24h | 7d | 30d

Overview

  • Microsoft
  • Windows Notepad

10 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.08%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.

Statistics

  • 32 Posts
  • 105 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback
  • 22
  • 32
  • 0
  • 22h ago
Profile picture fallback

Что ни день, то повод посмеяться над микрослопом.

Была обнаружена уязвимость, которая позволяет злоумышленникам запускать произвольный код на компьютере жертвы через БЛОКНОТ, сука. Серьёзность уязвимости помечена как ВЫСОКАЯ

cve.org/CVERecord?id=CVE-2026-

  • 2
  • 1
  • 0
  • 22h ago
Profile picture fallback

🔥 Notepad colpito da vulnerabilità critica
Notepad in Windows 11 espone milioni di PC a un attacco remoto: la vulnerabilità CVE-2026-20841 sfrutta il supporto Markdown per eseguire codice malevolo con un semplice clic su un link

gomoot.com/notepad-di-windows-

#news #notepad #sicurezza #tech

  • 2
  • 0
  • 0
  • 18h ago
Profile picture fallback

1976:
In fünfzig Jahren werden wir fliegende Autos haben.

2026:
Schwere Sicherheitslücke in ... Notepad.

msrc.microsoft.com/update-guid

  • 1
  • 6
  • 0
  • 22h ago
Profile picture fallback

Notepad++: alcune mie versioni erano vulnerabili

MS Notepad: hold my beer

msrc.microsoft.com/update-guid

  • 1
  • 3
  • 0
  • 20h ago
Profile picture fallback

Windows Notepad.exe CVE announced today, looks like code can be made to run on your machine if you click a dodgy markdown link. People describing it online as remote code execution, which I don't think it is. Still pretty bad though! #cve #Microsoft #Windows11
cve.org/CVERecord?id=CVE-2026-

  • 1
  • 2
  • 0
  • 23h ago
Profile picture fallback

Notepad... NOTEPAD!

CVE Record: CVE-2026-20841

cve.org/CVERecord?id=CVE-2026-

  • 1
  • 1
  • 0
  • 23h ago
Profile picture fallback

If there was ever a better time to leave #Windows than after #Microsoft started pushing AI and non-plaintext rendering into #Notepad causing #cve202620841 for #RCE then I'm not sure when a better time could be.

windowsforum.com/threads/cve-2

  • 1
  • 1
  • 0
  • 19h ago
Profile picture fallback
>a fucking plaintext editor has a RCE vuln
clown world

https://www.cve.org/CVERecord?id=CVE-2026-20841
  • 1
  • 1
  • 0
  • 10h ago
Profile picture fallback

So yes, Microsoft did manage to enshittify notepad too: cve.org/CVERecord?id=CVE-2026-

A more-than-mature 30+ years old dumb utility to display text got rewritten to do "shtuff" and got pwned with a 8.8 CVSS.

Management, corporations and their demented KPIs should stay away from software.

  • 1
  • 0
  • 0
  • 18h ago
Profile picture fallback

Be sure to keep up with your text editor’s security updates, fellow Notepad users! I heard that vi fans are exploiting this in the wild to install ransomware on people’s computers. The ransomware won’t let you exit vi until you pay up cve.org/CVERecord?id=CVE-2026-

  • 0
  • 4
  • 0
  • 19h ago
Profile picture fallback

Falha crítica no Bloco de notas (CVE-2026-20841). Um invasor poderia colocar um link malicioso em um arquivo Markdown que, ao ser clicado pela vítima, executaria códigos remotamente. Quem mandou macular a simplicidade do Bloco de notas? Já tem correção disponível. cve.org/CVERecord?id=CVE-2026-

  • 0
  • 3
  • 0
  • 21h ago
Profile picture fallback

The Vibe-coding Era at Microsoft is going greaaaaaaaat.... msrc.microsoft.com/update-guid

  • 0
  • 3
  • 0
  • 16h ago
Profile picture fallback

Remote Code Execution on notepad
FUCKING NOTEPAD

Microsoft, keep your claws out of the working code! Notepad does NOT need upgrades to be anything else than an entirely plain text editor.

