Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. They finally did it.

They finally did it.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
noaimicroslopmicrosoftwindowsprogrammingwritingwindows11enshittificationcybersecurityinfosec
68 Beiträge 50 Kommentatoren 1 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • pheonix@hachyderm.ioP pheonix@hachyderm.io

    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

    passenger@kolektiva.socialP This user is from outside of this forum
    passenger@kolektiva.socialP This user is from outside of this forum
    passenger@kolektiva.social
    schrieb zuletzt editiert von
    #6

    @pheonix

    Satya Nadella, 2014: "Microsoft needs to refocus on security for ordinary users and get that right before we even think about adding gimmicky features."

    Satya Nadella, 2026: "...But what if we added more unsecured attack surface?"

    1 Antwort Letzte Antwort
    0
    • pheonix@hachyderm.ioP pheonix@hachyderm.io

      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

      bsm@swiss.socialB This user is from outside of this forum
      bsm@swiss.socialB This user is from outside of this forum
      bsm@swiss.social
      schrieb zuletzt editiert von
      #7

      @pheonix

      One of the reasons, why I use Notepad++ (https://notepad-plus-plus.org/downloads/)

      C jhb17@mastodon.onlineJ 2 Antworten Letzte Antwort
      0
      • bsm@swiss.socialB bsm@swiss.social

        @pheonix

        One of the reasons, why I use Notepad++ (https://notepad-plus-plus.org/downloads/)

        C This user is from outside of this forum
        C This user is from outside of this forum
        clickymcticker@hachyderm.io
        schrieb zuletzt editiert von
        #8

        @bsm @pheonix Oh, did you not hear?

        https://arstechnica.com/security/2026/02/notepad-updater-was-compromised-for-6-months-in-supply-chain-attack/

        bsm@swiss.socialB 1 Antwort Letzte Antwort
        0
        • pheonix@hachyderm.ioP pheonix@hachyderm.io

          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

          13reak@infosec.exchange1 This user is from outside of this forum
          13reak@infosec.exchange1 This user is from outside of this forum
          13reak@infosec.exchange
          schrieb zuletzt editiert von
          #9

          @pheonix

          I'm not surprised...

          A simple cat <file> on the command line can also compromise your system. If you're unsure, you should therefore use cat -v <file> when I'm not mistaken.

          1 Antwort Letzte Antwort
          0
          • C clickymcticker@hachyderm.io

            @bsm @pheonix Oh, did you not hear?

            https://arstechnica.com/security/2026/02/notepad-updater-was-compromised-for-6-months-in-supply-chain-attack/

            bsm@swiss.socialB This user is from outside of this forum
            bsm@swiss.socialB This user is from outside of this forum
            bsm@swiss.social
            schrieb zuletzt editiert von
            #10

            @ClickyMcTicker @pheonix There is no problem with it with the newest version 8.9.1

            stiiin@infosec.spaceS 1 Antwort Letzte Antwort
            0
            • pheonix@hachyderm.ioP pheonix@hachyderm.io

              They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

              This CVE is an 8.8 severity RCE in Notepad of all things lmao.

              Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

              We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

              #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

              di4na@hachyderm.ioD This user is from outside of this forum
              di4na@hachyderm.ioD This user is from outside of this forum
              di4na@hachyderm.io
              schrieb zuletzt editiert von
              #11

              @pheonix nothing can be safe. It is computing. That ship has sailed a loooooong time ago

              1 Antwort Letzte Antwort
              0
              • pheonix@hachyderm.ioP pheonix@hachyderm.io

                They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                gabrielesvelto@mas.toG This user is from outside of this forum
                gabrielesvelto@mas.toG This user is from outside of this forum
                gabrielesvelto@mas.to
                schrieb zuletzt editiert von
                #12

                @pheonix *vibe-coding intensifies*

                pheonix@hachyderm.ioP 1 Antwort Letzte Antwort
                0
                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                  G This user is from outside of this forum
                  G This user is from outside of this forum
                  grimace1298@defcon.social
                  schrieb zuletzt editiert von
                  #13

                  @pheonix Idk how the fcuk they can mess up a simple notepad application. When you add junk (Copilot) it's kinda expected lol. #microslop f-ing company 🤮

                  1 Antwort Letzte Antwort
                  0
                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                    trillytrill@mastodon.artT This user is from outside of this forum
                    trillytrill@mastodon.artT This user is from outside of this forum
                    trillytrill@mastodon.art
                    schrieb zuletzt editiert von
                    #14

                    @pheonix
                    Notepad?? FRIGGIN NOTEPAD? HOW DO YOU SCREW UP SOMETHING LIKE A BASIC-ASS TEXT EDITOR PROGRAM?

                    mkj@social.mkj.earthM pheonix@hachyderm.ioP 2 Antworten Letzte Antwort
                    0
                    • pheonix@hachyderm.ioP pheonix@hachyderm.io

                      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                      vyskocilm@witter.czV This user is from outside of this forum
                      vyskocilm@witter.czV This user is from outside of this forum
                      vyskocilm@witter.cz
                      schrieb zuletzt editiert von
                      #15

                      @pheonix This is the most vibe slop, ever! 😁

                      1 Antwort Letzte Antwort
                      0
                      • trillytrill@mastodon.artT trillytrill@mastodon.art

                        @pheonix
                        Notepad?? FRIGGIN NOTEPAD? HOW DO YOU SCREW UP SOMETHING LIKE A BASIC-ASS TEXT EDITOR PROGRAM?

                        mkj@social.mkj.earthM This user is from outside of this forum
                        mkj@social.mkj.earthM This user is from outside of this forum
                        mkj@social.mkj.earth
                        schrieb zuletzt editiert von
                        #16

                        "How do you screw up [friggin Notepad]?"

                        Gradually, and then suddenly.

                        I think.

                        @trillytrill @pheonix

                        1 Antwort Letzte Antwort
                        0
                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                          jkb@gotosocial.jkbockstael.beJ This user is from outside of this forum
                          jkb@gotosocial.jkbockstael.beJ This user is from outside of this forum
                          jkb@gotosocial.jkbockstael.be
                          schrieb zuletzt editiert von
                          #17

                          @pheonix According to the report you have to click a link in the file, just loading it won't compromise the system.

                          avuko@infosec.exchangeA 1 Antwort Letzte Antwort
                          0
                          • bsm@swiss.socialB bsm@swiss.social

                            @ClickyMcTicker @pheonix There is no problem with it with the newest version 8.9.1

                            stiiin@infosec.spaceS This user is from outside of this forum
                            stiiin@infosec.spaceS This user is from outside of this forum
                            stiiin@infosec.space
                            schrieb zuletzt editiert von
                            #18

                            @bsm @ClickyMcTicker @pheonix Yet

                            1 Antwort Letzte Antwort
                            0
                            • pheonix@hachyderm.ioP pheonix@hachyderm.io

                              They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                              This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                              Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                              We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                              #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                              bdf2121cc3334b35b6ecda66e471@mastodon.socialB This user is from outside of this forum
                              bdf2121cc3334b35b6ecda66e471@mastodon.socialB This user is from outside of this forum
                              bdf2121cc3334b35b6ecda66e471@mastodon.social
                              schrieb zuletzt editiert von
                              #19

                              @pheonix Nothing from Microsoft, no.

                              1 Antwort Letzte Antwort
                              0
                              • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                murenius@chaos.socialM This user is from outside of this forum
                                murenius@chaos.socialM This user is from outside of this forum
                                murenius@chaos.social
                                schrieb zuletzt editiert von
                                #20

                                @pheonix That's what you get for using AI in development. What could possibly go wrong?

                                pheonix@hachyderm.ioP 1 Antwort Letzte Antwort
                                0
                                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                  naahrathescaled@furry.engineerN This user is from outside of this forum
                                  naahrathescaled@furry.engineerN This user is from outside of this forum
                                  naahrathescaled@furry.engineer
                                  schrieb zuletzt editiert von
                                  #21

                                  @pheonix How can you fuckup Markdown support so hard

                                  drwho@masto.hackers.townD 1 Antwort Letzte Antwort
                                  0
                                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                    tiikerikani@dice.campT This user is from outside of this forum
                                    tiikerikani@dice.campT This user is from outside of this forum
                                    tiikerikani@dice.camp
                                    schrieb zuletzt editiert von
                                    #22

                                    @pheonix
                                    STOP UPDATING NOTEPAD

                                    (source: https://www.reddit.com/r/windowsmemes/comments/1plqsi2/stop_updating_notepad/)

                                    1 Antwort Letzte Antwort
                                    0
                                    • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                      bluszcz@mastodon.com.plB This user is from outside of this forum
                                      bluszcz@mastodon.com.plB This user is from outside of this forum
                                      bluszcz@mastodon.com.pl
                                      schrieb zuletzt editiert von
                                      #23

                                      @pheonix

                                      not the first one, not the last one 😄

                                      CVE-2019-12735 CVE-2002-1377 CVE-2016-1248 CVE-2021-43908 CVE-2023-36742 CVE-2020-27955 CVE-2007-5795 CVE-2022-48337 CVE-2024-25255 CVE-2025-49144 (

                                      pheonix@hachyderm.ioP 1 Antwort Letzte Antwort
                                      0
                                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                        bolomkxxviii@mastodon.socialB This user is from outside of this forum
                                        bolomkxxviii@mastodon.socialB This user is from outside of this forum
                                        bolomkxxviii@mastodon.social
                                        schrieb zuletzt editiert von
                                        #24

                                        @pheonix MicroSlop CraPilot.

                                        1 Antwort Letzte Antwort
                                        0
                                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                          mihamarkic@mastodon.socialM This user is from outside of this forum
                                          mihamarkic@mastodon.socialM This user is from outside of this forum
                                          mihamarkic@mastodon.social
                                          schrieb zuletzt editiert von
                                          #25

                                          @pheonix what's an unverified protocol?

                                          1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen



                                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Über dieses Forum