Extension block request: {5084f455-bc8f-483c-b145-91245bcbfd64} {bd69d5d0-4b2f-48cb-bab5-dcf1e0f9c63b}
Categories
(Toolkit :: Blocklist Policy Requests, task)
Tracking
()
People
(Reporter: raluca.sofian, Assigned: Fallen)
Details
Extension name: adblock new, adobe flash player new add
Extension UUID: {5084f455-bc8f-483c-b145-91245bcbfd64},{bd69d5d0-4b2f-48cb-bab5-dcf1e0f9c63b}
Extension versions to block: all
Applications, versions, and platforms affected: Firefox *
Block severity: hard
Homepage, AMO listing, other references and contact info:
https://reviewers.addons.mozilla.org/en-US/reviewers/review/adblock-new
https://reviewers.addons.mozilla.org/en-US/reviewers/review/adobe-flash-player-new-add
Reasons: The following add-ons are identical. The content script gets injected into any page, collects form data and sends it to a remote server. Also, existing cookies are modified.
Updated•5 years ago
|
Assignee | ||
Updated•5 years ago
|
Assignee | ||
Comment 1•5 years ago
|
||
The block has been staged. Andreas, can you review and push?
Comment 2•5 years ago
|
||
Raluca, can you please add the required information, as given by the template in the bugzilla link on https://wiki.mozilla.org/Blocklisting#How_to_request_a_block ? Thank you.
Assignee | ||
Updated•5 years ago
|
Comment 3•5 years ago
|
||
Done.
Updated•5 years ago
|
Description
•