msrc.microsoft.com/update-guid

  • 0
  • 2
  • 0
  • 20h ago
Profile picture fallback

Really looking forward to the analysis of this remote code execution vulnerability in [checks notes] Windows Notepad

cve.org/CVERecord?id=CVE-2026-

  • 0
  • 1
  • 0
  • 23h ago
Profile picture fallback

@odo
From cve.org/CVERecord?id=CVE-2026-
> Improper neutralization of special elements used in a command ('command injection') […]

So maybe notepad just runs something like
```cmd
start "" $link_src
```

And when you write something like
```md
[trust me bro](mailto:foo@bar.baz & echo u pwnd)
```
in your md ...

It maybe translates to something like
```cmd
start "" mailto:foo@bar.baz & echo u pwnd
```

I don't know what the actual vuln is. But sounds like something like the above. Hopefully not that simple. 🤞

@AmeliaBR

  • 0
  • 1
  • 0
  • 12h ago
Profile picture fallback

What the.. how?

Notepad was the simplest application on windows. What have they done to it?

cve.org/CVERecord?id=CVE-2026-

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

Imagine being jail to an operating system where even the blast editor is vulnerable

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.

cve.org/CVERecord?id=CVE-2026-

Keep contributing and funding alternatives for all of us.

#windows #linux #foss #infosec #opensource

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

Looks like the vibe coders at Microsoft forgot to add "don't introduce command injection vulnerabilities" to their prompts?

cve.org/CVERecord?id=CVE-2026-

  • 0
  • 0
  • 0
  • 16h ago

Bluesky

Profile picture fallback
Here's my CVE-2026-20841 PoC (Not really, but I have a feeling it's something that rhymes with this).
  • 1
  • 3
  • 1
  • 16h ago
Profile picture fallback
Windows Notepad App Remote Code Execution Vulnerability CVE-2026-20841
  • 1
  • 2
  • 2
  • 19h ago
Profile picture fallback
🌐Windows メモ帳アプリのリモートコード実行の脆弱性 https://www.cve.org/CVERecord?id=CVE-2026-20841 via #HackerNews
  • 0
  • 1
  • 0
  • 18h ago
Profile picture fallback
La vulnérabilité CVE-2026-20841 sur Notepad (Windows 11) est incroyable 😨 : exécution de code à l'ouverture d'un fichier markedown (.md) Mettez dedans : [boum](file://c:/windows/system32/calc.exe) Ouvrez le en mode markdown et 💥 Méfiez-vous des fichiers md ! msrc.microsoft.com/update-guide...
  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback
Notepad's Markdown support contains a vulnerability (CVE-2026-20841) that can achieve remote code execution when users open a malicious Markdown file and click a link.
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
A Notepad Markdown vulnerability allowed remote code execution via malicious links; Microsoft patched CVE-2026-20841 and found no evidence of exploitation.
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
在微软 2026 年 2 月周二补丁日中,修改了 58 个漏洞,其中包括 6 个被积极利用的漏洞和 3 个公开披露的零日漏洞。其中有一个被评估为高严重性的 8.8 分漏洞 CVE-2026-20841:Windows
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Microsoft's Notepad Got Pwned (CVE-2026-20841)
  • 0
  • 0
  • 0
  • Last hour

Overview

  • GNU
  • Inetutils

21 Jan 2026
Published
10 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
36.95%

Description

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Statistics

  • 8 Posts
  • 96 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. cve.org/CVERecord?id=CVE-2026-

  • 23
  • 33
  • 0
  • 11h ago
Profile picture fallback

2026-01-14: Il giorno in cui telnet morì

Il 14 gennaio 2026, il traffico #telnet globale osservato dai sensori di GreyNoise è crollato. Una riduzione sostenuta del 59%, diciotto ASN completamente silenziosi e cinque paesi completamente scomparsi dai nostri dati. Sei giorni dopo, la CVE-2026-24061 è scomparsa. La coincidenza è una delle possibili spiegazioni.

labs.greynoise.io/grimoire/202

@informatica

  • 1
  • 0
  • 0
  • 22h ago
Profile picture fallback

Fixed Issues

> Fixed a security vulnerability regarding telnetd (CVE-2026-24061).

