Daca aveti cont pe DFP, presupun ca ati primit mesajul, iar pentru cei care nu, postez mai jos.
Lista o gasiti si aici la sectiunea vendor
https://developers.google.com/ad-exchange/rtb/response-guide/expandables
Daca rulati reclame de la fimele de mai sus, sau aveti acele fisiere pe hostul vostru e recomandat sa le stergeti.
We’ve identified certain vendor files that may contain XSS vulnerabilities which could pose a security risk. Please check if you are hosting these files and remove them with the help of your webmaster. These are the currently identified third-party vendor files:
1. adform/IFrameManager.html
2. admotion/afa-iframe.htm
3. bonzai/bonzaiBuster.html
4. exponential/buster.html
5. eyeblaster/addineyeV2.html
6. eyewonder/interim.html
7. flashtalking/ftlocal.html
8. ipinyou/py_buster.html
9. jivox/jivoxibuster.html
10. mediaplex/mojofb_v9.html
11. mixpo/framebust.html
12. predicta/predicta_bf.html
13. rockabox/rockabox_buster.html
14. liquidus/iframeX.htm
15. controbox/iframebuster.html
16. spongecell/spongecell-spongecellbuster.html
17. unicast/unicastIFD.html
18. adrime/adrime_burst.2.0.0.htm
19. revjet/revjet_buster.html
20. kpsule/iframebuster.html
We have disabled these vendors where possible for all DoubleClick for Publishers and DoubleClick Ad Exchange customers. However, any of the mentioned files hosted on your site may still pose a risk and should be taken down. We will notify you as we learn more.
Lista o gasiti si aici la sectiunea vendor
https://developers.google.com/ad-exchange/rtb/response-guide/expandables
Daca rulati reclame de la fimele de mai sus, sau aveti acele fisiere pe hostul vostru e recomandat sa le stergeti.