Understanding Ajax vulnerabilities

Protect the web applications you create with Ajax

From the developerWorks archives

Jeffrey Orloff

Date archived: March 21, 2019 | First published: May 01, 2012

Asynchronous JavaScript + XML (Ajax) is not a web technology; it is a collection of technologies created specifically to build dynamic web applications. Because of its range of functions and ease of use, Ajax is one of the most widely used tools for building web applications today. All applications, including those built using Ajax technologies, are vulnerable to exploits that compromise websites and the databases that drive them. In this article, learn about some of the threats to Ajax technologies and how to guard against them.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some content, steps, or illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Web development
ArticleID=812629
ArticleTitle=Understanding Ajax vulnerabilities
publish-date=05012012