The impact type of vulnerability describes the type of harm an attack could cause if the vulnerability were exploited.
There are three types of impact:
Elevation of privilege
An attacker exploiting this vulnerability could assume greater privileges on a compromised system, allowing them to potentially destroy data or take control of computers for malicious purposes.
An attacker exploiting this vulnerability could obtain access to confidential information.
Denial of service
An attacker exploiting this vulnerability could prevent authorized access to computing resources or interfere with a system’s operations.