-0972
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-1398)
|
CVE-2002-1398
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-1402)
|
CVE-2002-1402
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2002-1657)
|
CVE-2002-1657
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2004-0547)
|
CVE-2004-0547
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2005-0246)
|
CVE-2005-0246
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-0105)
|
CVE-2006-0105
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-5540)
|
CVE-2006-5540
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-5541)
|
CVE-2006-5541
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2006-5542)
|
CVE-2006-5542
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2007-0556)
|
CVE-2007-0556
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2009-4136)
|
CVE-2009-4136
|
|
Medium
|
PostgreSQL Other Vulnerability (CVE-2015-3165)
|
CVE-2015-3165
|
|
Medium
|
PostgreSQL Out-of-bounds Read Vulnerability (CVE-2019-10129)
|
CVE-2019-10129
CWE-125
|
CWE-125
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2005-0244)
|
CVE-2005-0244
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2006-0553)
|
CVE-2006-0553
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-2138)
|
CVE-2007-2138
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-3278)
|
CVE-2007-3278
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-6600)
|
CVE-2007-6600
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-3230)
|
CVE-2009-3230
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1170)
|
CVE-2010-1170
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1975)
|
CVE-2010-1975
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3433)
|
CVE-2010-3433
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-0866)
|
CVE-2012-0866
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3488)
|
CVE-2012-3488
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1901)
|
CVE-2013-1901
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0060)
|
CVE-2014-0060
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0061)
|
CVE-2014-0061
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0067)
|
CVE-2014-0067
CWE-264
|
CWE-264
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2007-4772)
|
CVE-2007-4772
|
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2009-0922)
|
CVE-2009-0922
|
|
Medium
|
PostgreSQL Resource Management Errors Vulnerability (CVE-2012-2655)
|
CVE-2012-2655
|
|
Medium
|
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-4792)
|
CVE-2013-4792
CWE-352
|
CWE-352
|
Medium
|
PrestaShop CVE-2024-34717 Vulnerability (CVE-2024-34717)
|
CVE-2024-34717
|
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3796)
|
CVE-2011-3796
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-5682)
|
CVE-2018-5682
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-15080)
|
CVE-2020-15080
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-15081)
|
CVE-2020-15081
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-46158)
|
CVE-2022-46158
CWE-200
|
CWE-200
|
Medium
|
PrestaShop Files or Directories Accessible to External Parties Vulnerability (CVE-2020-5250)
|
CVE-2020-5250
CWE-552
|
CWE-552
|
Medium
|
PrestaShop Improper Authentication Vulnerability (CVE-2020-15079)
|
CVE-2020-15079
CWE-287
|
CWE-287
|
Medium
|
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-4545)
|
CVE-2011-4545
CWE-94
|
CWE-94
|
Medium
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2024-26129)
|
CVE-2024-26129
CWE-22
|
CWE-22
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2008-6503)
|
CVE-2008-6503
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2011-4544)
|
CVE-2011-4544
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-2517)
|
CVE-2012-2517
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-6641)
|
CVE-2012-6641
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-20001)
|
CVE-2012-20001
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2013-4791)
|
CVE-2013-4791
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-1175)
|
CVE-2015-1175
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-5681)
|
CVE-2018-5681
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-11876)
|
CVE-2019-11876
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5264)
|
CVE-2020-5264
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5265)
|
CVE-2020-5265
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5269)
|
CVE-2020-5269
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5271)
|
CVE-2020-5271
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5272)
|
CVE-2020-5272
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5276)
|
CVE-2020-5276
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5278)
|
CVE-2020-5278
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5285)
|
CVE-2020-5285
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5286)
|
CVE-2020-5286
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-6632)
|
CVE-2020-6632
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-11074)
|
CVE-2020-11074
CWE-707
|
CWE-707
|
Medium
|
PrestaShop Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-15083)
|
CVE-2020-15083
CWE-707
|
CWE-707
|
Medium
|