The WordPress plugin All-In-One Sticky Floating Contact Form was found to have a vulnerability involving authorization bypasses. When you develop plugins for WordPress, it’s important to ensure that the user…
Secure coding
Every input sent in a server request should be inspected, sanitized, and validated before processing it in your code. WordPress plugins are great for adding features to your site for…
If you use any Sneeit WordPress themes or plugins, you should probably update it now. The Sneeit framework was found to have several vulnerabilities including remote code execution detailed in…
The CSV-to-SortTable WordPress plugin is a handy little tool for site owners, but its codebase shows that it was not built with hackers in mind. CSV-to-SortTable does not validate files…
Most applications need a database to store backend data, and Google Firebase is a great choice for serverless data management. It’s a cloud-based database hosted in Google Cloud, and it’s…
It’s common in coding to work with CSV (Comma Separated Values) files to transfer data between platforms or allow users to download files that can then be used in their…
As a programmer, you will often work with user sessions. A user session is a randomly generated alphanumeric value that identifies the user on the server. In most applications, the…
When a software developer codes a variable into their application, the system allocates a specific number of bytes to hold data. Usually, the data passed to the variable is from…
