Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. They finally did it.

They finally did it.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
noaimicroslopmicrosoftwindowsprogrammingwritingwindows11enshittificationcybersecurityinfosec
68 Beiträge 50 Kommentatoren 1 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • murenius@chaos.socialM murenius@chaos.social

    @pheonix That's what you get for using AI in development. What could possibly go wrong?

    pheonix@hachyderm.ioP This user is from outside of this forum
    pheonix@hachyderm.ioP This user is from outside of this forum
    pheonix@hachyderm.io
    schrieb zuletzt editiert von
    #31

    @Murenius but..but AGI?

    1 Antwort Letzte Antwort
    0
    • pheonix@hachyderm.ioP pheonix@hachyderm.io

      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

      sarptas@social.vivaldi.netS This user is from outside of this forum
      sarptas@social.vivaldi.netS This user is from outside of this forum
      sarptas@social.vivaldi.net
      schrieb zuletzt editiert von
      #32

      @pheonix I never use Notepad for years. I prefer Notepad3 or recently I moved to Zed.

      https://bsky.app/profile/zed.dev

      drewtowler@mas.toD 1 Antwort Letzte Antwort
      0
      • pheonix@hachyderm.ioP pheonix@hachyderm.io

        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

        mansr@society.oftrolls.comM This user is from outside of this forum
        mansr@society.oftrolls.comM This user is from outside of this forum
        mansr@society.oftrolls.com
        schrieb zuletzt editiert von
        #33

        @pheonix You have to click a link. Merely opening the file isn't enough if I'm reading it correctly. That makes it comparable to Internet Explorer back when it would happily download and run any .exe. So pretty stupid.

        1 Antwort Letzte Antwort
        0
        • bsm@swiss.socialB bsm@swiss.social

          @pheonix

          One of the reasons, why I use Notepad++ (https://notepad-plus-plus.org/downloads/)

          jhb17@mastodon.onlineJ This user is from outside of this forum
          jhb17@mastodon.onlineJ This user is from outside of this forum
          jhb17@mastodon.online
          schrieb zuletzt editiert von
          #34

          @bsm @pheonix

          Notepad++ is my go-to choice for most everything. Simple, multi-tab app with good cleanup, find-n-replace, and macro tools.

          1 Antwort Letzte Antwort
          0
          • pheonix@hachyderm.ioP pheonix@hachyderm.io

            They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

            This CVE is an 8.8 severity RCE in Notepad of all things lmao.

            Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

            We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

            https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

            #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

            martintheg@aus.socialM This user is from outside of this forum
            martintheg@aus.socialM This user is from outside of this forum
            martintheg@aus.social
            schrieb zuletzt editiert von
            #35

            @pheonix No, no it is not. All corporate compute needs to be in the sea.

            1 Antwort Letzte Antwort
            0
            • pheonix@hachyderm.ioP pheonix@hachyderm.io

              They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

              This CVE is an 8.8 severity RCE in Notepad of all things lmao.

              Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

              We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

              #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

              skylerhandler@woof.groupS This user is from outside of this forum
              skylerhandler@woof.groupS This user is from outside of this forum
              skylerhandler@woof.group
              schrieb zuletzt editiert von
              #36

              @pheonix Given that WordPad had that built in, and MS killed it; not surprised

              1 Antwort Letzte Antwort
              0
              • pheonix@hachyderm.ioP pheonix@hachyderm.io

                They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                kgmadee2@mathstodon.xyzK This user is from outside of this forum
                kgmadee2@mathstodon.xyzK This user is from outside of this forum
                kgmadee2@mathstodon.xyz
                schrieb zuletzt editiert von
                #37

                @pheonix and I still think they should have left support for formatted text where it belongs, in WordPad
                Notepad could use syntax highlighting & (normal) auto-completion maybe ...

                1 Antwort Letzte Antwort
                0
                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                  D This user is from outside of this forum
                  D This user is from outside of this forum
                  decebal07@mastodon.social
                  schrieb zuletzt editiert von
                  #38

                  @pheonix Windows 11 = ☠️

                  1 Antwort Letzte Antwort
                  0
                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                    donhawkins@mastodon.socialD This user is from outside of this forum
                    donhawkins@mastodon.socialD This user is from outside of this forum
                    donhawkins@mastodon.social
                    schrieb zuletzt editiert von
                    #39

                    @pheonix @duniamelayu Linux?

                    1 Antwort Letzte Antwort
                    0
                    • pheonix@hachyderm.ioP pheonix@hachyderm.io

                      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                      giantginkgo@mstdn.partyG This user is from outside of this forum
                      giantginkgo@mstdn.partyG This user is from outside of this forum
                      giantginkgo@mstdn.party
                      schrieb zuletzt editiert von
                      #40

                      @pheonix Don’t forget that Notepad++ was compromised recently too by state actors… https://notepad-plus-plus.org/news/hijacked-incident-info-update/

                      1 Antwort Letzte Antwort
                      0
                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                        fredrict@mastodon.opportunis.meF This user is from outside of this forum
                        fredrict@mastodon.opportunis.meF This user is from outside of this forum
                        fredrict@mastodon.opportunis.me
                        schrieb zuletzt editiert von
                        #41

                        @pheonix I believe nothing has ever been safe 🤔 The only state that approaches it is "not compromized yet" 😅

                        1 Antwort Letzte Antwort
                        0
                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                          clickhere@mastodon.ieC This user is from outside of this forum
                          clickhere@mastodon.ieC This user is from outside of this forum
                          clickhere@mastodon.ie
                          schrieb zuletzt editiert von
                          #42

                          @pheonix Oh ffs

                          Right, it's back to pen and paper, so. JMJ.

