Privilege Escalation Attacks

P

Exploiting a bug, a design defect, or a configuration oversight in an operating system or software program to acquire elevated access to resources typically guarded against an application or user is known as privilege escalation. As a result, a system administrator or application developer may not have intended their software to have more access than they did.

Previous
Previous

PrivCo

Next
Next

Privilege Escalation Flaws