Impact key Critical Vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing. High Vulnerability can be used to gather sensitive data from sites in other windows or inject data or code into those sites, requiring no more than normal browsing actions. Moderate Vulnerabilities that would otherwise be High or Critical except they only w