Описание
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
EPSS
Процентиль: 58%
0.00363
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
EPSS
Процентиль: 58%
0.00363
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other