Zero Day Initiative - Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 1
Briefly

The number of link following vulnerabilities submitted to the ZDI program has been increasing rapidly over the past several years, requiring programmatically exploiting a race condition.
A link following vulnerability occurs when an application accesses a file by filename without preventing it from resolving to an unintended resource, potentially leading to exploitation through user-created links in Windows.
Read at Zero Day Initiative
[
|
]