The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.
http://www.microsoft.com/technet/support/kb.asp?ID=269049
http://www.securityfocus.com/bid/1507
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-052
Source: MITRE
Published: 2000-07-25
Updated: 2018-10-12
Type: NVD-CWE-Other
Base Score: 4.6
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.9
Severity: MEDIUM