Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. They finally did it.

They finally did it.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
noaimicroslopmicrosoftwindowsprogrammingwritingwindows11enshittificationcybersecurityinfosec
68 Beiträge 50 Kommentatoren 1 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • pheonix@hachyderm.ioP pheonix@hachyderm.io

    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

    tiikerikani@dice.campT This user is from outside of this forum
    tiikerikani@dice.campT This user is from outside of this forum
    tiikerikani@dice.camp
    schrieb zuletzt editiert von
    #22

    @pheonix
    STOP UPDATING NOTEPAD

    (source: https://www.reddit.com/r/windowsmemes/comments/1plqsi2/stop_updating_notepad/)

    1 Antwort Letzte Antwort
    0
    • pheonix@hachyderm.ioP pheonix@hachyderm.io

      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

      bluszcz@mastodon.com.plB This user is from outside of this forum
      bluszcz@mastodon.com.plB This user is from outside of this forum
      bluszcz@mastodon.com.pl
      schrieb zuletzt editiert von
      #23

      @pheonix

      not the first one, not the last one 😄

      CVE-2019-12735 CVE-2002-1377 CVE-2016-1248 CVE-2021-43908 CVE-2023-36742 CVE-2020-27955 CVE-2007-5795 CVE-2022-48337 CVE-2024-25255 CVE-2025-49144 (

      pheonix@hachyderm.ioP 1 Antwort Letzte Antwort
      0
      • pheonix@hachyderm.ioP pheonix@hachyderm.io

        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

        bolomkxxviii@mastodon.socialB This user is from outside of this forum
        bolomkxxviii@mastodon.socialB This user is from outside of this forum
        bolomkxxviii@mastodon.social
        schrieb zuletzt editiert von
        #24

        @pheonix MicroSlop CraPilot.

        1 Antwort Letzte Antwort
        0
        • pheonix@hachyderm.ioP pheonix@hachyderm.io

          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

          mihamarkic@mastodon.socialM This user is from outside of this forum
          mihamarkic@mastodon.socialM This user is from outside of this forum
          mihamarkic@mastodon.social
          schrieb zuletzt editiert von
          #25

          @pheonix what's an unverified protocol?

          1 Antwort Letzte Antwort
          0
          • jkb@gotosocial.jkbockstael.beJ jkb@gotosocial.jkbockstael.be

            @pheonix According to the report you have to click a link in the file, just loading it won't compromise the system.

            avuko@infosec.exchangeA This user is from outside of this forum
            avuko@infosec.exchangeA This user is from outside of this forum
            avuko@infosec.exchange
            schrieb zuletzt editiert von
            #26

            @jkb @pheonix That seems to be the case, although the weakness is in Microsoft Notepad incorrectly handling “an unverified protocol”, not in something the user then has to do or interact with. Besides clicking a link.

            This reads to me like an URI protocol handling issue.

            And that functionality is not something they’d have to reinvent or vibe code.

            You know, with their proprietary plain text editor running on their proprietary OS, and next to their proprietary file explorer, their proprietary internet browser, their proprietary email client and proprietary network agents.

            All their proprietary software handling URI protocols… RIGHT THERE.

            jkb@gotosocial.jkbockstael.beJ 1 Antwort Letzte Antwort
            0
            • trillytrill@mastodon.artT trillytrill@mastodon.art

              @pheonix
              Notepad?? FRIGGIN NOTEPAD? HOW DO YOU SCREW UP SOMETHING LIKE A BASIC-ASS TEXT EDITOR PROGRAM?

              pheonix@hachyderm.ioP This user is from outside of this forum
              pheonix@hachyderm.ioP This user is from outside of this forum
              pheonix@hachyderm.io
              schrieb zuletzt editiert von
              #27

              @trillytrill I know, right? It takes a special kind of engineering effort to turn a tool meant for shopping lists into *this*. We've reached the final boss of over-engineering! 🌸✨

              1 Antwort Letzte Antwort
              0
              • gabrielesvelto@mas.toG gabrielesvelto@mas.to

                @pheonix *vibe-coding intensifies*

                pheonix@hachyderm.ioP This user is from outside of this forum
                pheonix@hachyderm.ioP This user is from outside of this forum
                pheonix@hachyderm.io
                schrieb zuletzt editiert von
                #28

                @gabrielesvelto The vibes are definitely...high-decibel today. Stay safe out there! 🌊☕

                1 Antwort Letzte Antwort
                0
                • fandasin@social.linux.pizzaF fandasin@social.linux.pizza

                  @pheonix

                  That made me laugh in the morning! Thank you so much!👍😂

                  pheonix@hachyderm.ioP This user is from outside of this forum
                  pheonix@hachyderm.ioP This user is from outside of this forum
                  pheonix@hachyderm.io
                  schrieb zuletzt editiert von
                  #29

                  @FandaSin Laughter is the only logical response to an 8.8 severity rating for Notepad. Glad it brought a smile to your morning! Stay bright! 😊

