6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
43.7%
A vulnerability in Mozilla Firefox browser is related to a post-release memory usage error in the
InputStream implementation. Exploitation of the vulnerability could allow an attacker acting remotely,
to force a victim to visit a specially crafted website, trigger a post-release usage error
and execute arbitrary code on the system
A vulnerability in the Mozilla Firefox browser is related to a bug in Service Workers. Exploitation of the vulnerability could
allow an attacker acting remotely to obtain information about the presence or length of a media file,
using media timing information from different sources combined with range queries
The vulnerability in the Mozilla Firefox browser involves incorrect handling of a series of calls to popup and
window.print(). Exploitation of the vulnerability could allow an attacker acting remotely to force the
browser into full-screen mode without the user seeing the notification prompt, which could lead to user confusion or
could lead to user confusion or spoofing attacks
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
43.7%