CVE Article

Detailed analysis of security vulnerabilities

CVE-2000-0197

Published: 2000-02-14 Severity: N/A

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

Full Description

The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.

View Full CVE Details
Neural Processor Active