                  1 Antwort Letzte Antwort
                  0
                  • bluszcz@mastodon.com.plB bluszcz@mastodon.com.pl

                    @pheonix

                    not the first one, not the last one 😄

                    CVE-2019-12735 CVE-2002-1377 CVE-2016-1248 CVE-2021-43908 CVE-2023-36742 CVE-2020-27955 CVE-2007-5795 CVE-2022-48337 CVE-2024-25255 CVE-2025-49144 (

                    pheonix@hachyderm.ioP This user is from outside of this forum
                    pheonix@hachyderm.ioP This user is from outside of this forum
                    pheonix@hachyderm.io
                    schrieb zuletzt editiert von
                    #30

                    @bluszcz wow

                    1 Antwort Letzte Antwort
                    0
                    • murenius@chaos.socialM murenius@chaos.social

                      @pheonix That's what you get for using AI in development. What could possibly go wrong?

                      pheonix@hachyderm.ioP This user is from outside of this forum
                      pheonix@hachyderm.ioP This user is from outside of this forum
                      pheonix@hachyderm.io
                      schrieb zuletzt editiert von
                      #31

                      @Murenius but..but AGI?

                      1 Antwort Letzte Antwort
                      0
                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                        sarptas@social.vivaldi.netS This user is from outside of this forum
                        sarptas@social.vivaldi.netS This user is from outside of this forum
                        sarptas@social.vivaldi.net
                        schrieb zuletzt editiert von
                        #32

                        @pheonix I never use Notepad for years. I prefer Notepad3 or recently I moved to Zed.

                        https://bsky.app/profile/zed.dev

                        drewtowler@mas.toD 1 Antwort Letzte Antwort
                        0
                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                          mansr@society.oftrolls.comM This user is from outside of this forum
                          mansr@society.oftrolls.comM This user is from outside of this forum
                          mansr@society.oftrolls.com
                          schrieb zuletzt editiert von
                          #33

                          @pheonix You have to click a link. Merely opening the file isn't enough if I'm reading it correctly. That makes it comparable to Internet Explorer back when it would happily download and run any .exe. So pretty stupid.

                          1 Antwort Letzte Antwort
                          0
                          • bsm@swiss.socialB bsm@swiss.social

                            @pheonix

                            One of the reasons, why I use Notepad++ (https://notepad-plus-plus.org/downloads/)

                            jhb17@mastodon.onlineJ This user is from outside of this forum
                            jhb17@mastodon.onlineJ This user is from outside of this forum
                            jhb17@mastodon.online
                            schrieb zuletzt editiert von
                            #34

                            @bsm @pheonix

                            Notepad++ is my go-to choice for most everything. Simple, multi-tab app with good cleanup, find-n-replace, and macro tools.

                            1 Antwort Letzte Antwort
                            0
                            • pheonix@hachyderm.ioP pheonix@hachyderm.io

                              They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                              This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                              Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                              We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                              #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                              martintheg@aus.socialM This user is from outside of this forum
                              martintheg@aus.socialM This user is from outside of this forum
                              martintheg@aus.social
                              schrieb zuletzt editiert von
                              #35

                              @pheonix No, no it is not. All corporate compute needs to be in the sea.

                              1 Antwort Letzte Antwort
                              0
                              • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                skylerhandler@woof.groupS This user is from outside of this forum
                                skylerhandler@woof.groupS This user is from outside of this forum
                                skylerhandler@woof.group
                                schrieb zuletzt editiert von
                                #36

                                @pheonix Given that WordPad had that built in, and MS killed it; not surprised

                                1 Antwort Letzte Antwort
                                0
                                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                  kgmadee2@mathstodon.xyzK This user is from outside of this forum
                                  kgmadee2@mathstodon.xyzK This user is from outside of this forum
                                  kgmadee2@mathstodon.xyz
                                  schrieb zuletzt editiert von
                                  #37

                                  @pheonix and I still think they should have left support for formatted text where it belongs, in WordPad
                                  Notepad could use syntax highlighting & (normal) auto-completion maybe ...

                                  1 Antwort Letzte Antwort
                                  0
                                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                    D This user is from outside of this forum
                                    D This user is from outside of this forum
                                    decebal07@mastodon.social
                                    schrieb zuletzt editiert von
                                    #38

                                    @pheonix Windows 11 = ☠️

                                    1 Antwort Letzte Antwort
                                    0
                                    • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                      donhawkins@mastodon.socialD This user is from outside of this forum
                                      donhawkins@mastodon.socialD This user is from outside of this forum
                                      donhawkins@mastodon.social
                                      schrieb zuletzt editiert von
                                      #39

                                      @pheonix @duniamelayu Linux?

                                      1 Antwort Letzte Antwort
                                      0
                                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                        giantginkgo@mstdn.partyG This user is from outside of this forum
                                        giantginkgo@mstdn.partyG This user is from outside of this forum
                                        giantginkgo@mstdn.party
                                        schrieb zuletzt editiert von
                                        #40

                                        @pheonix Don’t forget that Notepad++ was compromised recently too by state actors… https://notepad-plus-plus.org/news/hijacked-incident-info-update/

                                        1 Antwort Letzte Antwort
                                        0
                                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                          fredrict@mastodon.opportunis.meF This user is from outside of this forum
                                          fredrict@mastodon.opportunis.meF This user is from outside of this forum
                                          fredrict@mastodon.opportunis.me
                                          schrieb zuletzt editiert von
                                          #41

                                          @pheonix I believe nothing has ever been safe 🤔 The only state that approaches it is "not compromized yet" 😅

                                          1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen



                                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Über dieses Forum