Page 128 of 637 results (0.008 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. • https://exchange.xforce.ibmcloud.com/vulnerabilities/178 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input. • https://www.cve.org/CVERecord?id=CVE-1999-0534 •