PrestaShop e-Commerce Solution was built to take advantage of essential Web 2.0 innovations such as dynamic AJAX-powered features and next-generation ergonomy. PrestaShop guides users through your product catalog intelligently and effortlessly turning intrigued visitors into paying customers.
PrestaShop Improper Authentication Vulnerability
Critical
PrestaShop Improper Input Validation Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Improper Control of Generation of Code (Code Injection) Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Vulnerability
Critical
PrestaShop Unrestricted Upload of File with Dangerous Type Vulnerability
Critical
PrestaShop Unrestricted Upload of File with Dangerous Type Vulnerability
Critical
PrestaShop Improper Privilege Management Vulnerability
Critical
PrestaShop Improper Control of Generation of Code (Code Injection) Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Critical
PrestaShop Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Vulnerability
Critical
PrestaShop Improper Authentication Vulnerability
Critical
PrestaShop Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
PrestaShop Unrestricted Upload of File with Dangerous Type Vulnerability
Critical
PrestaShop Unrestricted Upload of File with Dangerous Type Vulnerability
Critical
PrestaShop Vulnerability
High
PrestaShop Improper Restriction of Rendered UI Layers or Frames Vulnerability
High
PrestaShop Other Vulnerability
High
PrestaShop Server-Side Request Forgery (SSRF) Vulnerability
High
PrestaShop Vulnerability
High
PrestaShop Improper Control of Generation of Code (Code Injection) Vulnerability
High
PrestaShop Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
High