A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control. | A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control. |