Found in a12637c7489855bda5a5946999566f2dd47faf09 (via git rev-parse HEAD --short).
Steps to reproduce:
Install add-on ($ ./node_modules/.bin/jpm run -b Aurora) and go to www.adobe.com.
Note that the popup says "Adobe was compromised in 2013, ...".
Go to www.androidforums.com.
Open the popup.
Actual results:
The popup is rendered as expected for the first site (www.adobe.com), but then seems to use cached information for the second compromised site (www.androidforums.com).
Found in a12637c7489855bda5a5946999566f2dd47faf09 (via
git rev-parse HEAD --short
).Steps to reproduce:
$ ./node_modules/.bin/jpm run -b Aurora
) and go to www.adobe.com.Actual results:
The popup is rendered as expected for the first site (www.adobe.com), but then seems to use cached information for the second compromised site (www.androidforums.com).