Логотип exploitDog
bind:CVE-2000-0197
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2000-0197

Количество 2

Количество 2

nvd логотип

CVE-2000-0197

больше 25 лет назад

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-987q-p2gc-f52w

больше 3 лет назад

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2000-0197

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

CVSS2: 4.6
0%
Низкий
больше 25 лет назад
github логотип
GHSA-987q-p2gc-f52w

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу