Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xwwx-gqwv-7rqx

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default.

Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default.

EPSS

Процентиль: 80%
0.01459
Низкий

Связанные уязвимости

nvd
почти 26 лет назад

Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default.

EPSS

Процентиль: 80%
0.01459
Низкий