Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-987q-p2gc-f52w

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

EPSS

Процентиль: 58%
0.00363
Низкий

Связанные уязвимости

nvd
больше 25 лет назад

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

EPSS

Процентиль: 58%
0.00363
Низкий