Local exploits refer to security vulnerabilities that allow an attacker to gain elevated privileges on a computer system or network. These exploits typically occur when a user runs malicious code or software that takes advantage of flaws in the operating system or applications. By executing these exploits, attackers can access sensitive data or control system functions without authorization.
These vulnerabilities are often specific to the local environment, meaning they require physical or direct access to the target system. Common examples include exploiting weaknesses in Windows, Linux, or macOS systems. Local exploits can be particularly dangerous as they can lead to further attacks or data breaches if not addressed promptly.