Share This

The act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. -wikipedia.org

« Back to Glossary Index