Researcher Bypasses Windows UAC by Spoofing Trusted Directory

A security researcher from Tenable, Inc. recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory. 

read more

Read more: Researcher Bypasses Windows UAC by Spoofing Trusted Directory

Story added 12. November 2018, content source with full text you can find at link above.