We’ve identified certain vendor files that may contain XSS vulnerabilities which could pose a security risk. Please check if you are hosting these files and remove them with the help of your webmaster. These are the currently identified third-party vendor files:
adform/IFrameManager.html
admotion/afa-iframe.htm
bonzai/bonzaiBuster.html
exponential/buster.html
eyeblaster/addineyeV2.html
eyewonder/interim.html
flashtalking/ftlocal.html
ipinyou/py_buster.html
jivox/jivoxibuster.html
mediaplex/mojofb_v9.html
mixpo/framebust.html
predicta/predicta_bf.html
rockabox/rockabox_buster.html
liquidus/iframeX.htm
controbox/iframebuster.html
spongecell/spongecell-spongecellbuster.html
unicast/unicastIFD.html
adrime/adrime_burst.2.0.0.htm
revjet/revjet_buster.html
kpsule/iframebuster.html
We have disabled these vendors where possible for all DoubleClick for Publishers and DoubleClick Ad Exchange customers. However, any of the mentioned files hosted on your site may still pose a risk and should be taken down. We will notify you as we learn more.
This does not affect DoubleClick for WordPress, though DoubleClick for WordPress users may be affected by it. For more information, see that Help Center article.
An email from DoubleClick doubleclick-noreply@google.com