// PrestaSecure — Firewall coverage badge (CVE × firewall mapping, 2026-05-02)
$_MODULE['<{prestasecure}prestashop>vulns-modules_c5381dc540506dbb210e2d300554e4cd'] = 'Firewall';
$_MODULE['<{prestasecure}prestashop>vulns-core_c5381dc540506dbb210e2d300554e4cd'] = 'Firewall';
$_MODULE['<{prestasecure}prestashop>vulns-modules_4ecc0d90eec1cea3e9db96583a1bb9c2'] = 'Blocked';
$_MODULE['<{prestasecure}prestashop>vulns-core_4ecc0d90eec1cea3e9db96583a1bb9c2'] = 'Blocked';
$_MODULE['<{prestasecure}prestashop>vulns-modules_44ffd38a6dea695cbe2b34efdcc6cf27'] = 'Partial';
$_MODULE['<{prestasecure}prestashop>vulns-core_44ffd38a6dea695cbe2b34efdcc6cf27'] = 'Partial';
$_MODULE['<{prestasecure}prestashop>vulns-modules_b26917587d98330d93f87808fc9d7267'] = 'Subscribe';
$_MODULE['<{prestasecure}prestashop>vulns-core_b26917587d98330d93f87808fc9d7267'] = 'Subscribe';
$_MODULE['<{prestasecure}prestashop>vulns-modules_e916eb1d5b8ec4dd854eca1b9227617b'] = 'Blocked by firewall';
$_MODULE['<{prestasecure}prestashop>vulns-core_e916eb1d5b8ec4dd854eca1b9227617b'] = 'Blocked by firewall';
$_MODULE['<{prestasecure}prestashop>vulns-modules_1d2437bb006924b92c5cea2a856048a0'] = 'Partially blocked';
$_MODULE['<{prestasecure}prestashop>vulns-core_1d2437bb006924b92c5cea2a856048a0'] = 'Partially blocked';
$_MODULE['<{prestasecure}prestashop>vulns-modules_bc52725d5c94321068a4051ae341fe87'] = 'Upgrade to Advance to block this';
$_MODULE['<{prestasecure}prestashop>vulns-core_bc52725d5c94321068a4051ae341fe87'] = 'Upgrade to Advance to block this';
$_MODULE['<{prestasecure}prestashop>vulns-modules_c42692c70cc4eca068e8fa4d6dc5fc51'] = 'Not in scope of the firewall pattern set (auth logic, info disclosure, IDOR, …).';
$_MODULE['<{prestasecure}prestashop>vulns-core_c42692c70cc4eca068e8fa4d6dc5fc51'] = 'Not in scope of the firewall pattern set (auth logic, info disclosure, IDOR, …).';
$_MODULE['<{prestasecure}prestashop>report_575056db90a4f7b91745c092cef2da51'] = 'Blocked by PrestaSecure firewall.';
$_MODULE['<{prestasecure}prestashop>report_6d0cfa23a958a82b4baa6e058b872209'] = 'Partially blocked by PrestaSecure firewall.';
$_MODULE['<{prestasecure}prestashop>report_cdb1f52c34351ed8a6738ea72956994b'] = 'Subscribe to Advance to enable firewall mitigation on this exploit.';
// === Added 2026-05-08: missing translations for activity-journal, sidebar, report, documentation, vulns-core, vulns-modules, file_changes, progress ===
// From journal (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>journal_18706e17ecff129b638cf6923c48deaf'] = 'As soon as PrestaSecure performs an action on your shop, it will appear here.';
$_MODULE['<{prestasecure}prestashop>journal_3bfbc1f41e4d2dd8f8328cc1b7ba9fa9'] = 'Autonomous system';
$_MODULE['<{prestasecure}prestashop>journal_a149e85a44aeec9140e92733d9ed694e'] = 'Cancelled';
$_MODULE['<{prestasecure}prestashop>journal_07ca5050e697392c9ed47e6453f1453f'] = 'Completed';
$_MODULE['<{prestasecure}prestashop>journal_8aa64c2759dfbc67ffe20ca563d4c7a3'] = 'Connection issue';
$_MODULE['<{prestasecure}prestashop>journal_1b793db6c00482d633b29701c7bcb08c'] = 'Cron';
$_MODULE['<{prestasecure}prestashop>journal_8968048d3b8771b625513d5a02103d50'] = 'Every action performed by PrestaSecure (autonomous, our team, or scheduled) is logged here. This is the same journal you can access from your prestasecure.com dashboard.';
$_MODULE['<{prestasecure}prestashop>journal_d7c8c85bf79bbe1b7188497c32c3b0ca'] = 'Failed';
$_MODULE['<{prestasecure}prestashop>journal_a1b30a29ce3065bf5a7d47d03823b8a5'] = 'Load older entries';
$_MODULE['<{prestasecure}prestashop>journal_6fa910d674c89b251a72ab8ab7ecf3c6'] = 'Loading activity journal...';
$_MODULE['<{prestasecure}prestashop>journal_cfbd8245c849f5f00b495d61ea14dfdf'] = 'No activity yet';
$_MODULE['<{prestasecure}prestashop>journal_65e269c06e837be11b243418eb4ec616'] = 'PrestaSecure activity on this shop';
$_MODULE['<{prestasecure}prestashop>journal_20e58eca81a43e7679d3324f0349ea5f'] = 'PrestaSecure team';
$_MODULE['<{prestasecure}prestashop>journal_7b2f31b90fe1c2cc33a52233c1925df3'] = 'Queued';
$_MODULE['<{prestasecure}prestashop>journal_63a6a88c066880c5ac42394a22803ca6'] = 'Refresh';
$_MODULE['<{prestasecure}prestashop>journal_3d5ac3a0c07be5ecab17905b616f096d'] = 'Remediation action';
$_MODULE['<{prestasecure}prestashop>journal_b4d09ab3cade10c28c9fa4467fbb2834'] = 'Rolled back';
$_MODULE['<{prestasecure}prestashop>journal_5bda814c4aedb126839228f1a3d92f09'] = 'Running';
$_MODULE['<{prestasecure}prestashop>journal_fdae47a7dc2be0ca39d6eaef415f393e'] = 'Scheduled task';
$_MODULE['<{prestasecure}prestashop>journal_82865b3e72bf14de46eacbf53da6be74'] = 'Triggered from this back-office';
