<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: shockwave</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/shockwave.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-01-06T09:35:07+00:00</updated><author><name>Simon Willison</name></author><entry><title>XSS Vulnerabilities in Common Shockwave Flash Files</title><link href="https://simonwillison.net/2008/Jan/6/xss/#atom-tag" rel="alternate"/><published>2008-01-06T09:35:07+00:00</published><updated>2008-01-06T09:35:07+00:00</updated><id>https://simonwillison.net/2008/Jan/6/xss/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://docs.google.com/View?docid=ajfxntc4dmsq_14dt57ssdw&amp;amp;pli=1"&gt;XSS Vulnerabilities in Common Shockwave Flash Files&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Is the word “shockwave” still relevant to Flash? Regardless, it turns out Flash can be a serious vector for XSS attacks, and many commonly used components have recently fixed holes (and hence should be updated ASAP).


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/flash"&gt;flash&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/shockwave"&gt;shockwave&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xss"&gt;xss&lt;/a&gt;&lt;/p&gt;



</summary><category term="flash"/><category term="security"/><category term="shockwave"/><category term="xss"/></entry></feed>