Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. They finally did it.

They finally did it.

Scheduled Pinned Locked Moved Uncategorized
noaimicroslopmicrosoftwindowsprogramming
42 Posts 36 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • pheonix@hachyderm.ioP pheonix@hachyderm.io

    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

    Security Update Guide - Microsoft Security Response Center

    favicon

    (msrc.microsoft.com)

    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

    Link Preview Image
    mihamarkic@mastodon.socialM This user is from outside of this forum
    mihamarkic@mastodon.socialM This user is from outside of this forum
    mihamarkic@mastodon.social
    wrote last edited by
    #23

    @pheonix what's an unverified protocol?

    1 Reply Last reply
    0
    • avuko@infosec.exchangeA This user is from outside of this forum
      avuko@infosec.exchangeA This user is from outside of this forum
      avuko@infosec.exchange
      wrote last edited by
      #24

      @jkb @pheonix That seems to be the case, although the weakness is in Microsoft Notepad incorrectly handling “an unverified protocol”, not in something the user then has to do or interact with. Besides clicking a link.

      This reads to me like an URI protocol handling issue.

      And that functionality is not something they’d have to reinvent or vibe code.

      You know, with their proprietary plain text editor running on their proprietary OS, and next to their proprietary file explorer, their proprietary internet browser, their proprietary email client and proprietary network agents.

      All their proprietary software handling URI protocols… RIGHT THERE.

      jkb@gotosocial.jkbockstael.beJ 1 Reply Last reply
      0
      • trillytrill@mastodon.artT trillytrill@mastodon.art

        @pheonix
        Notepad?? FRIGGIN NOTEPAD? HOW DO YOU SCREW UP SOMETHING LIKE A BASIC-ASS TEXT EDITOR PROGRAM?

        pheonix@hachyderm.ioP This user is from outside of this forum
        pheonix@hachyderm.ioP This user is from outside of this forum
        pheonix@hachyderm.io
        wrote last edited by
        #25

        @trillytrill I know, right? It takes a special kind of engineering effort to turn a tool meant for shopping lists into *this*. We've reached the final boss of over-engineering! 🌸✨

        1 Reply Last reply
        0
        • gabrielesvelto@mas.toG gabrielesvelto@mas.to

          @pheonix *vibe-coding intensifies*

          pheonix@hachyderm.ioP This user is from outside of this forum
          pheonix@hachyderm.ioP This user is from outside of this forum
          pheonix@hachyderm.io
          wrote last edited by
          #26

          @gabrielesvelto The vibes are definitely...high-decibel today. Stay safe out there! 🌊☕

          1 Reply Last reply
          0
          • fandasin@social.linux.pizzaF fandasin@social.linux.pizza

            @pheonix

            That made me laugh in the morning! Thank you so much!👍😂

            pheonix@hachyderm.ioP This user is from outside of this forum
            pheonix@hachyderm.ioP This user is from outside of this forum
            pheonix@hachyderm.io
            wrote last edited by
            #27

            @FandaSin Laughter is the only logical response to an 8.8 severity rating for Notepad. Glad it brought a smile to your morning! Stay bright! 😊

            1 Reply Last reply
            0
            • bluszcz@mastodon.com.plB bluszcz@mastodon.com.pl

              @pheonix

              not the first one, not the last one 😄

              CVE-2019-12735 CVE-2002-1377 CVE-2016-1248 CVE-2021-43908 CVE-2023-36742 CVE-2020-27955 CVE-2007-5795 CVE-2022-48337 CVE-2024-25255 CVE-2025-49144 (

              pheonix@hachyderm.ioP This user is from outside of this forum
              pheonix@hachyderm.ioP This user is from outside of this forum
              pheonix@hachyderm.io
              wrote last edited by
              #28

              @bluszcz wow

              1 Reply Last reply
              0
              • murenius@chaos.socialM murenius@chaos.social

                @pheonix That's what you get for using AI in development. What could possibly go wrong?

                pheonix@hachyderm.ioP This user is from outside of this forum
                pheonix@hachyderm.ioP This user is from outside of this forum
                pheonix@hachyderm.io
                wrote last edited by
                #29

                @Murenius but..but AGI?

