mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-06 17:22:50 +01:00
Sigma Rule Update (2025-07-02 20:14:19) (#85)
Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
8751539c58
commit
bf02a5544b
@@ -36310,6 +36310,23 @@
|
||||
],
|
||||
"title": "Potential Exploitation of RCE Vulnerability CVE-2025-33053"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
"sec"
|
||||
],
|
||||
"description": "Detects potential exploitation of CVE-2025-49144, a local privilege escalation vulnerability in Notepad++ installers (v8.8.1 and prior) where the installer calls regsvr32.exe without specifying the full path.\nThis allows an attacker to execute arbitrary code with elevated privileges by placing a malicious regsvr32.exe alongside this Legitimate Notepad++ installer.\nThe vulnerability is triggered when the installer attempts to register the NppShell.dll file, which is a component of Notepad++.\n",
|
||||
"event_ids": [
|
||||
"4688"
|
||||
],
|
||||
"id": "1df6028e-e6fa-9d43-0ec9-a502e12d85dd",
|
||||
"level": "high",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Potential Notepad++ CVE-2025-49144 Exploitation"
|
||||
},
|
||||
{
|
||||
"category": "registry_set",
|
||||
"channel": [
|
||||
|
||||
Reference in New Issue
Block a user