The act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
MITRE. (n.d.). Common Weakness Enumeration (CWE).