Vulnerability: Trojan Horse Attack on Windows NT Registry Editor via .reg Files

Vulnerability: Trojan Horse Attack on Windows NT Registry Editor via .reg Files

CVE-1999-0572 · HIGH Severity

AV:N/AC:M/AU:N/C:C/I:C/A:C

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

Learn more about our Web Application Penetration Testing UK.