Researcher Bypasses Windows UAC by Spoofing Trusted Directory
A security researcher from Tenable, Inc. recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory.
Read more: Researcher Bypasses Windows UAC by Spoofing Trusted Directory
Story added 12. November 2018, content source with full text you can find at link above.