HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-743-1 | firefox-esr security update |
![]() |
DSA-3734-1 | firefox-esr security update |
![]() |
EUVD-2016-10690 | HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1. |
![]() |
USN-3155-1 | Firefox vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-06T03:07:31.414Z
Reserved: 2016-12-07T00:00:00
Link: CVE-2016-9901

No data.

Status : Modified
Published: 2018-06-11T21:29:02.297
Modified: 2024-11-21T03:01:58.620
Link: CVE-2016-9901


No data.