Описание
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00272
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users.
EPSS
Процентиль: 50%
0.00272
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other