Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-1999-1084 — Microsoft Windows NT vulnerability
4 documents4 sources
Severity
4.6MEDIUMNVD
EPSS
0.5%
top 32.99%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 31
Latest updateApr 30
Description
The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
CVSS vector
AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4
Affected Packages1 packages
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-3v3p-5qg2-fr76: The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which↗2022-04-30
CVEList▶
CVE-1999-1084: The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which↗2001-09-12