1. /
  2. Security Response/
  3. Glossary/
  4. impact (details)

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

impact (details)

Impact (details rather than rating) describes what the successful use of the exploit may allow an attacker to do; for example, privilege escalation, access to protected objects, or code execution.