Impact (details rather than rating) describes what the successful use of the exploit may allow an attacker to do; for example, privilege escalation, access to protected objects, or code execution.
WANT MORE?
Follow us for all the latest news, tips and updates.