Understanding Ajax vulnerabilities
Protect the web applications you create with Ajax
From the developerWorks archives
Date archived: April 22, 2019 | First published: May 01, 2012
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some content, steps, or illustrations may have changed.