Thanks Synology.

  • 0
  • 7
  • 0
  • 10h ago

Bluesky

Profile picture fallback
💡 Summary: 2026年1月14日、グローバルのTelnetトラフィックが急減する「分岐」が発生。多くのASや国でTelnetセッションが一斉に減少し、特定のトランジット事業者がポート23のフィルタリングを実施した可能性が示唆された。これと同時期にGNU Inetutils Telnetdの深刻な認証回避脆弱性CVE-2026-24061が公表され、脆弱性周知と合わせたインフラ側の対応が進んだと推測される。現状、Telnetトラフィックは依然として基線の約3割程度に低下したままで、今後の対策としてTelnetdの更新・無効化が推奨されている。
  • 1
  • 1
  • 0
  • 17h ago
Profile picture fallback
https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/ 2026年1月14日、世界のTelnetトラフィックが突如59%減少しました。 これは、深刻なTelnetの脆弱性(CVE-2026-24061)が公表される6日前の出来事です。 Tier 1プロバイダーがCVE公開前にポート23のフィルタリングを実施した可能性が指摘されています。
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Tier-1 transit operators likely applied port 23 filtering after advance warning of a critical GNU InetUtils telnetd flaw (CVE-2026-24061), collapsing Telnet traffic.
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
How CVE-2026–24061 Grants Instant Root via Telnet https://medium.com/@mhammadalkhateeb22/how-cve-2026-24061-grants-instant-root-via-telnet-ad49019572e6?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Apple
  • macOS

11 Feb 2026
Published
12 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

Statistics

  • 5 Posts
  • 13 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-20700 impacts Apple macOS, iOS, iPadOS & more before v26.3. Memory corruption enables arbitrary code execution — exploited in sophisticated, targeted attacks. Urgently update all devices! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

📣 EMERGENCY UPDATES 📣

Apple pushed updates for 1 new zero-day that may have been actively exploited and is linked to CVE-2025-14174 and CVE-2025-43529 which were fixed in iOS 26.2.

🐛 CVE-2026-20700 (dyld):
- iOS and iPadOS 26.3
- macOS Tahoe 26.3
- tvOS 26.3
- visionOS 26.3
- watchOS 26.3

  • 7
  • 4
  • 0
  • 14h ago

Bluesky

Profile picture fallback
Apple releases security updates fixing exploited dyld zero-day CVE-2026-20700 enabling code execution across iOS, macOS, and Apple devices.
  • 0
  • 1
  • 0
  • 2h ago
Profile picture fallback
Apple Zero-Day (CVE-2026-20700) Exploited in the Wild
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
🐛 CVE-2025-14174 (dyld) additional patches, 🐛 CVE-2025-43529 (dyld) additional patches, 🐛 CVE-2026-20700 (dyld): - iOS and iPadOS 26.3 - macOS Tahoe 26.3 - tvOS 26.3 - visionOS 26.3 - watchOS 26.3 #apple #infosec
  • 0
  • 1
  • 0
  • 14h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
3.90%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 3 Posts
  • 14 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Stairwell: "over 80% of monitored environments contain vulnerable versions of WinRAR affected by CVE-2025-8088"

🙃🙃🙃🙃🙃 :blobpeek:

stairwell.com/resources/stairw

  • 9
  • 5
  • 1
  • 9h ago
Profile picture fallback

Research observed -Dragon, a Chinese-aligned group linked to , conducting espionage against government and law enforcement across Southeast Asia. The threat actor weaponized flaw CVE-2025-8088 within 10 days after its disclosure, geo-fenced servers to targets, and introduced , a Telegram-based remote access tool.

research.checkpoint.com/2026/a

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

10 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
6.66%

Description

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 4 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

A critical zero-day vulnerability in Microsoft Word, identified as CVE-2026-21514, has been disclosed. The flaw is being actively exploited in the wild.
cybersecuritynews.com/microsof

  • 0
  • 0
  • 1
  • 19h ago
Profile picture fallback
  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
「この内 CVE-2026-21510、CVE-2026-21513、CVE-2026-21514、CVE-2026-21519、CVE-2026-21525、CVE-2026-21533 の脆弱性について、Microsoft 社では悪用の事実を確認済みと公表しており、今後被害が拡大するおそれがあるため、至急、セキュリティ更新プログラムを適用してください。」
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • checkpoint
  • Hramony SASE

14 Jan 2026
Published
14 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.01%

KEV

Description

A local user can trigger Harmony SASE Windows client to write or delete files outside the intended certificate working directory.

