// PrestaSecure — Firewall coverage badge (CVE × firewall mapping, 2026-05-02) $_MODULE['<{prestasecure}prestashop>vulns-modules_c5381dc540506dbb210e2d300554e4cd'] = 'Firewall'; $_MODULE['<{prestasecure}prestashop>vulns-core_c5381dc540506dbb210e2d300554e4cd'] = 'Firewall'; $_MODULE['<{prestasecure}prestashop>vulns-modules_4ecc0d90eec1cea3e9db96583a1bb9c2'] = 'Blocked'; $_MODULE['<{prestasecure}prestashop>vulns-core_4ecc0d90eec1cea3e9db96583a1bb9c2'] = 'Blocked'; $_MODULE['<{prestasecure}prestashop>vulns-modules_44ffd38a6dea695cbe2b34efdcc6cf27'] = 'Partial'; $_MODULE['<{prestasecure}prestashop>vulns-core_44ffd38a6dea695cbe2b34efdcc6cf27'] = 'Partial'; $_MODULE['<{prestasecure}prestashop>vulns-modules_b26917587d98330d93f87808fc9d7267'] = 'Subscribe'; $_MODULE['<{prestasecure}prestashop>vulns-core_b26917587d98330d93f87808fc9d7267'] = 'Subscribe'; $_MODULE['<{prestasecure}prestashop>vulns-modules_e916eb1d5b8ec4dd854eca1b9227617b'] = 'Blocked by firewall'; $_MODULE['<{prestasecure}prestashop>vulns-core_e916eb1d5b8ec4dd854eca1b9227617b'] = 'Blocked by firewall'; $_MODULE['<{prestasecure}prestashop>vulns-modules_1d2437bb006924b92c5cea2a856048a0'] = 'Partially blocked'; $_MODULE['<{prestasecure}prestashop>vulns-core_1d2437bb006924b92c5cea2a856048a0'] = 'Partially blocked'; $_MODULE['<{prestasecure}prestashop>vulns-modules_bc52725d5c94321068a4051ae341fe87'] = 'Upgrade to Advance to block this'; $_MODULE['<{prestasecure}prestashop>vulns-core_bc52725d5c94321068a4051ae341fe87'] = 'Upgrade to Advance to block this'; $_MODULE['<{prestasecure}prestashop>vulns-modules_c42692c70cc4eca068e8fa4d6dc5fc51'] = 'Not in scope of the firewall pattern set (auth logic, info disclosure, IDOR, …).'; $_MODULE['<{prestasecure}prestashop>vulns-core_c42692c70cc4eca068e8fa4d6dc5fc51'] = 'Not in scope of the firewall pattern set (auth logic, info disclosure, IDOR, …).'; $_MODULE['<{prestasecure}prestashop>report_575056db90a4f7b91745c092cef2da51'] = 'Blocked by PrestaSecure firewall.'; $_MODULE['<{prestasecure}prestashop>report_6d0cfa23a958a82b4baa6e058b872209'] = 'Partially blocked by PrestaSecure firewall.'; $_MODULE['<{prestasecure}prestashop>report_cdb1f52c34351ed8a6738ea72956994b'] = 'Subscribe to Advance to enable firewall mitigation on this exploit.'; // === Added 2026-05-08: missing translations for activity-journal, sidebar, report, documentation, vulns-core, vulns-modules, file_changes, progress === // From journal (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>journal_18706e17ecff129b638cf6923c48deaf'] = 'As soon as PrestaSecure performs an action on your shop, it will appear here.'; $_MODULE['<{prestasecure}prestashop>journal_3bfbc1f41e4d2dd8f8328cc1b7ba9fa9'] = 'Autonomous system'; $_MODULE['<{prestasecure}prestashop>journal_a149e85a44aeec9140e92733d9ed694e'] = 'Cancelled'; $_MODULE['<{prestasecure}prestashop>journal_07ca5050e697392c9ed47e6453f1453f'] = 'Completed'; $_MODULE['<{prestasecure}prestashop>journal_8aa64c2759dfbc67ffe20ca563d4c7a3'] = 'Connection issue'; $_MODULE['<{prestasecure}prestashop>journal_1b793db6c00482d633b29701c7bcb08c'] = 'Cron'; $_MODULE['<{prestasecure}prestashop>journal_8968048d3b8771b625513d5a02103d50'] = 'Every action performed by PrestaSecure (autonomous, our team, or scheduled) is logged here. This is the same journal you can access from your prestasecure.com dashboard.'; $_MODULE['<{prestasecure}prestashop>journal_d7c8c85bf79bbe1b7188497c32c3b0ca'] = 'Failed'; $_MODULE['<{prestasecure}prestashop>journal_a1b30a29ce3065bf5a7d47d03823b8a5'] = 'Load older entries'; $_MODULE['<{prestasecure}prestashop>journal_6fa910d674c89b251a72ab8ab7ecf3c6'] = 'Loading activity journal...'; $_MODULE['<{prestasecure}prestashop>journal_cfbd8245c849f5f00b495d61ea14dfdf'] = 'No activity yet'; $_MODULE['<{prestasecure}prestashop>journal_65e269c06e837be11b243418eb4ec616'] = 'PrestaSecure activity on this shop'; $_MODULE['<{prestasecure}prestashop>journal_20e58eca81a43e7679d3324f0349ea5f'] = 'PrestaSecure team'; $_MODULE['<{prestasecure}prestashop>journal_7b2f31b90fe1c2cc33a52233c1925df3'] = 'Queued'; $_MODULE['<{prestasecure}prestashop>journal_63a6a88c066880c5ac42394a22803ca6'] = 'Refresh'; $_MODULE['<{prestasecure}prestashop>journal_3d5ac3a0c07be5ecab17905b616f096d'] = 'Remediation action'; $_MODULE['<{prestasecure}prestashop>journal_b4d09ab3cade10c28c9fa4467fbb2834'] = 'Rolled back'; $_MODULE['<{prestasecure}prestashop>journal_5bda814c4aedb126839228f1a3d92f09'] = 'Running'; $_MODULE['<{prestasecure}prestashop>journal_fdae47a7dc2be0ca39d6eaef415f393e'] = 'Scheduled task'; $_MODULE['<{prestasecure}prestashop>journal_82865b3e72bf14de46eacbf53da6be74'] = 