                          pheonix@hachyderm.ioP 1 Antwort Letzte Antwort
                          0
                          • pheonix@hachyderm.ioP pheonix@hachyderm.io

                            They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                            This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                            Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                            We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                            https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                            #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                            chessert@mastodon.onlineC This user is from outside of this forum
                            chessert@mastodon.onlineC This user is from outside of this forum
                            chessert@mastodon.online
                            schrieb zuletzt editiert von
                            #43

                            @pheonix

                            This is hilarious. Next time hire some experienced, qualified, human coders? 🤣

                            1 Antwort Letzte Antwort
                            0
                            • pheonix@hachyderm.ioP pheonix@hachyderm.io

                              They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                              This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                              Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                              We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                              #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                              ploum@mamot.frP This user is from outside of this forum
                              ploum@mamot.frP This user is from outside of this forum
                              ploum@mamot.fr
                              schrieb zuletzt editiert von
                              #44

                              @pheonix :

                              insert meme.

                              "wait, is Microsoft a huge security hole?"

                              "always have been"

                              1 Antwort Letzte Antwort
                              0
                              • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                sibrosan@mastodon.socialS This user is from outside of this forum
                                sibrosan@mastodon.socialS This user is from outside of this forum
                                sibrosan@mastodon.social
                                schrieb zuletzt editiert von
                                #45

                                @pheonix Valt het jullie ook op dat een klaarstaande Windows-update de werking van applicaties beïnvloedt? Als programma's op een vreemde manier reageren en het icoontje "afsluiten en updaten" is zichtbaar, weet ik al weer hoe laat het is. Na updaten en herstarten werkt het dan weer normaal.

                                1 Antwort Letzte Antwort
                                0
                                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                  colin_cz@mastodon.socialC This user is from outside of this forum
                                  colin_cz@mastodon.socialC This user is from outside of this forum
                                  colin_cz@mastodon.social
                                  schrieb zuletzt editiert von
                                  #46

                                  @pheonix another reason to switch on linux, only thing that can hold someone from switching is adobe software

                                  1 Antwort Letzte Antwort
                                  0
                                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                    oatmeal@kolektiva.socialO This user is from outside of this forum
                                    oatmeal@kolektiva.socialO This user is from outside of this forum
                                    oatmeal@kolektiva.social
                                    schrieb zuletzt editiert von
                                    #47

                                    @pheonix @microsoft always delivers

                                    1 Antwort Letzte Antwort
                                    0
                                    • avuko@infosec.exchangeA avuko@infosec.exchange

                                      @jkb @pheonix That seems to be the case, although the weakness is in Microsoft Notepad incorrectly handling “an unverified protocol”, not in something the user then has to do or interact with. Besides clicking a link.

                                      This reads to me like an URI protocol handling issue.

                                      And that functionality is not something they’d have to reinvent or vibe code.

                                      You know, with their proprietary plain text editor running on their proprietary OS, and next to their proprietary file explorer, their proprietary internet browser, their proprietary email client and proprietary network agents.

                                      All their proprietary software handling URI protocols… RIGHT THERE.

                                      jkb@gotosocial.jkbockstael.beJ This user is from outside of this forum
                                      jkb@gotosocial.jkbockstael.beJ This user is from outside of this forum
                                      jkb@gotosocial.jkbockstael.be
                                      schrieb zuletzt editiert von
                                      #48

                                      @avuko @pheonix Yes, indeed. And yes indeed this is something that should have never happened, the whole situation is shameful.

                                      I was just pointing out that this vulnerability requires additional user input (albeit a very likely user input that normally shouldn't raise any concern), it's not one of those nightmare situations in which the mere opening of a file triggers an exploit.

                                      1 Antwort Letzte Antwort
                                      0
                                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                        fabio@manganiello.euF This user is from outside of this forum
                                        fabio@manganiello.euF This user is from outside of this forum
                                        fabio@manganiello.eu
                                        schrieb zuletzt editiert von
                                        #49

                                        @pheonix@hachyderm.io the thing is that there are many, many safe existing libraries to properly render and parse #Markdown without exposing yourself to RCE.

                                        But my guess is that some project manager at #Microsoft simply went like "nah, I don't want to wrestle with those licensing issues - just implement a Markdown parser/renderer from scratch, specifically tailored for all the legacy code we have in Notepad, with this over-stretched team of 3 contractors, and get it done by the end of the quarter".

                                        mkj@social.mkj.earthM jc0f0116@infosec.exchangeJ 2 Antworten Letzte Antwort
                                        0
                                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                          https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841

                                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                          sauc3@hachyderm.ioS This user is from outside of this forum
                                          sauc3@hachyderm.ioS This user is from outside of this forum
                                          sauc3@hachyderm.io
                                          schrieb zuletzt editiert von
                                          #50

                                          @pheonix

                                          I, for one, am shocked the company going all in on spicy autocorrect keeps having worsening security issues. Thank goodness they take security seriously! /s

                                          It is really something watching a company you hate burning itself to the ground.

                                          1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen



                                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Über dieses Forum