Secure coding

8   Articles
8
4 Min Read
0 19

The WordPress plugin All-In-One Sticky Floating Contact Form was found to have a vulnerability involving authorization bypasses. When you develop plugins for WordPress, it’s important to ensure that the user…

Continue Reading
4 Min Read
0 25

Every input sent in a server request should be inspected, sanitized, and validated before processing it in your code. WordPress plugins are great for adding features to your site for…

Continue Reading
3 Min Read
0 28

The CSV-to-SortTable WordPress plugin is a handy little tool for site owners, but its codebase shows that it was not built with hackers in mind. CSV-to-SortTable does not validate files…

Continue Reading
8 Min Read
0 17

Most applications need a database to store backend data, and Google Firebase is a great choice for serverless data management. It’s a cloud-based database hosted in Google Cloud, and it’s…

Continue Reading