'Triggered from this back-office'; $_MODULE['<{prestasecure}prestashop>journal_905fea0b6aae8950d69f6a72a5ca6751'] = 'We could not load the journal right now. Showing cached data if available.'; // From sidebar (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>sidebar_4471792bbe16a0532548341b62dac366'] = 'Activity history'; // From report (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>report_484ed01ea86c25a4e3d7c241acde67b5'] = 'High Priority - Update Modules'; $_MODULE['<{prestasecure}prestashop>report_21931c15266663e3edcab7a9d13daa83'] = 'Immediate - Infected Files'; $_MODULE['<{prestasecure}prestashop>report_ede99dc19db42ac2e68d4fbddacedd26'] = 'Medium Priority - Modified Core Files'; $_MODULE['<{prestasecure}prestashop>report_cfe7c84e79e0718ef2d3a26f57426b0a'] = 'Ongoing - Regular Scanning'; $_MODULE['<{prestasecure}prestashop>report_721b3e04c47b00e6e18c39bf4cee4d02'] = 'Code Analysis - Review Recommended'; $_MODULE['<{prestasecure}prestashop>report_8e3c061753111b7c21fa7435c694fdf5'] = 'Our static analysis detected code patterns that may indicate vulnerabilities in some modules. These results can include false positives - modules that legitimately use certain functions (exec, eval, file upload). Review each finding and verify whether it represents a real risk before taking action.'; $_MODULE['<{prestasecure}prestashop>report_37adf27350e1a5ad6329d5190c9cb248'] = 'Static and taint analysis detected dangerous code patterns in the following modules. These patterns may indicate vulnerabilities, backdoors, or unsafe coding practices that could be exploited by attackers.'; // From documentation (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>documentation_0810e4690a1876f194f1d78f93ead342'] = 'Confirmed malware, backdoor or webshell. Immediate action required - remove or quarantine the file.'; $_MODULE['<{prestasecure}prestashop>documentation_994ff4f697783e6b4302e1078ce17a53'] = 'I need help - how to contact support?'; // From vulns-core (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>vulns-core_d575d70a64f2fa98c644e3f13fafa662'] = 'All patched'; $_MODULE['<{prestasecure}prestashop>vulns-core_5a88ec9424df7b1bd0a366e927ee8e23'] = 'Likely patched'; $_MODULE['<{prestasecure}prestashop>vulns-core_db6c7ef224b172129ca9958e9d95c966'] = 'This vulnerability has been verified as patched by taint analysis.'; $_MODULE['<{prestasecure}prestashop>vulns-core_550069b20a946bc1530db3ce5b4d0474'] = 'patched'; // From vulns-modules (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>vulns-modules_d575d70a64f2fa98c644e3f13fafa662'] = 'All patched'; $_MODULE['<{prestasecure}prestashop>vulns-modules_5a88ec9424df7b1bd0a366e927ee8e23'] = 'Likely patched'; $_MODULE['<{prestasecure}prestashop>vulns-modules_db6c7ef224b172129ca9958e9d95c966'] = 'This vulnerability has been verified as patched by taint analysis.'; $_MODULE['<{prestasecure}prestashop>vulns-modules_550069b20a946bc1530db3ce5b4d0474'] = 'patched'; // From file_changes (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>file_changes_074099de62158e419630121c87385d68'] = 'First scan completed - next scans will show file changes (new, modified, deleted).'; $_MODULE['<{prestasecure}prestashop>file_changes_24cc0883a78c5c2bb32169cb1569c882'] = 'Normal activity - no significant file changes.'; // From progress (added 2026-05-08) $_MODULE['<{prestasecure}prestashop>progress_7b30a2dd8161ee4fc30a8400ad516b9e'] = 'Important - read before taking action'; $_MODULE['<{prestasecure}prestashop>progress_69e86cf31193f831cb716c1d1a7386cd'] = 'Serenity plan - our team is on it'; // Added 2026-05-08: dashboard col_published / col_discovered_by / col_patched_at $_MODULE['<{prestasecure}prestashop>dashboard_9b9d8a976b42e0bd66381797644943d5'] = 'Published'; $_MODULE['<{prestasecure}prestashop>dashboard_f2ad8aa36a6c36233721a1bca15c8e35'] = 'Reported by'; $_MODULE['<{prestasecure}prestashop>dashboard_94425412fd3be109b8a546479db62c8b'] = 'Patched on';
A superb thin minimalist half bangle ring in sandblasted recycled 925 silver ♻ for women and men.
° Width: 2 mm
° Ring thickness: 1 mm.
° All sizes are available, I make them to order.
A ring that is perfect for everyday wear, to seal a civil partnership or as a wedding ring.
This ring exists with 3 different finishes:
° Brilliant
° Brushed
✅ Sandblasted
And 3 different widths:
✅ 2x1mm
° 2.5 x 1.25 mm
° 3x1.5mm
Don't know your ring size? You can order this very practical reusable ring sizer to know your finger size.
Everything is in sterling silver. Does not contains nickel.
Made in France
.