One of the bugs is a local privilege escalation vulnerability in the Windows Task Scheduler, it allows a hacker to gain SYSTEM level privileges. The second flaw enables unauthorized file modifications via an exploit in the Windows Error Reporting service. Next there's also a vulnerability in Internet Explorer 11 that enables the execution of JavaScript code with higher system access than normally permitted by the browser's sandbox.
Like the other exploits SandboxEscaper has published over the past year—including this one Ars covered last August and this one from last October—the three recent ones don’t allow attackers to remotely execute malicious code. Still, as security defenses in recent versions of Windows and other operating systems have improved, the value of these types of exploits has grown, since they are often the only way to bypass security sandboxes and similar protections. Despite some limitations in the exploit that were transparently noted by SandBoxEscaper, the disclosures are significant if they work as purported against fully patched versions of Windows 10.Via: ARS Technia