$_MODULE['<{prestasecure}prestashop>journal_905fea0b6aae8950d69f6a72a5ca6751'] = 'We could not load the journal right now. Showing cached data if available.';
// From sidebar (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>sidebar_4471792bbe16a0532548341b62dac366'] = 'Activity history';
// From report (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>report_484ed01ea86c25a4e3d7c241acde67b5'] = 'High Priority - Update Modules';
$_MODULE['<{prestasecure}prestashop>report_21931c15266663e3edcab7a9d13daa83'] = 'Immediate - Infected Files';
$_MODULE['<{prestasecure}prestashop>report_ede99dc19db42ac2e68d4fbddacedd26'] = 'Medium Priority - Modified Core Files';
$_MODULE['<{prestasecure}prestashop>report_cfe7c84e79e0718ef2d3a26f57426b0a'] = 'Ongoing - Regular Scanning';
$_MODULE['<{prestasecure}prestashop>report_721b3e04c47b00e6e18c39bf4cee4d02'] = 'Code Analysis - Review Recommended';
$_MODULE['<{prestasecure}prestashop>report_8e3c061753111b7c21fa7435c694fdf5'] = 'Our static analysis detected code patterns that may indicate vulnerabilities in some modules. These results can include false positives - modules that legitimately use certain functions (exec, eval, file upload). Review each finding and verify whether it represents a real risk before taking action.';
$_MODULE['<{prestasecure}prestashop>report_37adf27350e1a5ad6329d5190c9cb248'] = 'Static and taint analysis detected dangerous code patterns in the following modules. These patterns may indicate vulnerabilities, backdoors, or unsafe coding practices that could be exploited by attackers.';
// From documentation (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>documentation_0810e4690a1876f194f1d78f93ead342'] = 'Confirmed malware, backdoor or webshell. Immediate action required - remove or quarantine the file.';
$_MODULE['<{prestasecure}prestashop>documentation_994ff4f697783e6b4302e1078ce17a53'] = 'I need help - how to contact support?';
// From vulns-core (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>vulns-core_d575d70a64f2fa98c644e3f13fafa662'] = 'All patched';
$_MODULE['<{prestasecure}prestashop>vulns-core_5a88ec9424df7b1bd0a366e927ee8e23'] = 'Likely patched';
$_MODULE['<{prestasecure}prestashop>vulns-core_db6c7ef224b172129ca9958e9d95c966'] = 'This vulnerability has been verified as patched by taint analysis.';
$_MODULE['<{prestasecure}prestashop>vulns-core_550069b20a946bc1530db3ce5b4d0474'] = 'patched';
// From vulns-modules (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>vulns-modules_d575d70a64f2fa98c644e3f13fafa662'] = 'All patched';
$_MODULE['<{prestasecure}prestashop>vulns-modules_5a88ec9424df7b1bd0a366e927ee8e23'] = 'Likely patched';
$_MODULE['<{prestasecure}prestashop>vulns-modules_db6c7ef224b172129ca9958e9d95c966'] = 'This vulnerability has been verified as patched by taint analysis.';
$_MODULE['<{prestasecure}prestashop>vulns-modules_550069b20a946bc1530db3ce5b4d0474'] = 'patched';
// From file_changes (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>file_changes_074099de62158e419630121c87385d68'] = 'First scan completed - next scans will show file changes (new, modified, deleted).';
$_MODULE['<{prestasecure}prestashop>file_changes_24cc0883a78c5c2bb32169cb1569c882'] = 'Normal activity - no significant file changes.';
// From progress (added 2026-05-08)
$_MODULE['<{prestasecure}prestashop>progress_7b30a2dd8161ee4fc30a8400ad516b9e'] = 'Important - read before taking action';
$_MODULE['<{prestasecure}prestashop>progress_69e86cf31193f831cb716c1d1a7386cd'] = 'Serenity plan - our team is on it';
// Added 2026-05-08: dashboard col_published / col_discovered_by / col_patched_at
$_MODULE['<{prestasecure}prestashop>dashboard_9b9d8a976b42e0bd66381797644943d5'] = 'Published';
$_MODULE['<{prestasecure}prestashop>dashboard_f2ad8aa36a6c36233721a1bca15c8e35'] = 'Reported by';
$_MODULE['<{prestasecure}prestashop>dashboard_94425412fd3be109b8a546479db62c8b'] = 'Patched on';
Collections Home Collections Subcategories A symbol of hope, love, longevity, and rebirth, Ginkgo biloba is the oldest terrestrial tree species. Its origins date back approximately 300 million years.
Buddhist monks have always venerated this species, planting it near their temples and pagodas to ward off fire. By wrapping its trunk with a rice straw rope, called shimenawa, it is believed to ward off evil spirits.
Immortal, the ginkgo is the only living being to have survived the atomic bomb dropped on Hiroshima during World War II.
A sacred tree of the Orient, ginkgo biloba symbolizes the unity of opposites, endowed with miraculous power, a bearer of hope, and a symbol of love and eternity.
Active filters
Compositions: Rhodolite beads Categories: Rosa
check_circle
check_circle