Closed
Bug 1521429
Opened 5 years ago
Closed 5 years ago
Extension block request: xtera@soravem.net
Categories
(Toolkit :: Blocklist Policy Requests, task)
Toolkit
Blocklist Policy Requests
Tracking
()
RESOLVED
FIXED
People
(Reporter: rctgamer3, Assigned: TheOne)
Details
(Whiteboard: [extension])
Extension name: Media Enhancer
Extension UUID: xtera@soravem.net
Extension versions to block: all
Applications, versions, and platforms affected: all
Block severity: hard
Reasons: Served from fake Firefox update page. Remote script, then ad injection, also redirects BMO, WMO, SUMO, MDN, and the blocklist CDN page.
Assignee | ||
Comment 1•5 years ago
|
||
Clone: nozl@ssave.net
Assignee: nobody → awagner
Status: NEW → ASSIGNED
Assignee | ||
Comment 2•5 years ago
|
||
The push has been staged. Philipp, can you please review and push?
Flags: needinfo?(philipp)
Comment 3•5 years ago
|
||
Done
Status: ASSIGNED → RESOLVED
Closed: 5 years ago
Flags: needinfo?(philipp)
Resolution: --- → FIXED
Assignee | ||
Updated•5 years ago
|
Type: enhancement → task
You need to log in
before you can comment on or make changes to this bug.
Description
•