Are AJAX applications vulnerable to Hack Attacks?

This paper reviews AJAX technologies with specific reference to JavaScript and Ajax Security.  It briefly documents the kinds of vulnerability classes that should raise security concerns among developers, website owners and the respective visitors. The proposed solution suggests auditing AJAX and JavaScript based applications with a web vulnerability scanner that not only parses the HTML code of a webpage to identify embedded JavaScript, but also executes the code. Automating the process is also key when considering the increasing complexity of such web applications.

Download the White Paper on Ajax application security.

his paper reviews AJAX technologies with specific reference to JavaScript and Ajax Security.  It briefly documents the kinds of vulnerability classes that should raise security concerns among developers, website owners and the respective visitors. The proposed solution suggests auditing AJAX and JavaScript based applications with a web vulnerability scanner that not only parses the HTML code of a webpage to identify embedded JavaScript, but also executes the code. Automating the process is also key when considering the increasing complexity of such web applications.
Share this post

Leave a Reply

Your email address will not be published.