According to a new study released by Delaware-based security researcher Randy Westergren this week, ads on web pages displaying larger banners and video containers are likely to be used as entry points for other hackers Yes.
The researcher says that it has identified several vulnerabilities of iframe filters. This is the name given to the file that the website hosts on the server to support "extended ads".
Also, a miserable CSS code crashes and restarts the iPhone.
Researchers claim that they have identified XSS vulnerabilities in most iframe buster scripts that Google has downloaded so far as part of the iFrame Buster multi-vendor kit provided on the DoubleClick AdExchange documentation site .
Westergren uses an iframe filter on ad networks such as Adform, Eyeblaster (Add in Eye), Adtech, Jivox, etc. to see which site an attacker is likely to execute malicious code in detail in four articles explained.
Also, Technical Support cheat finds the location of the Microsoft TechNet page
The researcher notified Google about the iframe iframe segmentation issue of the iframe buster kit and Google engineers removed these scripts in two weeks this January.
Meanwhile, Google ceased offering the download kit, but some of these iframe buster scripts are still vulnerable if downloaded from other sources.
Hope you like the news Expandable ads can be entry points for site hacks. Stay Tuned For More Updates 🙂