linux Exploiting Vulnerable Application for Privilege Escalation In this, you will learn how a known vulnerability in a third-party application installed on a Linux system could help attackers to escalate to root privileges