First of all I need to let you know that it is not within our practice to disclose vulnerabilities on specific online applications. However, given the fact that Pownce, the vendor, was responsibly informed and the fact that we believe that the issue is interesting enough to be discussed, we’ve decided to let you know about our findings. [...]
The picture that you see is a work of art produced by the British street artist Banksy. Underneath, you will find a great summary on common Web Application security threats put together by Joe Walker for the The Ajax Experience event, which took place last week in Boston. It is highly recommended to check it out although you might be familiar with the content.
I would like to say just one thing: Great work Joe. I haven’t seen any presentation that puts it out in such a clear way.
WormX is a collection of various notorious web worms mostly written on the top of popular client-side technologies and propagating primarily on social networking web sites.
For those of you who do not know what ajax worms are, here is a bit of Internet history:
If you want to submit a worm, we are going to need the following information:
Worm name – It must be enclosed inside <h3>[atom name here]</h3> tags. [...]
The code depends on your connection speed and might not be very accurate. [...]