2018-06-11 21:00:00
mozilla
PUBLISHED
HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pockets messaging API through HTML injection. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.