tag:blogger.com,1999:blog-4083252652650482806.post8069146616044966238..comments2022-08-24T09:04:40.182-07:00Comments on David Sopas - hacking web apps: Prestashop persistent XSS and CSRF vulnerabilityUnknownnoreply@blogger.comBlogger4125tag:blogger.com,1999:blog-4083252652650482806.post-44575325091824740342014-08-13T08:43:13.306-07:002014-08-13T08:43:13.306-07:00I don't think I tested CS-Cart. Maybe in the f...I don't think I tested CS-Cart. Maybe in the future! <br />Usually I test only what my clients use.Davidhttps://www.blogger.com/profile/05034789163906615094noreply@blogger.comtag:blogger.com,1999:blog-4083252652650482806.post-25118299784997438382014-08-13T08:34:48.621-07:002014-08-13T08:34:48.621-07:00Hi David,
Thank you for your kindly. I am looking ...Hi David,<br />Thank you for your kindly. I am looking for a cart. There are some that I would like to try. But at this point, I just look at Prestashop and CS-Cart. Do you ever see the CS-Cart security hole? Sorry to ask you one more time.<br />Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4083252652650482806.post-61594576559957098492014-08-13T02:33:27.753-07:002014-08-13T02:33:27.753-07:00Hi John,
Well it all depends on your needs. I li...Hi John, <br /><br />Well it all depends on your needs. I like Prestashop. They really care about security. They've a good team and fast support.<br /><br />Shopify for example, they just discarted a few security issues I found. In my opinion that shows me that they don't care about clients security.<br /><br />Keep in mind that you must also secure your host and apply good security practises.<br /><br />Regards,<br />DavidDavidhttps://www.blogger.com/profile/05034789163906615094noreply@blogger.comtag:blogger.com,1999:blog-4083252652650482806.post-26950061270712580582014-08-13T02:23:23.049-07:002014-08-13T02:23:23.049-07:00Hi David,
Thanks for sharing. I just wondering, ac...Hi David,<br />Thanks for sharing. I just wondering, according to your experience, which shopping cart is most secure? I'm not saying unbreakable, but which one is less hackable? <br />Thanks,<br />John Anonymousnoreply@blogger.com