The usual attack path is exploiting an application bug for local user access, followed by a local privilege escalation.
The usual attack path is exploiting an application bug for local user access, followed by a local privilege escalation.