Statistics

  • 2 Posts

Last activity: Last hour

Fediverse

Bluesky

Profile picture fallback
Check Point Harmony Local Privilege Escalation (CVE-2025-9142) blog.amberwolf.com -> /via @badsectorlabs Original->
  • 0
  • 0
  • 0
  • Last hour

Overview

  • nyariv
  • SandboxJS

09 Feb 2026
Published
10 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.05%

KEV

Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prototype reference (e.g., Map.prototype, Set.prototype) is placed into an array and retrieved, the isGlobal taint is stripped, permitting direct prototype mutation from within the sandbox. This results in persistent host-side prototype pollution and may enable RCE in applications that use polluted properties in sensitive sinks (example gadget: execSync(obj.cmd)). This vulnerability is fixed in 0.8.31.

Statistics

  • 2 Posts

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Sandbox Breakout: Critical SandboxJS Flaw (CVE-2026-25881) Allows Host Takeover
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
サンドボックスブレイクアウト:重大なSandboxJSの脆弱性(CVE-2026-25881)によりホストの乗っ取りが可能に Sandbox Breakout: Critical SandboxJS Flaw (CVE-2026-25881) Allows Host Takeover #DailyCyberSecurity (Feb 11) securityonline.info/sandbox-brea...
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Windows 11 version 26H1

10 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
8.84%

Description

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 2 Posts
  • 6 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Microsoft has disclosed a zero-day vulnerability (CVE-2026-21513) in the MSHTML Framework that allows attackers to bypass security features and gain high-level access to affected systems. This critical vulnerability, with a CVSS score of 8.8, has a network-based attack vector and is already being exploited in the wild, necessitating immediate patching.
gbhackers.com/mshtml-framework

  • 6
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
「この内 CVE-2026-21510、CVE-2026-21513、CVE-2026-21514、CVE-2026-21519、CVE-2026-21525、CVE-2026-21533 の脆弱性について、Microsoft 社では悪用の事実を確認済みと公表しており、今後被害が拡大するおそれがあるため、至急、セキュリティ更新プログラムを適用してください。」
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Microsoft
  • Windows 11 version 26H1

10 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
1.55%

Description

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

Statistics

  • 3 Posts

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Windows Remote Desktop Services Zero-Day Under Active Attack: The Registry Massacre That Grants SYSTEM Access + Video Introduction The February 2026 Patch Tuesday revealed a nightmare scenario for enterprise security teams: CVE-2026-21533, a zero-day elevation of privilege vulnerability in Windows…
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
マイクロソフト、攻撃で悪用されているゼロデイ6件などを修正(CVE-2026-21533、CVE-2026-21525ほか) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43837/
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
「この内 CVE-2026-21510、CVE-2026-21513、CVE-2026-21514、CVE-2026-21519、CVE-2026-21525、CVE-2026-21533 の脆弱性について、Microsoft 社では悪用の事実を確認済みと公表しており、今後被害が拡大するおそれがあるため、至急、セキュリティ更新プログラムを適用してください。」
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • n8n-io
  • n8n

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.03%

KEV

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture fallback

🐞 Breaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Security // Het Mehta

「 CVE-2026-25049, a critical vulnerability with a CVSS score of 9.4 that let attackers execute arbitrary system commands on n8n servers. What makes this particularly interesting (and painful for n8n’s security team) is that this vulnerability bypassed a security fix they had just deployed two months earlier 」

hetmehta.com/posts/n8n-type-co

#typescript #rce #cybersecurity #CVE202625049

  • 4
  • 2
  • 0
  • 16h ago
Showing 1 to 10 of 43 CVEs