Overview
- Microsoft
- Windows Notepad
Description
Statistics
- 21 Posts
- 709 Interactions
Fediverse
"Windows Notepad App Remote Code Execution Vulnerability"
That's it: I'm going back to AppleWorks, on my Apple IIe.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.
This CVE is an 8.8 severity RCE in Notepad of all things lmao.
Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.
We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
#noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology
someone earlier today said "RCE in Notepad" and i was like "haha funny" and then someone ELSE said RCE in Notepad and then i was like youve gotta be fucking kidding me
"With AI, I can replace 20 software engineers with 1 'prompt engineer'"
A few months later: "plain text editor that was rewritten by AI to be more than that with RCE vulnerability".
(but congratulations to Microsoft for managing to put a remote execution vuln in something that should never have anything 'remote', like notepad)
RE: https://tech.lgbt/@solonovamax/116049115040950367
https://www.cve.org/CVERecord?id=CVE-2026-20841
WHAT'S THE NETWORK ELEMENT in FUCKING NOTEPAD
WHAT BIT COULD IT BEEEEEEEE
edit: ahhh! the notepad thing might not be copilot. the bug is that a URL in a markdown file can actually be a sploit that runs stuff as the user. so this may not be an ai story. dammit.
maybe the real remote code execution vulnerability in Windows Notepad was the friends we made along the way
Microsoft Windows 11 enshitification continues with its screwing up what was a perfectly functional text file editor - Notepad - adding layers of garbage on it and congratulations, Notepad, yes, bleeding Notepad now has a code execution vulnerability on it.
https://www.cve.org/CVERecord?id=CVE-2026-20841
It's only the Windows 11 Notepad they've screwed up - anyone on any earlier version, which for safety's sake should only be online if it is Windows 10 with the Extended Service Updates (new one just today), is fine.
From the WTF department, sorry, I mean from Microsoft: an RCE in Notepad of all things. (Well, the new app with AI and stuff; not the old one.)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
Microsoft: I have made Notepad✨
Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.
A vulnerability in Notepad 🤦♂️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
microsoft: we have made a new notepad.exe
everyone else: you f***ed up a perfectly good text editor, is what you did. look at it. it's got RCE.
The year is 2026. Technology has progressed far. Too far, some would say, as they discover a RCE in fucking Notepad: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
https://www.cve.org/CVERecord?id=CVE-2026-20841
Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.
Notepad
over a network
Kein Kommentar. Wäre nicht zitierfähig. Aber...
RCE im Notizblock?! Wie verstrahlt- uhm "vibed" ist das denn?!
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
Remember when Microslop announced new AI-features in Notepad?
Well… Just as expected, RCEs are part of them.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
What is it, Microsoft shited their pants again lol :neofox_laugh_tears:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
Even this page didn't load properly :neofox_laugh_tears:
#Microsoft #windows
Overview
- Fortinet
- FortiClientEMS
Description
Statistics
- 7 Posts
- 1 Interaction
Fediverse
Fortinet’s CVE-2026-21643 highlights a persistent issue: management and control-plane components remain prime attack surfaces.
SQL injection leading to unauthenticated code execution reinforces the need for rapid patch cycles, continuous monitoring, and segmentation of security tooling.
Source: https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
💬 How are you reducing blast radius for management infrastructure?
🔔 Follow @technadu for threat-focused security coverage
#Infosec #Fortinet #VulnerabilityResearch #SQLInjection #ZeroTrust #CyberDefense #TechNadu
Bluesky
Overview
Description
Statistics
- 4 Posts
- 40 Interactions
Fediverse
I can't remember if I cried
When my `-f root` hit an ACL line
But something touched me deep inside…
The day the telnet died
On January 14, 2026, global telnet traffic observed by the GreyNoise Global Observation Grid fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing (telnet-wise) from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.
https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
*Donning a tinfoil hat…*
"On January 14, 2026, at approximately 21:00 UTC, something changed in the internet’s plumbing. The GreyNoise Global Observation Grid recorded a sudden, sustained collapse in global telnet traffic…
"Six days later, on January 20, the security advisory for CVE-2026-24061 hit oss-security."
https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
Blue Team, heads up!
Della CVE-2026-24061 si è già parlato: ad ogni modo in lungo e in largo.
Qua la mia analisi.
https://blog.lobsec.com/2026/02/cve-2026-24061-telnetd-exploit/
Overview
- BeyondTrust
- Remote Support(RS) & Privileged Remote Access(PRA)
Description
Statistics
- 6 Posts
- 7 Interactions
Fediverse
Bluesky
Overview
Description
Statistics
- 3 Posts
- 25 Interactions
Fediverse
83% of observed Ivanti EPMM exploitation (CVE-2026-1281) traces to one bulletproof IP that isn't on any published IOC list. The IPs that are? VPN exits with zero Ivanti activity. We broke down who's actually doing this ⬇️ https://www.greynoise.io/blog/active-ivanti-exploitation
Bluesky
Overview
- Red Hat
- Red Hat build of Keycloak 26.2
- rhbk/keycloak-operator-bundle
Description
Statistics
- 2 Posts
- 6 Interactions
Fediverse
https://access.redhat.com/security/cve/cve-2026-1529
#JWT
Overview
- SolarWinds
- Web Help Desk
Description
Statistics
- 2 Posts
- 1 Interaction
Bluesky
Overview
- Microsoft
- Windows Server 2022
Description
Statistics
- 2 Posts
Fediverse
A newly documented Windows vulnerability, CVE-2026-20817, affects the Windows Error Reporting Service (WER), allowing local privilege escalation by enabling attackers to launch helper processes without proper authorization. Microsoft's mitigation involves disabling the vulnerable launch feature via a flag, and users are advised to patch promptly and monitor for suspicious process creation related to WerFault.exe or WerMgr.exe.
https://gbhackers.com/windows-error-reporting-flaw/
Overview
- wpvividplugins
- Migration, Backup, Staging – WPvivid Backup & Migration
Description
Statistics
- 2 Posts
Fediverse
A critical arbitrary file upload vulnerability (CVE-2026-1357, CVSS 9.8) was discovered in the WPvivid Backup & Migration plugin, which is installed on over 800,000 WordPress sites.
The flaw allows unauthenticated attackers to upload arbitrary files, potentially achieving remote code execution and full site takeover.
Update to version 0.9.124. Wordfence Premium users received firewall protection on January 22.
🚨 CRITICAL: CVE-2026-1357 impacts WPvivid Backup & Migration (all versions). Unauthenticated file upload via directory traversal enables RCE. Disable plugin or restrict access immediately! https://radar.offseq.com/threat/cve-2026-1357-cwe-434-unrestricted-upload-of-file--8f35918d #OffSeq #WordPress #Infosec #CVE20261357
Overview
- SAP_SE
- SAP CRM and SAP S/4HANA (Scripting Editor)
Description
Statistics
- 2 Posts
- 5 Interactions
Fediverse
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.
https://vulnerability.circl.lu/vuln/cve-2026-0488
#sap #vulnerability #cybersecurity #cve
CVE-2026-0488