<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/d8ffe66d9dfb44429be8a60182372f38&quot; frameborder=&quot;0&quot; width=&quot;1842&quot; height=&quot;1381&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1381</height><width>1842</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1381</thumbnail_height><thumbnail_width>1842</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/d8ffe66d9dfb44429be8a60182372f38-1701753336976.gif</thumbnail_url><duration>173</duration><title>Uploaded File Exfiltration - Vulnerability Disclosure for Writer</title><description>Hey, writer security team! In this video, I&apos;ll be discussing a vulnerability in Writer where an external attacker can access a user&apos;s uploaded document by tricking them into visiting a seemingly trustworthy website. I&apos;ll explain how this vulnerability works and provide an example scenario. Additionally, I&apos;ll request the viewers to create an executive summary using the attached client data. This video aims to raise awareness about the vulnerability and prompt action from the team.</description></oembed>