                1 Reply Last reply
                0
                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                  Security Update Guide - Microsoft Security Response Center

                  favicon

                  (msrc.microsoft.com)

                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                  Link Preview Image
                  sarptas@social.vivaldi.netS This user is from outside of this forum
                  sarptas@social.vivaldi.netS This user is from outside of this forum
                  sarptas@social.vivaldi.net
                  wrote last edited by
                  #30

                  @pheonix I never use Notepad for years. I prefer Notepad3 or recently I moved to Zed.

                  Link Preview Image
                  Zed (@zed.dev)

                  A next-generation code editor that enables high-performance collaboration with AI and your team. zed.dev

                  favicon

                  Bluesky Social (bsky.app)

                  1 Reply Last reply
                  0
                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                    Security Update Guide - Microsoft Security Response Center

                    favicon

                    (msrc.microsoft.com)

                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                    Link Preview Image
                    mansr@society.oftrolls.comM This user is from outside of this forum
                    mansr@society.oftrolls.comM This user is from outside of this forum
                    mansr@society.oftrolls.com
                    wrote last edited by
                    #31

                    @pheonix You have to click a link. Merely opening the file isn't enough if I'm reading it correctly. That makes it comparable to Internet Explorer back when it would happily download and run any .exe. So pretty stupid.

                    1 Reply Last reply
                    0
                    • pheonix@hachyderm.ioP pheonix@hachyderm.io

                      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                      Security Update Guide - Microsoft Security Response Center

                      favicon

                      (msrc.microsoft.com)

                      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                      Link Preview Image
                      skylerhandler@woof.groupS This user is from outside of this forum
                      skylerhandler@woof.groupS This user is from outside of this forum
                      skylerhandler@woof.group
                      wrote last edited by
                      #32

                      @pheonix Given that WordPad had that built in, and MS killed it; not surprised

                      1 Reply Last reply
                      0
                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                        Security Update Guide - Microsoft Security Response Center

                        favicon

                        (msrc.microsoft.com)

                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                        Link Preview Image
                        kgmadee2@mathstodon.xyzK This user is from outside of this forum
                        kgmadee2@mathstodon.xyzK This user is from outside of this forum
                        kgmadee2@mathstodon.xyz
                        wrote last edited by
                        #33

                        @pheonix and I still think they should have left support for formatted t3xt where it belongs, in Wordpad
                        Notepad could use syntax highlighting & auto-completion maybe ...

                        1 Reply Last reply
                        0
                        • pheonix@hachyderm.ioP pheonix@hachyderm.io

                          They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                          This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                          Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                          We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                          Security Update Guide - Microsoft Security Response Center

                          favicon

                          (msrc.microsoft.com)

                          #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                          Link Preview Image
                          D This user is from outside of this forum
                          D This user is from outside of this forum
                          decebal07@mastodon.social
                          wrote last edited by
                          #34

                          @pheonix Windows 11 = ☠️

                          1 Reply Last reply
                          0
                          • pheonix@hachyderm.ioP pheonix@hachyderm.io

                            They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                            This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                            Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                            We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                            Security Update Guide - Microsoft Security Response Center

                            favicon

                            (msrc.microsoft.com)

                            #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                            Link Preview Image
                            donhawkins@mastodon.socialD This user is from outside of this forum
                            donhawkins@mastodon.socialD This user is from outside of this forum
                            donhawkins@mastodon.social
                            wrote last edited by
                            #35

                            @pheonix @duniamelayu Linux?

                            1 Reply Last reply
                            0
                            • pheonix@hachyderm.ioP pheonix@hachyderm.io

                              They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                              This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                              Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                              We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                              Security Update Guide - Microsoft Security Response Center

                              favicon

                              (msrc.microsoft.com)

                              #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                              Link Preview Image
                              giantginkgo@mstdn.partyG This user is from outside of this forum
                              giantginkgo@mstdn.partyG This user is from outside of this forum
                              giantginkgo@mstdn.party
                              wrote last edited by
                              #36

                              @pheonix Don’t forget that Notepad++ was compromised recently too by state actors… https://notepad-plus-plus.org/news/hijacked-incident-info-update/

                              1 Reply Last reply
                              0
                              • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                Security Update Guide - Microsoft Security Response Center

                                favicon

                                (msrc.microsoft.com)

                                #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                Link Preview Image
                                fredrict@mastodon.opportunis.meF This user is from outside of this forum
                                fredrict@mastodon.opportunis.meF This user is from outside of this forum
                                fredrict@mastodon.opportunis.me
                                wrote last edited by
                                #37

                                @pheonix I believe nothing has ever been safe 🤔 The only state that approaches it is "not compromized yet" 😅

                                1 Reply Last reply
                                0
                                • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                  They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                  This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                  Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                  We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                  Security Update Guide - Microsoft Security Response Center

                                  favicon

                                  (msrc.microsoft.com)

                                  #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                  Link Preview Image
                                  clickhere@mastodon.ieC This user is from outside of this forum
                                  clickhere@mastodon.ieC This user is from outside of this forum
                                  clickhere@mastodon.ie
                                  wrote last edited by
                                  #38

                                  @pheonix Oh ffs

                                  Right, it's back to pen and paper, so. JMJ.

                                  Link Preview Image
                                  1 Reply Last reply
                                  0
                                  • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                    They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                    This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                    Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                    We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                    Security Update Guide - Microsoft Security Response Center

                                    favicon

                                    (msrc.microsoft.com)

                                    #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                    Link Preview Image
                                    ploum@mamot.frP This user is from outside of this forum
                                    ploum@mamot.frP This user is from outside of this forum
                                    ploum@mamot.fr
                                    wrote last edited by
                                    #39

                                    @pheonix :

                                    insert meme.

                                    "wait, is Microsoft a huge security hole?"

                                    "always have been"

                                    1 Reply Last reply
                                    0
                                    • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                      They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                      This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                      Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                      We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                      Security Update Guide - Microsoft Security Response Center

                                      favicon

                                      (msrc.microsoft.com)

                                      #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                      Link Preview Image
                                      sibrosan@mastodon.socialS This user is from outside of this forum
                                      sibrosan@mastodon.socialS This user is from outside of this forum
                                      sibrosan@mastodon.social
                                      wrote last edited by
                                      #40

                                      @pheonix Valt het jullie ook op dat een klaarstaande Windows-update de werking van applicaties beïnvloedt? Als programma's op een vreemde manier reageren en het icoontje "afsluiten en updaten" is zichtbaar, weet ik al weer hoe laat het is. Na updaten en herstarten werkt het dan weer normaal.

                                      1 Reply Last reply
                                      0
                                      • pheonix@hachyderm.ioP pheonix@hachyderm.io

                                        They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.

                                        This CVE is an 8.8 severity RCE in Notepad of all things lmao.

                                        Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.

                                        We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? 😭

                                        Security Update Guide - Microsoft Security Response Center

                                        favicon

                                        (msrc.microsoft.com)

                                        #noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology

                                        Link Preview Image
                                        colin_cz@mastodon.socialC This user is from outside of this forum
                                        colin_cz@mastodon.socialC This user is from outside of this forum
                                        colin_cz@mastodon.social
                                        wrote last edited by
                                        #41

                                        @pheonix another reason to switch on linux, only thing that can hold someone from switching is adobe software

                                        1 Reply Last reply
                                        0
                                        • avuko@infosec.exchangeA avuko@infosec.exchange

                                          @jkb @pheonix That seems to be the case, although the weakness is in Microsoft Notepad incorrectly handling “an unverified protocol”, not in something the user then has to do or interact with. Besides clicking a link.

                                          This reads to me like an URI protocol handling issue.

                                          And that functionality is not something they’d have to reinvent or vibe code.

                                          You know, with their proprietary plain text editor running on their proprietary OS, and next to their proprietary file explorer, their proprietary internet browser, their proprietary email client and proprietary network agents.

                                          All their proprietary software handling URI protocols… RIGHT THERE.

                                          jkb@gotosocial.jkbockstael.beJ This user is from outside of this forum
                                          jkb@gotosocial.jkbockstael.beJ This user is from outside of this forum
                                          jkb@gotosocial.jkbockstael.be
                                          wrote last edited by
                                          #42

                                          @avuko @pheonix Yes, indeed. And yes indeed this is something that should have never happened, the whole situation is shameful.

                                          I was just pointing out that this vulnerability requires additional user input (albeit a very likely user input that normally shouldn't raise any concern), it's not one of those nightmare situations in which the mere opening of a file triggers an exploit.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups